Certificate Request Each session sticker location must be filled with a sticker from the lecture or lab the participant attended. Please turn in this page prior to departure. A location for turn in will be designated before the end of the last session. All below items must be completed to receive a certificate. Name: Agency Name: Phone Number: Email Address: Session Sticker Session Sticker Session Sticker Session Sticker Session Sticker Session Sticker Session Sticker Session Sticker 11 The 2014 ICAC Symposium is Hosted by A special thank you to Fox Valley for the computer labs, instructors, and symposium support personnel. Additional Appreciation for Others who Also Provided Trainers 1 Florida Department of Law Enforcement Missouri ICAC 7th Judicial Circuit NCMEC BlueBear LES, Inc. NetClean Brevard County SO Nuix Broward County SO NW3C Cobb County Police Office of State Attorney Connecticut State Police Pinellas County SO Embry Riddle SEARCH Facebook Snapchat, Inc. FL Dept. of Juvenile Justice South Central Missouri SO Gainesville PD Tallahassee Fire Department Henderson PD Tallahassee Police Department HSI TLO Magnet Forensics University of Massachusetts DO NOT WRITE ON THIS PAGE You will turn it in at the end of the symposium Manatee County SO 22 NOTES ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ Registration ___________________________________________________________________________________ Classes ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ Classes ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ 17 2 33 NOTES ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ 3 16 44 Color Key Wednesday Afternoon — December 17, 2014 Regency 8 Palm 1 Room 8:00 — 9:45am INTRODUCTION TO TECHNOLOGY FACILITATED CRIME PROSECUTION Covered are the three common types of cases investigators and prosecutors will encounter and the role technology plays in the exploitation. It also reviews the power of social media and its role in TFCSE cases and some of the characteristics of offender behavior associated with TFCSE. DEALING WITH ENCRYPTION Recently, case law in the Federal courts and the Massachusetts highest State Court has provided a means by which the 5th amendment protection may be overcome. This lecture will cover the uses of encryption, forensic attacks to that encryption, and the case law and practical tools for building a strong case are discussed. Regency 3 INTERVIEWING OFFENDERS (repeated Wed 1500) Students will be provided with interview strategies along with using themes in their interviews. This block will focus on interviewing offenders who have traveled to engage in sex with a minor. Additionally students will learn how to overcome common defense issues associated with the arrest of “travelers”. Regency 4 SOCIAL MEDIA INVESTIGATIONS (repeated Wed 1000) Because social media evolves daily, law enforcement and advocates must stay current with the latest developments in order to properly utilize it from their investigations to their community services perspective. SUPERVISORS’ ICAC OVERVIEW An overview of ICAC investigations, equipment, training, and guidelines that supervisors should be aware of. This course will also include a discussion highlighting how to get involved at a sustainable level proportional to agency size. Regency 5 Regency 2 Regency 1 KATANA FORENSICS Vendor - Mobile Phone Forensics post SCOTUS, Apple and Google. How the landscape has changed and what are the pitfalls and the future of cell phones and investigations. ROUNDUP ARES REFRESHER Designed for experienced P2P Investigators, this training will provide an update on using the RoundUp Ares tool. OSTRIAGE (repeated Tues 1300) (runs until 1130) OsTriage can extract operating system and registry details, USB device history, browser history of major browsers, search engine search terms, cloud storage applications, encryption, P2P and other applications, and passwords. It displays and categorizes images/videos based on a list of over 500,000 SHA's of interest and 300+ keywords. INVESTIGATING ARES WITH CPS (repeated Wed 1000) This lab will explain how Ares data is being incorporated into CPS and demonstrate adaptations to SharazaLE making it capable of collecting evidence from Ares users. This lab is designed for experienced peer-to-peer investigators. A CPS license is not required. 