Public Safety Officers and Information Technology Specialists Come Together for National Conference on Forensic Data Recovery & Cyber Crime

Share Article

Cell Phones, Emails, Computer Browsers, GPS devices, Network Routers and more all have one thing in common ~ They leave a digital trail that can identify a person, a place, a time line, or clues to where more data (evidence) can be found! Investigators, Crime Scene specialists, Information Technology specialists, Internal Affairs officials, Prosecutors, S.I.U’s and Private Detectives ALSO have one thing in common ~ the need for training in recovering these trails of digital data - INDY 2010 responds with 3 days of practical solutions.

National Training Conference

Fire/Arson investigators, Drugs & Narcotics investigators, Death & Homicide investigators, Crime Scene specialists, Information Technology specialists, Internal Affairs officials, Prosecutors, S.I.U’s, Private Detectives and more will all benefit from practical instruction on forensically recovering data and investigating cyber crime.

PATCtech Electronic Evidence & Cyber Crime Training Conference ~ Indy 2010

http://www.patctech.com/training/indy2010.shtml

---------------------------------------------------------
Public Safety Officers and Information Technology Specialists Come Together for National Conference on Forensic Data Recovery & Cyber Crime

At one level, you may just need to recover your boss's deleted emails. However, you may need to find evidence that supports where a suspect was located during a given time and date, or maybe you have to find the source of a pornographic image.    Electronically Stored Information (ESI) on computers, cell phones, GPS devices, networks or the Internet is the fastest growing type of evidence used in any type of investigation. No longer is the case where those specializing in Information Technology, Cyber Crime and computer forensics are the only ones tasked with the responsibilities of dealing with ESI.

This one-of-a-kind training conference is designed to teach practical concepts that we all need for recovering, preserving, examining and reporting digital evidence from electronic storage devices and the Internet using forensic procedures that will stand up in a court of law.

Advanced computer skills are not required to attend, nor needed to benefit from the training at this conference.

"Fire/Arson investigators, Drugs & Narcotics investigators, Death & Homicide investigators, Crime Scene specialists, Information Technology specialists, Internal Affairs officials, Prosecutors, S.I.U’s, Private Detectives and more will all benefit from practical instruction on forensically recovering data and investigating cyber crime."

---------------------------------------------------------

CONFERENCE OVERVIEW:

For Complete Details and registration, visit the conference site on the web at:
http://www.patctech.com/training/indy2010.shtml

Pre-payment is not required to register or attend this event.

Four (4) unique training *Tracks offering 20 individual course **Blocks

TAKE THE COURSES YOU WISH: Registration for the three (3) day event allows you to take whatever combination of course Blocks you wish or to follow the specific Blocks as outlined in one of the four training Tracks.

Training Tracks:

     ' C ' TRACK: Cell Phone Technology & Forensic Data Recovery (TESTED)
     ' S ' TRACK: Electronic Crime Scene Specialist (TESTED)
     ' I '    TRACK: Internet Tools & Internet Investigations
     ' G ' TRACK:: Electronic Evidence Basics

Individual Training Blocks:

--- 2010 PATCtech Digital Forensics for Public Safety Update --- Exposure to cutting edge private sector solutions for public safety digital forensics ~ includes specific solutions for computer and hand-held forensics for any size budget.

--- Cell Phone Records Analysis I --- What are cell phone tower records? What do they look like? Why do investigators need them? What can investigators do with them? How do you get them? What records are important?

--- Cell Phone Records Analysis II --- Lecture and demonstration on the use of mapping software to visualize, analyze and report suspect locations and movement based on cell phone tower records.

--- Cell Phone Forensics I --- Types of Data / Evidence stored on cell phones; Laws for seizing cell phone & recovering cell phone data; Managing evidence data in lab setting; Online - Internet tools for cell phone investigators; Cell phone forensic solutions available to law enforcement.

