Improve capabilities to conduct digital evidence preservation, collection, and analysis. Understand the role this type of digital evidence plays in child abduction, exploitation, and child sex trafficking cases.
Designed to provide the first responder, investigator, and investigative supervisor in child abduction, exploitation and child sex trafficking cases with information to improve their capacity and capabilities.
Notice of Federal Funding and Federal Disclaimer
This Web site is funded in part through grants from BJA, COPS, OJJDP, OJP, OVC, SMART, and U.S. Department of Justice. Neither the U.S. Department of Justice nor any of its components operate, control, are responsible for, or necessarily endorse, this Web site (including, without limitation, its content, technical infrastructure, and policies, and any services or tools provided).
Need custom training to address your unique needs?
We can help.
Thank you for requesting training and technical assistance!
Our dedicated NCJTC staff will contact you within 2 business days of receipt of this request to discuss your needs and how we can help. We appreciate your interest in our training programs and look forward to serving you.
In addition to an overview of how digital evidence relates to most investigations, this module will cover important foundational concepts and terminology related to digital evidence and digital technology. This information will assist participants (investigators and prosecutors) in preparing legal process documents, exhibits, and testimony related to digital evidence and related technology.
10:30 AM - 12:00 PM
Seizing Digital Evidence
This module will provide participants with guidelines and methods to safely and effectively seize items of digital devices and preserve provider data. Devices discussed will include computers, tablets, removable media, GPS devices, vehicle infotainment systems, and digital video. A case study example will provide participants with a foundation for the initial response for collecting and identifying technology and digital evidence related to an investigation and prosecution.
12:00 PM - 1:00 PM
Lunch (on own)
1:30 PM - 5:00 PM
Social Networking Concepts and Investigative Strategies
This module will provide investigators with an overview of current trends within the realm of social networking, to include social networking apps that are currently popular and how social networking has evolved to a mobile interface. Specific attention will be paid to highlighting the potential investigative leads that can be garnered from social networking sites and possible digital evidence that can be secured in criminal investigations. Ecommerce sites (backpage.com, craigslist.com, etc.) that contribute to the current problems with human trafficking will be addressed, as well as dating sites that can be used to target potential stalking victims.
8:00 AM - 12:00 PM
Mobile devices have become the most important item of digital evidence in most investigations. In this section, participants will learn how to properly identify, isolate, preserve, and seize mobile devices. Specific examples will include devices that are powered on, powered off, damaged, submerged, devices with removable media, and devices with locked screens will be discussed. Mobile device field triage considerations and related legal concepts will be introduced.
12:00 PM - 1:00 PM
Lunch (on own)
1:00 PM - 2:00 PM
Mobile Devices (cont'd)
2:00 PM - 5:00 PM
Mobile Network Data and Investigative Resources
This section will provide participants with an understanding of conventional cellular network provider data, Voice over Internet Protocol (VoIP) provider data, device operating system data, and cloud storage data. Resources to assist investigators in identifying providers and preserving provider data will be discussed.
8:00 AM - 12:30 PM
Digital Evidence Legal Considerations and Implications
Identifying legal issues that commonly arise in the recovery and collection of digital evidence in cases involving missing or abducted children. Participants will learn the essential legal skills that will allow them to move expeditiously in such investigations without violating the Constitution or federal statues, as well as learn how to handle and authenticate digital evidence properly to ensure it is admissible in a court of law.
12:30 PM - 1:30 PM
Lunch (on own)
1:30 PM - 4:30 PM
Case Management - Putting It All Together
A case study presentation will guide participants through the process of effectively incorporating digital evidence and related provider records into major case investigations. Students will also be provided with demonstrations and explanations in the use of additional tools and resources designed to assist them in the management of digital evidence related investigations and prosecutions.