9:45 — 10:00am 15 Vendor Regency 6 Regency 6 GIGATRIBE INVESTIGATIONS (continued) Experience investigators will learn how to install, configure, and use the Gigatribe software to investigate the distribution of child pornography on the Gigatribe network. Evidence artifacts that are created during the use of the tools will be identified and explained. Digital trace evidence will be identified and discussed. Recommended For Supervisors Regency 7 Regency 5 SUSPECT VIEWER Designed for users of the Roundup Suite of Investigative P2P tools. Students will learn how the add-on program, Suspect Viewer, can integrate into their workflow and aid in the preparation of case documents. Recommended For Prosecutors Regency 8 Regency 3 Regency 4 USING UC CALLS Overview of the importance of undercover phone calls in online undercover operations to include best practices when conducting undercover phone calls. A case study will be discussed that was successful largely due to the undercover phone calls made throughout the investigations. Regency 7 INTERVIEWING OFFENDERS Students will be provided with interview strategies along with using themes in their interviews. This block will focus on interviewing offenders who have traveled to engage in sex with a minor. Additionally students will learn how to overcome common defense issues associated with the arrest of “travelers”. Lab Class Monday Morning — December 15, 2014 Palm 2 ETHICS AND SOCIAL MEDIA The unique responsibilities of those in the medical, legal, law enforcement, victim services, and advocacy fields are described to highlight common pitfalls of social media used by professionals. The attendees see examples pulled from various media sites that could cause ethical issues. Privacy issues are also addressed. Regency 2 Regency 1 Palm 2 Palm 1 Room 3:00 — 4:45am Training Class Break 4 55 Wednesday Afternoon — December 17, 2014 Monday Morning — December 15, 2014 Palm 1 ROUNDUP ARES FORENSIC ARTIFACTS This lab will familiarize attendees with the Ares file-sharing client. Students will install and use the program, then examine the digital trace evidence. The attendees will review a RoundUp Ares investigative session and the corresponding seized evidence. Regency 5 EPHEX (continued) Designed for beginner and Intermediate P2P investigators, this training will provide an overview of the Gnutella and Gnutella2 networks. Students will learn how to use the ePhex program to target offenders trading child abuse material on those networks. OSTRIAGE (continued from 0800) (repeated Wed 1300) OsTriage can extract operating system and registry details, USB device history, browser history of major browsers, search engine search terms, cloud storage applications, encryption, P2P and other applications, and passwords. It displays and categorizes images/videos based on a list of over 500,000 SHA's of interest and 300+ keywords. Regency 6 GIGATRIBE INVESTIGATIONS Experience investigators will learn how to install, configure, and use the Gigatribe software to investigate the distribution of child pornography on the Gigatribe network. Evidence artifacts that are created during the use of the tools will be identified and explained. Digital trace evidence will be identified and discussed. CHILD PROTECTION SYSTEM (CPS) UPDATE (repeated Tues 1300) Designed for currently licensed and experienced peer-to-peer investigators. Topics include new dashboard “perspectives” to provide triage assistance, IP-GUID-Username subscription / real-time notification, media library integration and more. This lab is for demonstration only. A current CPS license is not required. Regency 7 Palm 2 Regency 4 ETHICS AND SOCIAL MEDIA (repeated Wed 1500) The unique responsibilities of those in the medical, legal, law enforcement, victim services, and advocacy fields are described to highlight common pitfalls of social media used by professionals. The attendees see examples pulled from various media sites that could cause ethical issues. Privacy issues are also addressed. NEW TO NORTH FLORIDA For new investigators in the North Florida ICAC. This course is a mandatory familiarization course in the ICAC Standards, North Florida ICAC web portal, training and equipment opportunities, multi-agency operations, and general communications. LUNCH Regency 8 “THE BOY WHO NEVER CRIED WOLF” – A SURVIVOR’S PERSPECTIVE (repeated Tues 0800) From age four to fifteen Detective Jim Wischer survived more than ten years with a child predator. Detective Wischer offers a unique look into the home and mind of the victim and the predator, as well as the investigator’s perspective. Jim will be discussing his ordeal, his survival, and his experience as a CAC detective. Regency 3 Regency 2 Regency 1 Regency 4 LEGAL FOR SUPERVISORS Will show supervisors how to make legally sound decisions