--- Cell Phone Forensics II --- Demonstration and analysis of advanced cell phone forensic solutions: BitPim, CelleBrite, MobilEdit! Forensic, Device Seizure, Secure View II, Project-a-Phone and more...

--- GPS Forensics I --- What is GPS? How does GPS work? What type of information can be obtained from GPS enabled devices, i.e., what are waypoints? Examples of commercial GPS enabled devices, differences and similiarities between cell phone forensics and GPS forensics, Laws for seizing GPS devices & extracting data - live on scene vs. back in the lab.

--- GPS Forensics II --- Demonstration and analysis of multiple GPS Forensics software / hardware solutions.

--- Crime Scene Electronic Evidence Handling I --- Recognizing Electronic Storage Devices (ESD’s) and potential evidence; Photographing & Documenting the scene; Legal guidelines and staying within the scope of a Warrant; Tools (bags, tags and equipment!); Recognizing the need for a specialist.

--- Crime Scene Electronic Evidence Handling II --- Recognizing & preserving computer network environments, Transferring, Transporting & Packaging Electronic Storage Devices; Preserving evidence (when to shut down & when to leave on); Seizing computers; Seizing cell phones; Seizing other ESD’s; Considerations for Office environments; Preserving damaged items.

--- Federal Rules of Electronic Evidence --- Legal issues for searching, seizing and preserving electronic evidence from consensual encounters to crime scenes, and Legal issues for online undercover operations.

--- Court Orders, Search Warrants and Electronic Evidence --- Learn to properly write Court Orders and Search Warrants to obtain ALL the needed records from Internet Service Providers (ISP’s), Web Hosts, Cellular Phone Carriers and other 3rd party’s who archive potential evidence of suspect activity.

--- Introduction to Electronic Evidence Investigations --- Define & Recognize different types of Electronic Storage Devices (ESD’s); Types of evidence associated with different ESD’s; Protecting and preserving electronic evidence (physical protection to preserving the integrity of data); Recognition of network environments and the types of data/evidence that can be obtained from networks; Introduction to the Internet as a tool for investigators & as a source of evidence.

--- Live Digital Evidence Seizure I --- Overview of the benefits, capabilities and processes for using free Linux utilities to preview and capture “live” digital evidence.

--- Live Digital Evidence Seizure II --- Demonstration and practical application on the use of free Linux utilities to preview and capture live digital evidence.

--- Network Data Seizure ~ Router Interrogation I --- Identifying Small Office & Home network equipment; Types of data / evidence can be obtained from Network equipment; Handling network equipment to preserve evidence.

--- Network Data Seizure ~ Router Interrogation II --- Demonstration and practical application on analyzing, interrogating and seizing data from Network Routing and Storage equipment.

--- Introduction to Internet Evidence ~ The Internet as a crime scene --- Introduction to the Internet; Internet Crimes vs. Crimes with evidence on the Internet; Sources of Internet evidence; Legal issues for obtaining evidence from the Internet; Working with ISP’s & Web Hosts; Investigator’s use of the IP address to trace a suspect’s ‘virtual address’ to their ‘actual physical address’

--- Internet as a Tool for Investigators ~ The Internet as a resource --- Online tools and tricks that can be used for any type of criminal investigation; Posing as a child online; Free and premium website tools for investigators; Online cell phone resources; Online people locators & identity resources; Government and private databases.

--- Chat, Email, P2P & Social Networking Evidence --- Types of evidence & types of crime conducive to each; Working with Facebook® and MySpace®; Working with Gmail®, Yahoo® and other ISP’s; Working with Limewire® and similar Gnutella® based P2P programs; Working with Outlook® and other Internet-Connected programs; Search Warrants, Court Orders & Legal issues for online investigations.

--- Online Child Predator/Pornographer Investigations --- Special considerations, both on and off-line, that lead to more successful prosecutions of online child predators and online child pornographer’s.

###

Share article on social media or email:

View article via:

Pdf Print