SEARCH High-Tech Crime Trainers to Offer Solutions, Hands-on Instruction at Three National Conferences
SEARCH’s High-Tech Crime Training Services team is gearing up to share its collective knowledge at three national law enforcement conferences in April 2013.
We caught up with Training Director Tim Lott recently and asked him to fill us in on what the team has been up to and what they expect from these upcoming engagements. (See the shaded box at the end of the Q&A for details on selected SEARCH presentations this month.)
Editor: This will be the first time your team has presented at the Dallas Conference on Crimes Against Women. Tell us about the specific challenges that the attendees are facing and the solutions you will provide.
Lott: Technology is now so widespread in everyday life, and nearly every “traditional” crime contains some technological component, whether it’s an email sent from a computer, a text sent from a smartphone, or an incriminating picture taken with a digital camera.
SEARCH recognizes the need for law enforcement officers to be trained in how to process this digital evidence. From searching for a suspect or victim on social media, to seizing digital evidence at a crime scene, the techniques taught at this conference will enable the practitioner to properly seize this information and ultimately help keep their community safe.
The focus of this conference is to train professionals who are responders to or advocates for victims of crimes against women—but the techniques we teach here can be applied to a broad range of crimes.
Editor: Your team is also preparing to teach at the 2013 National Cyber Crime Conferencein Massachusetts. Tell us about that conference and what SEARCH’s involvement will be.
Lott: Again, as technology permeates the everyday lives of Americans—from kids to teens to adults—more criminal activities are facilitated or accomplished through technological means. Investigators and prosecutors from across the country are gathering in Massachusetts to learn the best practices for investigating and prosecuting cybercrimes. SEARCH was asked to design and facilitate the “prosecutor” track for this conference.
Through SEARCH training and direct assistance, attendees will learn about pre-charging decisions, search and seizure, presenting digital evidence in court, and demonstrating the techniques of conducting a direct and cross-examination of a computer forensic examiner, among other topics. SEARCH is providing subject matter experts from across the country to participate as faculty members for this course, along with regular SEARCH high-tech crime training staff.
Editor: The third upcoming conference is the Child Abuse and Family Violence Summit in Clackamas, Oregon. What information will SEARCH present there?
Lott: Our High-Tech Crime Training Services team is an annual presenter at the Clackamas summit. This year we will instruct attendees on how to search social networking sites—especially Facebook and MySpace—to find valuable information that can help solve a crime.
We will also introduce investigators to free resources that will help them with their investigations. We will cover on-scene digital triage, demonstrate how to recover volatile data, and provide an introduction to Internet relay chat investigations.
We’ll also provide two full-day sessions for two of our most popular courses. They both address in-depth subject matter: Introduction to Internet Investigations and Introduction to Mobile Device Data Recovery.
Editor: Please speak to the differences in your presentations at conferences versus the day-to-day training your team provides.
Lott: There are many similarities between the trainings that we provide at conferences and our everyday training, but our traditional training sessions are limited to 20 students per course and typically last one day to up to four days.
Many of our conference blocks are segments from our training offerings, but we can provide them in 90- or 180-minute training blocks. Because of this format—combined with large conference attendance—we’re able to take advantage of this opportunity to provide skills to more practitioners at one event. They may not get as in-depth training at the conferences, but at least they are introduced to the issues that must be addressed and shown the tools and resources that are available to help them.
Selected SEARCH Presentations
SEARCH will make two hands-on presentations, and attendees are encouraged to bring laptops or tablets to actively participate in online aspects of the lectures:
- Internet Searching Techniques: Using Google and Facebook to Find Information, which teaches how to use Google Boolean and advanced operators to more effectively search for information and how to use specific Facebook searching techniques to find all possible publicly available data.
- Technology Awareness in Investigations: Using the Data You Can’t See, which demonstrates how to find and use “hidden” geolocation information stored in pictures from cellphones and on social media to aid in online investigations.
SEARCH is providing labs, workshops, and presentations, including:
- Introduction to Internet Investigation, a lab that covers basic website investigation—including finding legal contact information, registrar information, and mining the website for additional data and leads. It also covers IP addressing, photo searching and property data, basic Firefox Add-ons, and basic Google searching.
- Introduction to Mobile Device Data Recovery, an introductory workshop on cellular devices and the effect that mobile devices have on investigations. It covers considerations for mobile-device seizure, and various tools for mobile-device data recovery.
- Become a Google Jedi: Save Yourself from Information Overload, a lab that teaches the effective use of Google to filter search results to relevant and useable information.