when investigating ICAC cases and help to ensure that their agency and investigators comply with the law. Regency 5 Palm 1 Regency 2 Regency 1 Regency 3 TUCAN—CRIMINALIZATION OF WI-FI ON ENCRYPTED PUBLIC HOTEL ACCESS POINT (HOT SPOT) A look at an intricate use of encrypted access points at a motel/hotel environment where the guest was able to download and consume child pornography using GNUTELLA/E-Donkey as well as communicate with potential victims using Skype without observation. Regency 6 WHITMORE CASE STUDY The suspect used multiple profiles to contact and extort girls all over the country. Detectives from 8 different departments worked on the investigation to completion and prosecute. Suspect faced federal charges for possession/ distribution of child pornography and extortion. PROSECUTING CASES WITH CPS DATA This presentation will focus on the use of CPS in trial: how to present it; what is discoverable evidence; how to build your suspect interview to corroborate the CPS data; and when all else fails, how to build a case solely on CPS data. 11:30am — 1:00pm 5 AUTHENTICATING DIGITAL EVIDENCE The attendees are shown case law examples for authenticating emails, chats, and other technological evidence. Also provided are examples of what type of witnesses are needed to lay the proper foundation for the admission of digital evidence. Regency 7 SEARCH AND SEIZURE: PART 1, PHYSICAL DEVICES Explored are the different types of search and seizure used in technology facilitated child sexual exploitation (TFCSE) cases. Attendees learn the differences between a consent search and a search warrant and discuss applicable cases for each. Common pitfalls with search procedures will also be discussed. Room 1:00 — 2:45am Regency 8 BLUE BEAR—USING LACE TO PROCESS CE CASES IN LESS TIME WITH LESS STRESS – lecture During the presentation, we will fully process a sample CE case including: Carving Evidence, Importing Images and Video Files, Analyzing Results, Categorizing Unknown Files, Searching for Known Victims, and Preparing Reports for Court. Palm 2 Room 10:00 — 11:30am CASE LAW UPDATES Designed for experienced investigators (either supervisory or non-supervisory), this course, we discuss recent and important developments in case law that pertain to ICAC cases. INTRODUCTION TO VICTIM ID Provided will be an overview of victim identification methods and processes. Covered will be how to analyze child exploitation images and videos to identify and rescue the child(ren), apprehend the offender(s), and identify/locate the crime scene(s). Enhancing and manipulating material while maintaining the evidentiary integrity is discussed. UC PHOTOS This course will provide the latest changes to the ICAC directives pertaining to undercover photography. Topics include photo manipulation techniques to age regress photos and the apps to do so, the pros and cons of using an adult that looks underage or using a child photo of an adult, and some case studies. 2:45 — 3:00pm Break 14 66 Monday Afternoon — December 15, 2014 Wednesday Morning — December 17, 2014 Palm 1 MEDIA SONAR – SOCIAL MEDIA MONITORING Vendor Real world case studies will examine the impact and involvement of social media in active shooter scenarios (schools), cyberbullying/self-harm, sexting, and youth-oriented riots. A facilitated discussion on human trafficking will also be included to look at trends in this emerging topic. Palm 2 SEARCH AND SEIZURE: PART 2, CLOUD AND CYBERSPACE Attendees will learn what cloud computing is and how it works and will be shown the necessary steps to preserve, seize and search evidence in the cloud. Investigators and prosecutors will gain information to understand when the Electronic Communications Privacy Act and the Privacy Protection Act apply. Regency 4 DARKNETS Anonymous networks are popular for sharing child abuse material, and they present new challenges to law enforcement. This talk provides an overview of anonymous networks such as Tor and Freenet. Regency 4 PROSECUTING TRAVELERS (repeated Tues 1000) The presenter will explain best practices learned and discuss how the developing case law may affect investigations and prosecutions in the future. There will be a focus on trial presentation and how to combat popular defenses including entrapment. EPHEX (continued—runs until1445) Designed for beginner and Intermediate P2P investigators, this training will provide an overview of the Gnutella and Gnutella2 networks. Students will learn how to use the ePhex program to target offenders trading child abuse material on those networks. Regency 