Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Social Media and Cell Phone Investigative Procedures

Description

Cell phones have expanded criminal activity and created new channels for sharing information that could also be utilized by law enforcement to investigate crimes and identify suspects, particularly when coupled with social media investigations. This course focuses on investigative cell phone techniques, including investigating social media and locating data using email addresses, usernames, time-date stamps, etc. This course also includes peer-to-peer (P2P) investigations, proactive chat investigations, social media and chat apps, search warrants, gaming platforms, tracking apps, crossing usernames and email addresses for cell phone investigations, and much more.

This introductory course will also review the use of cyber technology, looking at social networking sites such as Facebook, Instagram, Tumblr, Twitter, Google+, Telegram, Omegle, and others to understand criminal behavior and investigate cybercrime cell phone technology*. This course will discuss and demonstrate cell phone applications in conjunction with hidden applications, cloaking (hiding IP address outside of target zone), cell phone dumps and software, GEO location, triangulating IP address, longitude and latitude, and physical address, as well as demonstrating how to locate ethical compromised data using cell phone numbers, emails, and usernames to collect physical addresses, passwords, additional usernames, and email addresses. This course also includes information on warrant templates for over 500 social media and gaming platforms, discussing some of the most common and what each collect regarding IP addresses, URLs, voice, pictures, videos, financial data, etc. We will also discuss current case studies using linkage analysis and technological combinations for success.  

This class focuses on social media and cell phones. A separate social media class is offered that includes open-source intelligence (OSINT) techniques. Look for social media and OSINT investigative techniques in the course catalog.

This course is part of a 3-day course: Analyzing social media, Cell Phone, and OSINT Techniques. Check with PATC for more Information on the 3-day course.

(*Course will not be taught in necessarily the same order as listed below and in outline) (2-day event)

Upon Completion:

Participants will be able to:

1. Common crimes committed on social networking sites.

      a. The use of "bots."

      b. Artificial intelligence in gathering data.

2. Understand the basic steps for preserving a profile.

     a. Identifying its creator.

     b. Set up undercover profiles.

     b. Gather profile information.

3. Review social networking artifacts.

     a. Obtain evidence from servers.

4. How to capture live digital evidence from computers and networks using open-source internet tools.

5. Search and seizure protocols on digital evidence and courtroom testimony.

6. Understand and define the basic terms related to investigating cybercrime.

7. Understand and explain IP addresses

8. Describe the links between social networking sites and the acceleration of crimes.

      a. Telegram, Omegle, Chat investigations, gaming platforms.

9. Understand the role of sextortion and online gaming platforms using social networking sites and cell phones.

10. Employ specific techniques and evolving tactics for successful cyber investigations.

11. Learn how to intercept digital evidence.

12. Search warrant templates for social media and chat sites.

Press enter to see more results