Real Time Cell Phone Investigations
Digital evidence is abundant in crime scenes and investigations. It doesn’t matter how large or how small your department or your detective bureau is. At some point, you will be called upon to investigate a case involving some form of digital evidence. Learning to navigate the world of social media requests, call detail records, precision location information, router logs and digital forensics can be daunting. Imagine now doing this in the most exigent cases, when stress is high and pressure is on, this can be even more daunting.
In our class, “Exploiting Technology in Real Time Investigations”, our instructor will walk you through exactly how all of this technology is intermingled. They will tell you what you need, why you need it and how to obtain it, now! This class will help to cut out the fluff and get you the evidence you need quickly.
The principles taught in this class cross over to everyday investigations. Topics covered include; Analyzing Call Detail Records, Precision Location Information, Internet and IP address basics, router logs, incorporating digital forensics, MAC Addresses, Social Media Requests and Returns (Facebook/Instagram, Snapchat, TextNow, Pinger, more), Apple and Google Records.
Who Should Attend
This class is designed for detectives, patrol officers, analysists, and other personnel who respond to critical incidents where actionable intelligence in a real time setting is paramount.
Students must bring a laptop with Microsoft Excel and internet capabilities. An external mouse is recommended but not required.
1. Capabilities of Mobile Technology
2. Exigency Requests, Line Captures, Telephone, and Internet Service Restrictions
3. Legal Demands and What You Should Ask of a Service Provider
4. Hands-on exercise with Verizon, AT&T, T-Mobile, and Sprint Records
5. Using Call Detail Records to Conduct a Complete Interview or Negotiation
6. Interpreting Real Time location services data from Verizon, AT&T, Sprint, and T-Mobile
1. Dropped Phone and Voice Over Internet Protocol (VOIP) investigations
2. Legal Demands Associated with Spoofing, SWATing, Harassment, and VOIP investigations
3. Identifying offenders who exploit Craig’s List, Offer Up, and other online sales sites
4. Special Hazards for Law Enforcement involving mobile applications
5. Case Studies of Telephone Misuse Cases and How to Identify Offenders
6. EXIF Data and open source intelligence gathering