In the modern cyber-world, almost all criminal investigations have an online aspect that can be used to further investigations and more quickly solve otherwise difficult cases. Join us to examine open source online intelligence/information and learn how to leverage free platforms, databases, and web applications to strengthen criminal cases. Uncover little known facts and techniques to optimize results using online search engines and online internet resources, which will support your investigations and prosecutions. Learn how to complete and serve search warrants for a variety of electronic information and databases to further all types of investigations. Develop new skill sets to establish contacts and open-source intelligence networks to provide ongoing criminal and threat intelligence in your jurisdiction.
Explore investigative strategies that address the relationship between child sexual abuse and child pornography to supplement an investigation and corroborate victim statements. Gather the right tools and resources to investigate sexual abuse cases and produce the most comprehensive case outcomes. During this training, you will learn about the trauma experienced when child sexual abuse cases involve child pornography.
Learn about the technology that our youth are using and the role that it plays in their lives to create better understanding and open up meaningful communication. Increase awareness of opportunities to protect and connect with children while also gathering valuable information to mitigate threats posed by individuals who seek to exploit them.
Learn current cell phone related strategies and techniques for any type of investigation. Explore and apply current practices for working with different cellular network providers, completing technology-focused search warrants, analyzing cellular provider call data, associating reported data to the investigation and effective case reporting strategies.
Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.
Gain critical information and techniques to improve capabilities to conduct digital evidence preservation, collection, and analysis in missing, endangered and abducted child investigations. Understand the role digital evidence provides in the recovery of the victims, identifying possible suspect(s) or linking the suspect and the victim in child abduction exploitation, and child sex trafficking cases.
Learn techniques to respond and investigative technology facilitated crimes against children in tribal communities. Explore how technology can contribute to the victimization of children through exploitation, maltreatment and abductions. Gain information on how to become an ICAC Task Force Affiliate. Utilize a practical exercise to apply investigative techniques learned. Information and access to resources for prevention education in schools and youth programs will be provided.