Online Training Registration
Law Enforcement Training Courses and Schedule
PATC Links
Law Enforcement Training Institute
PATC Internal Affairs Institute
PATC Internal Association of Hostage Negotiators
PATC Class Materials
Contact Us      Aboout PATC      PATC Publishing/Bookstore      Training Partners      Newsletter, Training Brochures, RSS, Facebook, Twitter, LinkedIN


Register for this Seminar | Return to Schedule |

Seminar Title:  
Social Media and Cell Phone Investigative Techniques

DATES:  11/1/2023 through 11/2/2023

INSTRUCTOR(S):  Melissa Maranville

LOCATION:  Columbus, Ohio Division of Police Training Academy - 1000 North Hague Ave., Columbus, OH  43204-2121

HOTEL:  Drury Inn & Suites Columbus Convention Center - Columbus, OH  
Contact Hotel for State Govt. Rate

COURSE REGISTRATION FEE:  $350.00 Includes all training materials, and a Certificate of Completion.

Instructor Bio


Melissa is the Founder/CEO of DeVille and Associates, LLC, located in Knoxville, Tennessee, USA. DeVille offers Forensic Consulting and Training to law enforcement and other criminal justice professionals. DeVille consults, develops content, and trains on complex topics such as cryptocurrency, surface/dark webs, bots, AI, social media, cybercrime, predator behavior, OSINT, and linkage analysis. Melissa has partnered with many linkage analysis and OSINT companies offering trainees insight and access.


Melissa began her criminal justice career as a booking and intake officer at Knox County Sheriff’s Department in Knoxville, TN, and a student of Dr. Bass of the“Body Farm,” Forensic Anthropological Research Facility, and since has dedicated her career to researching and developing content for criminal justice education and training for over 30 years. In addition, she provides education and training to social media and gaming moderators investigating cyber predators, CSAM, and violent content for blue chip companies. Lastly, Melissa is also a forensic consultant for human trafficking divisions within law firms.


Melissa's education includes bachelor's and master's degrees from the University of Tennessee in Knoxville, TN, and a Ph.D. (candidate) Grand Canyon University in Phoenix, Arizona. Her dissertation topic is "A Case Study of Ineffective Legislation: Moral Panic and the Sex Offender Registry." When she concludes her Ph.D., she hopes to influence new sex offender legislation in tracking and tracing registered and non-registered sex offenders.

Pre-Payment is not required to register or attend IN-PERSON seminars. Pre-payment is required for WEBINARS and ONLINE COURSES.


Course Objectives

The criminal mind never sleeps and is constantly advancing with technology. This introductory course will review the use of cyber technology looking at social networking* sites such as Facebook, Instagram, Tumblr, Twitter, Google+, Telegram, Omegle, and others in understanding criminal behavior and social networking sites, and cell phone technology*. Within cell phone technology investigative techniques, investigations techniques will range from cell phone apps to cell phone tower tracking protocols. Social networking sites and cell phones have expanded cyber crimes and created new channels for sharing information that could also be utilized by law enforcement to investigate crimes and identify suspects. This course does include child abuse and other illicit activities as case studies and examples. This course does include P2P investigations, proactive chat investigations, search and seizure protocols with courtroom testimony, gaming platforms, and much more.

(*Course will not be taught in necessarily the same order as listed below and in outline) (2-day event)

Upon Completion:

Participants will be able to:

1. Common crimes committed on social networking sites.

     a. The use of "bots."

     b. Artificial intelligence in gathering data.

2. Understand the basic steps for preserving a profile.

    a. Identifying its creator.

    c. Gather profile information.

3. Review social networking artifacts.

    a. Obtain evidence from servers.

4. Capture live digital evidence from computers and networks using opensource internet tools.

5. Perform live router interrogations.

    a. Use router interrogations to find evidence on computers.

    b. Copy RAM contents, Analyze routers at the scene.

6. Search and seizure protocols on digital evidence and courtroom testimony.

7. Understand and define the basic terms related to investigating cyber crimes.

8. Understand and explain IP addresses.

     a. Including dark web and virtual private networks (VPNs)

     b. Capture IP addresses and URL’s

9. Describe the links between social networking sites and the acceleration of crimes.

     a. Telegram, Omegle, Chat investigations, gaming platforms.

10. Understand the role of sextortion and online gaming platforms using social networking sites and cell phones.

11. Employ specific techniques and evolving tactics for successful cyber investigations.

12. Learn how to intercept digital evidence.

     a. Learn the importance of securing metadata when intercepting evidence.

13. Search and seizure protocols.

     a. Seizing both electronic and digital evidence and courtroom testimony.

     b. Current case laws

14. Learn how to intercept digital evidence.

     a. Metadata, cell phone records, tower records, cell phone data.

15. How to conduct peer-to-peer (P2P) investigations.

a. Proactive chat investigations.

Register for this Seminar | Return to Schedule |




View Legal Article Archive



Click Here to See Our FAQ!



Legal Updates
Internal Affairs

Click below to sign up for
emails and brochures!

PATC Mailing List

Public Agency Training Council - 2230 Stafford Road STE 115 PMB 379 - Plainfield, IN 46168 - 800.365.0119

About PATC | PATC Publishing/Bookstore | Training Partners | E-Newsletter | Contact Us | Home | Site Terms of Use Policy