SYNOPSIS
Whether responding to a critical missing person, a homicide, or a hostage barricade, students learn step by step how to exploit mobile technology in real time and how to interpret the data available from the various service providers.
OBJECTIVES
Day One
1. Capabilities of Mobile Technology
2. Exigency Requests, Line Captures, Telephone, and Internet Service Restrictions
3. Legal Demands and What You Should Ask of a Service Provider
4. Hands-on exercise with Verizon, AT&T, T-Mobile, and Sprint Records
5. Using Call Detail Records to Conduct a Complete Interview or Negotiation
6. Interpreting Real Time location services data from Verizon, AT&T, Sprint, and T-Mobile
Day Two
1. Dropped Phone and Voice Over Internet Protocol (VOIP) investigations
2. Legal Demands Associated with Spoofing, SWATing, Harassment, and VOIP investigations
3. Identifying offenders who exploit Craig’s List, Offer Up, and other online sales sites
4. Special Hazards for Law Enforcement involving mobile applications
5. Case Studies of Telephone Misuse Cases and How to Identify Offenders
6. EXIF Data and open source intelligence gathering
COURSE FLYER
INSTRUCTORS
Instructors are provided by Police Technical
REGISTRATION
This course is free and limited to 24 students. Registration instructions can be found on the course flyer.