The criminal mind never sleeps and is constantly advancing with technology. This introductory course will review the use of cyber technology looking at social networking* sites such as Facebook, Instagram, Tumblr, Twitter, Google+, Telegram, Omegle, and others in understanding criminal behavior and social networking sites, and cell phone technology*. Within cell phone technology investigative techniques, investigations techniques will range from cell phone apps to cell phone tower tracking protocols. Social networking sites and cell phones have expanded cyber crimes and created new channels for sharing information that could also be utilized by law enforcement to investigate crimes and identify suspects. This course does include child abuse and other illicit activities as case studies and examples. This course does include P2P investigations, proactive chat investigations, search and seizure protocols with courtroom testimony, gaming platforms, and much more.
(*Course will not be taught in necessarily the same order as listed below and in outline) (2-day event)
Upon Completion:
Participants will be able to:
1. Common crimes committed on social networking sites.
a. The use of "bots."
b. Artificial intelligence in gathering data.
2. Understand the basic steps for preserving a profile.
a. Identifying its creator.
c. Gather profile information.
3. Review social networking artifacts.
a. Obtain evidence from servers.
4. Capture live digital evidence from computers and networks using opensource internet tools.
5. Perform live router interrogations.
a. Use router interrogations to find evidence on computers.
b. Copy RAM contents, Analyze routers at the scene.
6. Search and seizure protocols on digital evidence and courtroom testimony.
7. Understand and define the basic terms related to investigating cyber crimes.
8. Understand and explain IP addresses.
a. Including dark web and virtual private networks (VPNs)
b. Capture IP addresses and URL’s
9. Describe the links between social networking sites and the acceleration of crimes.
a. Telegram, Omegle, Chat investigations, gaming platforms.
10. Understand the role of sextortion and online gaming platforms using social networking sites and cell phones.
11. Employ specific techniques and evolving tactics for successful cyber investigations.
12. Learn how to intercept digital evidence.
a. Learn the importance of securing metadata when intercepting evidence.
13. Search and seizure protocols.
a. Seizing both electronic and digital evidence and courtroom testimony.
b. Current case laws
14. Learn how to intercept digital evidence.
a. Metadata, cell phone records, tower records, cell phone data.
15. How to conduct peer-to-peer (P2P) investigations.
a. Proactive chat investigations.