- Investigative USB Apps, a lab that teaches how to download, install, and use portable apps as an investigative tool.
- Introduction to mIRC Investigations, a lab that teaches the basic of Internet Relay Chat (IRC), focusing on the software set up to install and capture potential evidence.
- Field Triage and Data Acquisition, a lab and lecture that addresses collecting potential evidence from running devices at the scene of a search warrant or a probation/parole search using field triage tools.
- Firefox Add-ons: Free Resources to Enhance Your Investigations, a lab that teaches the effective use of Mozilla Firefox add-ons as investigative tools, which can save time in routine tasks.
- The Recovery of Volatile Data, a lab and lecture that addresses collecting “volatile data” in the form of a computer’s Random Access Memory.
- Introduction to Social Networking Site Investigations, a beginners’ workshop to provide an overview of social networking websites and their investigative value. Students will also learn how to set up an investigative social networking account to search for information.
- Using Social Networking Sites in 21st Century Investigations, an interactive lecture to detail the importance of using social media to develop evidence to corroborate child-exploitation and physical-abuse cases. The lecture will focus on the importance of acting quickly to secure this evidence, and participants will learn about authenticating evidence discovered in cyberspace for court purposes.
- Direct Examination of Computer Forensic Examiner will focus on the nuts and bolts of presenting a forensic examiner at trial. It will highlight possible exhibits that can be used to assist in explaining technology devices and computer forensics during the foundation portion of the examination.
One Month, Three Conferences
- Conference on Crimes Against Women, Dallas, Texas, April 8-10, 2013. Cosponsored by the Genesis Women’s Shelter and the Dallas Police Department. Provides a national forum to disseminate the highest level of training, information, and strategies to professionals who are responders and advocates to victims of crimes against women.
- 2013 National Cyber Crime Conference, Norwood, Massachusetts, April 22-24, 2013. Hosted by Massachusetts Attorney General’s Office. Provides training in digital forensics and cybercrimes in three tracks: prosecutors, investigators, and digital evidence forensic examiners. SEARCH is a partner in this event, along with Microsoft, the National Association of Attorneys General, and NW3C.
- Child Abuse and Family Violence Summit, Portland, Oregon, April 23-26, 2013. Hosted by the Clackamas County Sheriff’s Office Child Abuse Team and Domestic Violence Enhanced Response Team to educate professionals on the complex issues associated with child abuse and family violence. SEARCH is a community partner in the Summit.
Co-author, Public Domain Drug Court Software: Functions and Utility
Author, Supporting the Drug Court Process: What You Need to Know for Effective Decisionmaking and Program Evaluation
Contributor, Report of the National Focus Group on Identity Theft Victimization and Criminal Record Repository Operations
Contributor, Report of the National Focus Group on the Criminal Record Backgrounding of America
Co-author: Complete Criminal Histories—A Key Measure of Integration Success
Co-author, DNA Forensics: Expanding Uses and Information Sharing
Co-author, Guide to Conducting Privacy Impact Assessments for State and Local Information Sharing Initiatives
Co-author, Survey of State Criminal History Information Systems, 2003, 2006, 2008, 2010, 2012
Organizer/Moderator: National conference, “Beyond the Technology: The Law & Policy Implications of Biometric Use,” 2002
Organizer/Moderator: national Criminal History Operations Workshop, 2004, 2006
Organizer/Moderator: Workshop on Expanding Access to Criminal History Information and Improving Criminal Record Backgrounding, 2007
Organizer/Moderator: National Instant Criminal Background Check System Improvement Amendments Act Conference, 2009
Presenter, National Crime Prevention and Privacy Compact Council, 2010–2014
Presenter, FBI CJIS Advisory Policy Board, 2012–2014
FBI CJIS Identification Services Coordinating Group Criminal Justice Rap Back Committee
National Crime Prevention and Privacy Compact Council Rap Back Task Force
FBI CJIS Division Disposition Reporting Task Force
FBI CMIS Advisory Policy Board Warrants Task Force
Joint Task Force on the Design and Utilization of an Interstate Criminal History Record
FBI work Group on the Implementation of the Brady Law
FBI National Fingerprint File Pilot Project Evaluation Group
National Focus Group on the Retention of Civil Fingerprints by Criminal Record Repositories
National Focus Group on Emergency Housing and Criminal Record Checks: The Hurricane Katrina Experience
National Task Force on Increasing the Utility of the Criminal History Record
Global Justice Information Sharing Initiative: Privacy and Information Quality Working Group, and Privacy and Technology Focus Group