5 INTRODUCTION TO FREENET (part 1) A hands-on introduction to Freenet and the messaging system Frost. Freenet is a peer-to-peer Internet network regularly used to distribute and download child abuse material. The sessions will include the opportunity to install Roundup Freenet and Frost and explore the material. ROUTER INTERROGATION / PORTS (continued This lab will provide instruction in the operation and configuration of four different wireless routers. Students will have hands on experience in interrogating these wireless routers. Freeware wireless tools and commercially available tools will be utilized to locate wireless routers. Regency 6 ROUNDUP BITTORRENT REFRESHER Designed for experienced P2P Investigators, this training will provide an update on using the RoundUp BitTorrent tool. INVESTIGATING ARES WITH CPS This lab will explain how Ares data is being incorporated into CPS and demonstrate adaptations to SharazaLE making it capable of collecting evidence from Ares users. This lab is designed for experienced peer-to-peer investigators. A CPS license is not required. Regency 7 11:30am — 1:00pm 13 Regency 8 Regency 8 “THE BOY WHO NEVER CRIED WOLF” – A SURVIVOR’S PERSPECTIVE From age four to fifteen Detective Jim Wischer survived more than ten years with a child predator. Detective Wischer offers a unique look into the home and mind of the victim and the predator, as well as the investigator’s perspective. Jim will be discussing his ordeal, his survival, and his experience as a CAC detective. Regency 3 Regency 2 Regency 1 Regency 2 Regency 1 Regency 3 FUNDAMENTALS OF JTAG AND CHIP-OFF FOR THE MOBILE DEVICE FORENSIC EXAMINER Vendor - Learn about JTAG and Chip-off techniques as well as related practices and how each can assist the examiner in acquiring data from mobile devices that are otherwise inaccessible. Covered will be the fundamentals and advantages of both practices; where each is applied, and cost considerations for implementation. Regency 5 INVESTIGATING HUMAN TRAFFICKING This presentation is designed to raise awareness of the problem of Human Trafficking here in Florida. Recent cases and trends will be discussed as well as myths relating to Human Trafficking. All forms of Human Trafficking will be discussed as well as recent statutory changes that affect investigating Human Trafficking. SOCIAL MEDIA INVESTIGATIONS Because social media evolves daily, law enforcement and advocates must stay current with the latest developments in order to properly utilize it from their investigations to their community services perspective. Regency 6 OVERCOMING UNTRUE DEFENSES This presentation covers the most common defenses raised in technology-facilitated child sexual exploitation cases and strategies for defeating them. Room 1:00 — 2:45am Regency 7 Palm 2 Palm 1 Room 10:00 — 11:30am LUNCH THE UTILITY OF POLYGRAPH IN ICAC INVESTIGATIONS (repeated Wed 0800) The polygraph is an under-utilized investigative tool. Research and case studies show that the early use of polygraph in online child sexual exploitation investigations is an effective method of gathering information and uncovering previously undetected offenses of child sexual assault. TASK FORCE CONSIDERATIONS FOR WARRANT SERVICES A multi-agency task force…which agency’s policies govern you? Who comprises the chain of command? What are the minimum training standards? Who is going to have the documents needed to insulate you from civil liability? If you do not immediately know the answers to these questions then this session might benefit you. MAC ONLINE TOOLS (runs until 1645) Students will be provided with how to install and use Mac OS specific tools during your investigation. Some of the tools are open source, some are native to the Mac OS and others are paid tools. During this class the Mac OS along with utilizing short cuts within the OS will be shown and discussed. 2:45 — 3:00pm Break 6 77 Wednesday Morning — December 17, 2014 Monday Afternoon — December 15, 2014 KATANA FORENSICS MAC ONLINE TOOLS (continued from 1300) Students will be provided with how to install and use Mac OS specific tools during your investigation. Some of the tools are open source, some are native to the Mac OS and others are paid tools. During this class the Mac OS along with utilizing short cuts within the OS will be shown and discussed. Vendor - Mobile Link Analysis, Hash Set Analysis and Call Detail Records. Palm 1 Palm 2 Regency 3 Regency 2 Regency 1 Regency 6 ROUNDUP BITTORRENT FORENSIC ARTIFACTS This lab will familiarize attendees with the BitTorrent file-sharing