SEARCH Offers Advanced Skills as a Training Partner at Four Internet Crimes Against Children Regional Trainings
As a training partner for the national ICAC Task Force Program, SEARCH staff is presenting at four regional law enforcement training events in 2014, which are geared to law enforcement and social services professionals who work to protect children from online exploitation.
Each three-day training event consists of lecture tracks and hands-on computer laboratory workshops. SEARCH High-Tech Crime Training Services staff has helped to develop training curriculum for these events and will deliver lectures and workshops at all four locations.
The first event was held in early February in Garden Grove, California. The remaining three events will be:
In 1998 the Office of Juvenile Justice and Delinquency Prevention (OJJDP) established the national Internet Crimes Against Children (ICAC) program. The program started small with only 10 Task Forces and was designed to help agencies respond to and investigate the growing number of online child victimization and child pornography cases. Today there are 61 ICAC Task Forces nationwide, and they include more than 3,000 Federal, state and local law enforcement and prosecutorial agencies. ICAC Task Forces engage in reactive, proactive, and forensic investigations and criminal prosecutions that help develop effective, sustainable responses to online child victimization. SEARCH has provided training to ICAC task forces since their inception.
- March 11-13, in Denver, Colorado
- April 15-17, in Atlanta, Georgia
- May 28-30, in Columbus, Ohio
Tim Lott, Director of SEARCH’s High-Tech Crime Training Services program, along with program Manager Justin Fitzsimmons and High-Tech Crime Training Specialists Lauren Wagner and Don Lewis, are participating in the four training events. Their presentations address these topics:
- Mobile Device Data Extraction. With the proper equipment and training, investigators may be able to retrieve valuable information from a cell phone, including address book, photos, videos, ringtones, text messages, calendar, and more. Additionally, cell phone applications provide significant communication data not recorded by the service provider. This three-hour workshop gives investigators the skills they need to recover this valuable information.
- Cloud Computing. As society increasingly relies on mobile devices such as smartphones and tablets to access the Internet, the use of the “cloud” has expanded. This presentation helps investigators understand what cloud computing is, and how it works. Investigators will learn the necessary steps to preserve, seize and search evidence in the cloud.
- Direct Examination of a Computer Forensic Examiner: This presentation focuses on the fundamentals of presenting a forensic examiner at trial. It highlights possible exhibits that prosecutors can use to help explain technology devices and computer forensics during the foundation portion of the examination. Trainees get tips for effectively presenting computer forensic evidence at trial.
0 Comments | Category: SEARCH News