The decisions made by first responders and detectives can either make or break sometimes sensitive investigations into internet-based crimes such as fraud, sexting, cyber bullying, predatory sexual behaviors, stalking, etc. Intended for both patrol and investigations, this course will address ways in which officers can obtain crucial information and evidence in these cases, how due process paperwork is set into motion, and the investigative responses that are critical in the successful handling of these complaints.
- Social networks and the information contained in them
- Searching live hard drives for pictures and videos
- Searching social networks for suspected criminal activity
- Obtaining IP’s, screen names, e-mail headers, Facebook user ID’s and cell phone data for investigations
- Writing subpoenas and search warrants for social networking sites
- Laws concerning computer tampering, stalking, computer fraud, identity theft, harassment through electronic communications, sexting, indecent solicitation of a child sexual exploitation of a child, and child pornography
- Computer and cell phone forensics: When is it appropriate to seize these items?
- Differences in charging Harassment through Electronic Communication and cyber-stalking
- When is it appropriate and not appropriate to contact suspects in any of these cases?
- Cell phone applications and how people are using them today
** Participants need to bring a laptop.