client. Students will install and use the program then examine the digital trace evidence. The attendees will review a BitTorrent investigative session and the corresponding seized evidence. THE UTILITY OF POLYGRAPH IN ICAC INVESTIGATIONS The polygraph is an under-utilized investigative tool. Research and case studies show that the early use of polygraph in online child sexual exploitation investigations is an effective method of gathering information and uncovering previously undetected offenses of child sexual assault. Regency 4 Regency 5 INTRODUCTION TO FREENET (part 2) A hands-on introduction to Freenet and the messaging system Frost. Freenet is a peer-to-peer Internet network regularly used to distribute and download child abuse material. The sessions will include the opportunity to install Roundup Freenet and Frost and explore the material. INTRODUCTION TO MOBILE DEVICE DATA RECOVERY Students will be introduced to key terminology in relation to mobile device systems, proper collection and seizure procedures, and important steps to preserve evidence on mobile devices such as cell phones, tablets, and portable game units. NETCLEAN VISUAL DATA EXAMINATION This software is specifically designed to manage, investigate, and analyze images and video files. It streamlines the workflow by minimizing the gap between computer forensics and image/video forensics hence reducing the examiner’s workload. A preview of the 2015 version will highlight new features that will raise eyebrows! Regency 5 Regency 4 MAC IMAGING AND TRIAGE Attendees gain basic skills to navigate and utilize both the graphical and command line interfaces of Mac OS X. Focus will be the identification and collection of volatile data. Attendees will also be familiarized with the methods for forensically imaging a Mac and become aware of the unique challenges this presents. PROJECT VIC: THE MASS DATA PROBLEM, A GLOBAL INITIATIVE Current tools and methods of deconfliction are largely inefficient at dealing with massive collections of image and video data. You will learn about Project VIC which puts together an ecosystem of tool taking advantage of PhotoDNA, Visual Similarity Search, Robust Hash Technologies, Media Categorization, etc. EPHEX (runs until1445) Designed for beginner and Intermediate P2P investigators, this training will provide an overview of the Gnutella and Gnutella2 networks. Students will learn how to use the ePhex program to target offenders trading child abuse material on those networks. Regency 6 Regency 3 USING YOUR IFAK FOR EMERGENCY SELF AND BUDDY MEDICAL AID Taken from the concepts taught to deploying soldiers and developed from Tactical Combat Casualty Care, it teaches the importance of self-aid, early treatment and knowing the equipment on hand. I teach the importance of hemorrhage control and staying in the fight until assistance can arrive. CROSS EXAMINING DEFENSE EXPERTS Provided are tips and examples of ways to cross examine defense experts in cases involving technology-facilitated crimes against children. Attendees learn possible ways to defeat some of the more common defenses that are often raised by experts. ROUTER INTERROGATION / PORTS (runs until 1130) This lab will provide instruction in the operation and configuration of four different wireless routers. Students will have hands on experience in interrogating these wireless routers. Freeware wireless tools and commercially available tools will be utilized to locate wireless routers. Regency 7 Regency 2 Regency 1 FACEBOOK: WORKING WITH LAW ENFORCEMENT TO PROTECT CHILDREN Discussed during this presentation will be Facebook “basics”, the latest safety and privacy controls available to prevent and reduce risks for users of the site, safety initiatives designed to combat crimes, and a detailed review of Facebook’s on-line records request system for law enforcement use. Regency 7 LEGAL UPDATES This lecture focuses on some of the main concerns and issues that may be encountered during the investigation and prosecution phases of a technology-facilitated child sexual exploitation. Room 8:00 — 9:45am BLUESTACKS Students will be shown how to install and use the Bluestacks android cell phone emulator program. This program allows law enforcement to use applications like Kik, Instagram and others on their desktop or laptop computers utilizing the Google Play Store. Regency 8 PEN-LINK XNET – ANALYSIS TOOL FOR IP INVESTIGATIONS - vendor Xnet can save countless hours when analyzing thousands of emails/messages from providers like Yahoo, Gmail, Hotmail, Facebook, WhatsApp, Apple iMessage, even Blackberry Messenger, and many more. There are a number of ways to use Xnet, including a variety of functions to accommodate each investigations. Regency 8 Palm 2 Palm 1 Room 3:00 — 4:45am UC PHOTOS (repeated Wed 1300) This course will provide the latest changes to the ICAC directives pertaining to undercover photography. Topics include photo manipulation techniques to age regress photos and the apps to do so, the pros and cons of using an adult that looks underage or using a child photo of an adult, and some case studies. 