tag_line
Online Investigation & Tracking of Cyber Predators & Registered Sex Offenders
Number: 735
MemberFee: No Fee for Member Agencies, $325 Fee for Non-Member Agencies
Contact: MTU 8 Members - Register with MTU 8 @ 309-268-8430, mtu8training@heartland.edu or www.mtu8.com

Non-Members - Register with Public Agency Training Council online at: www.patc.com
Objectives:

Internet crimes against children are arguably among the most under-reported and rapidly growing types of crimes.

This course is designed to provide law enforcement with practical knowledge and skills to investigate and successfully prosecute Cyber Predator’s and Child Pornography Crimes

The Questions That Will Be Answered:

Who?
• Who is the victim?
• Who are the criminals?
• Who should be investigating?

What?
• What are the criminals doing?
• What technologies/websites are the criminals using?
• What resources/technologies are available to law enforcement?
• What unique legal issues are crucial for a successful prosecution?

Where?
• Where is the crime scene?
• Where can law enforcement get help?
• Where are the sources of child pornography coming from?

How?
• How are criminals finding their victims?
• How is law enforcement finding the criminals?
• How does law enforcement setup an undercover operation?
• How does law enforcement find and trace internet addresses to physical addresses?

Specific Topics Covered in This Training Module Include:

Definitions: A list of terms and their definitions, specific examples, relevance, and their use in the criminal investigation of child pornography and cyber predators
Child Pornography ("Kiddie Porn"), Cyber Predator, Peer 2 Peer Network (P2P), Social Networking ("Social Engineering"), SHA1, Metadata, Internet Protocol Address (IP Address), and more...

Statistics: The surprising and sometimes alarming statistics that give "life" to the importance of this unique type of investigation.
Social Networking Phenomenon, accelerating scope of child porn, surprising "market" of child porn (and the "who's who" list of criminals), charged vs. successfully prosecuted - historical perspective.

The Successful Law Enforcement Response: Through lecture and hands on "live" application, the attendee will be exposed to a number of specific and successful techniques and evolving tactics unique to these types of investigations.

Child Pornography Investigation:
• Intercepting Child Pornography Evidence Online - how and where files are shared online; identifying / confirming files to be child pornography; the importance of securing Metadata when intercepting evidence to maintain file access history.
• Locating the Child Pornographer - creating the links between the electronic evidence and the web user's physical address.
• Legal Steps - Preparing the information needed when requesting court orders; legal requirements when writing a search warrant; prosecuting the defendant (federal, state and local cases).
• The Cyber Crime Scene and the Physical Crime Scene - the importance and application of specific investigative procedures for the online and on-location scene which lead to a greater number of successful prosecutions.
• Catching the Child Pornographer - hands on activities in conducting Peer-to-Peer and social networking investigations.

Cyber Predator Investigation:
• Social Networking Cyber Crime Scenes for Child Predators - how "Twitter, Instagram and Snapchat ," "Facebook" and other social networking sites are used by predators to find children
• Cyber Predators use of Chat rooms, Instant Messages, and Email - how these online utilities can present a unique set of challenges for investigators
• Investigating - how to "record" social networking sites; what to look for; current trends; behaviors of pedophiles and how they "groom" child victims; what can be considered evidence.
• Catching the Cyber Predator - how to setup an undercover profile on various websites; how to configure various chat / IM clients to archive (record) messages / discussions; how to video chat with any webcam; legal procedures for posing as a child; what you can do and what you can't

Instructor & Location Date/Time
03/04/19-
03/05/19
8:00 a.m. - 5:00 p.m.
Enroll