PATC HOME
Online Training Registration
Law Enforcement Training Courses and Schedule
PATC Links
Law Enforcement Training Institute
PATC Internal Affairs Institute
PATC Internal Association of Hostage Negotiators
PATC Class Materials
Contact Us      Aboout PATC      PATC Publishing/Bookstore      Training Partners      Newsletter, Training Brochures, RSS, Facebook, Twitter, LinkedIN
 


 


Register for this Seminar | Return to Schedule |


Seminar Title:  
Social Media and Cell Phone Investigative Techniques

DATES:  1/26/2022 through 1/27/2022

INSTRUCTOR(S):  Melissa Maranville

LOCATION:  Drury Inn & Suites Greenville - 10 Carolina Point Parkway, Greenville, SC  29607

HOTEL:  Drury Inn & Suites Greenville - Greenville, SC  864-288-4401
$95.00 single/double
Book Room Online Here

COURSE REGISTRATION FEE:  $325.00 Includes all training materials, and a Certificate of Completion.

Instructor Bio

Melissa comes with almost 30 years of experience in the criminal justice field, either working, researching, developing, or delivering education and training. Her employment history includes a paralegal in criminal law, a booking, and intake officer cross-trained in forensic crime scene investigation, and a former criminal justice and criminology professor for almost 15 years. In 2000, Melissa assisted in training and educating the FBI's Evidence Response Team in crime scene collection of human remains and time since death at the University of Tennessee's Forensic Anthropological Research Facility, the Body Farm. Her experience also includes developing and delivering mass fatalities and counter-terrorism education content at the Department of Homeland Security training division and the College of Forensic Psychology on expert witness courtroom testimony regarding Domestic Minor Sex Trafficking.

 

Melissa researched, developed, and taught many criminal justice and behavior courses as a college professor and developed a SACS accredited "military accepted"college degree program for an online associate degree in Homeland Security and Criminal Justice. With a passion for understanding the criminal mind, Melissa developed and presented training content for the International IP Crime Investigator's College (IIPCIC), a UL and INTERPOL initiative on the topics "The Future of the Criminal Mind: Cryptocurrency and the Dark Web," and "Illicit Activityin the Free Trade Zones."  

 

In changing direction, she founded her business, "DeVille and Associates," a forensic consulting and interagency training firm. She has been consulting and training focusing on illicit topics such as cyber technology, cyber forensic psychology, cognitive and dark psychology, sexual deviance, and human trafficking.  

 

Melissa is a Ph.D. candidate in Cognitive Psychology at Grand Canyon University. Her dissertation topic is "A Case Study of Ineffective Legislation: Moral Panic and the Sex Offender Registry." Melissa also holds a master's degree in Safety Management with an additional emphasis in Criminology and a bachelorette degree in Criminology with a minor in abnormal psychology from the University of Tennessee, Knoxville.

 

Lastly, Melissa holds many recognitions, Psi Chi National Honorary Society (Ph.D. level), Alpha Chi National Honor Society (Ph.D. level), recognition of research on "Violence Against Women in the South," nomination for a distinguished faculty member for five consecutive years, and a letter of commendation for dedicated work on a sex offender case.


Pre-Payment is not required to register or attend IN-PERSON seminars. Pre-payment is required for WEBINARS and ONLINE COURSES.

CLICK HERE TO REGISTER FOR THIS SEMINAR



Course Objectives

The criminal mind never sleeps and is constantly advancing with technology. This introductory course will review the use of cyber technology looking at social networking* sites such as Facebook, Instagram, Tumblr, Twitter, Google+, Telegram, Omegle, and others in understanding criminal behavior and social networking sites, and cell phone technology*. Within cell phone technology investigative techniques, investigations techniques will range from cell phone apps to cell phone tower tracking protocols. Social networking sites and cell phones have expanded cyber crimes and created new channels for sharing information that could also be utilized by law enforcement to investigate crimes and identify suspects. This course does include child abuse and other illicit activities as case studies and examples. This course does include P2P investigations, proactive chat investigations, search and seizure protocols with courtroom testimony, gaming platforms, and much more.

(*Course will not be taught in necessarily the same order as listed below and in outline) (2-day event)

Upon Completion:

Participants will be able to:

1. Common crimes committed on social networking sites.

     a. The use of "bots."

     b. Artificial intelligence in gathering data.

2. Understand the basic steps for preserving a profile.

    a. Identifying its creator.

    c. Gather profile information.

3. Review social networking artifacts.

    a. Obtain evidence from servers.

4. Capture live digital evidence from computers and networks using opensource internet tools.

5. Perform live router interrogations.

    a. Use router interrogations to find evidence on computers.

    b. Copy RAM contents, Analyze routers at the scene.

6. Search and seizure protocols on digital evidence and courtroom testimony.

7. Understand and define the basic terms related to investigating cyber crimes.

8. Understand and explain IP addresses.

     a. Including dark web and virtual private networks (VPNs)

     b. Capture IP addresses and URL’s

9. Describe the links between social networking sites and the acceleration of crimes.

     a. Telegram, Omegle, Chat investigations, gaming platforms.

10. Understand the role of sextortion and online gaming platforms using social networking sites and cell phones.

11. Employ specific techniques and evolving tactics for successful cyber investigations.

12. Learn how to intercept digital evidence.

     a. Learn the importance of securing metadata when intercepting evidence.

13. Search and seizure protocols.

     a. Seizing both electronic and digital evidence and courtroom testimony.

     b. Current case laws

14. Learn how to intercept digital evidence.

     a. Metadata, cell phone records, tower records, cell phone data.

15. How to conduct peer-to-peer (P2P) investigations.

a. Proactive chat investigations.



Register for this Seminar | Return to Schedule |


 




SEARCH ALL PATC SITES
 
 
 
 


CONFERENCES

Las Vegas Winter Conference
November 29 - December 10, 2021


PATC LEGAL ARTICLES
 

View Legal Article Archive

 

FREQUENTLY ASKED QUESTIONS
 

Click Here to See Our FAQ!

 


ARTICLE ARCHIVES

Legal Updates
Internal Affairs

Click below to sign up for
emails and brochures!

E-Newsletter
PATC Mailing List



Public Agency Training Council - 5235 Decatur Blvd - Indianapolis, IN 46241 - 800.365.0119

About PATC | PATC Publishing/Bookstore | Training Partners | E-Newsletter | Contact Us | Home | Site Terms of Use Policy