9:45 — 10:00am 7 Break 12 88 Tuesday Morning — December 16, 2014 Tuesday Afternoon — December 16, 2014 Palm 1 Palm 2 Regency 3 CASE STUDY ON SHUHEL ALI, “INTERNATIONAL CHILD PREDATOR” (repeated Tues 1500) Ali travelled from Manchester England to Brevard County Florida for the purpose of impregnating a 13-year-old victim and starting his own incestuous family. Ali intended to father and sexually abuse this child from birth. During the operation Ali traveled to numerous countries sexually abusing minor children. This case study is very graphic. “THE BOY WHO NEVER CRIED WOLF” – A SURVIVOR’S PERSPECTIVE (repeated Wed 1000) From age four to fifteen Detective Jim Wischer survived more than ten years with a child predator. Detective Wischer offers a unique look into the home and mind of the victim and the predator, as well as the investigator’s perspective. Jim will be discussing his ordeal, his survival, and his experience as a CAC detective. Regency 4 Regency 2 Regency 1 TIPS FOR TESTIFYING This interactive presentation provides concrete suggestions for enduring the witness stand. The attendee learns the difference between direct and cross-examination, as well as common defense attorney tactics intended to destroy witness credibility. CYBERTIP SUPERVISION Analysts of the Exploited Children Division (ECD) of NCMEC process reports received on child sexual exploitation through the CyberTipline and disseminate the leads to Federal, state, local, and international law enforcement agencies for further investigation. They also provide technical assistance investigating child exploitation. Regency 5 Regency 5 Regency 6 Regency 7 BLUE BEAR—USING LACE TO PROCESS CE CASES IN LESS TIME WITH LESS STRESS – lab During the lab, we will fully process a sample CE case including: Carving Evidence, Importing Images and Video Files, Analyzing Results, Categorizing Unknown Files, Searching for Known Victims, and Preparing Reports for Court. Regency 8 OSTRIAGE (continued from 1300) OsTriage can extract operating system and registry details, USB device history, browser history of major browsers, search engine search terms, cloud storage applications, encryption, P2P and other applications, and passwords. It displays and categorizes images/videos based on a list of over 500,000 SHA's of interest and 300+ keywords. PRE-TRIAL DECISIONS This presentation discusses the various methods to charge TFCSE cases and provides information on forensic artifacts that will assist in proving intent and knowledge. Discussed will be different types of pre-trial motions to educate the court and provide for a more efficient trial. PROACTIVE INVESTIGATIONS USING INTERNET EVIDENCE FINDER (IEF) (repeated Tues 1000) Look at new features and artifact support. New user will be walked through an Internet Child Exploitation and Luring case and we’ll demonstrate how IEF can help you find relevant evidence. There will also be open discussion on features you would like to see us add. Regency 6 INTRODUCTION TO MOBILE DEVICE DATA RECOVERY (repeated Wed 0800) Students will be introduced to key terminology in relation to mobile device systems, proper collection and seizure procedures, and important steps to preserve evidence on mobile devices such as cell phones, tablets, and portable game units. PERPHOUND Attendees will see a live demonstration of Perphound and how it can be used for analyzing and plotting detail records from various service providers. ROUNDUP EMULE REFRESHER Designed for experienced P2P Investigators, this training will provide an update on using the RoundUp eMule tool . Regency 7 ANALYZING CHILD EXPLOITATION EVIDENCE WITH NUIX INVESTIGATOR Vendor - This class is designed to show digital forensic examiners how to best leverage the power and capabilities of Nuix Investigator during child sexual exploitation examinations. The Nuix methodology revolves around working smarter, not harder. ACTIONABLE HUMAN TRAFFICKING INTELLIGENCE - RESCUE OPS Open source intelligence approaches are yielding tremendous amounts of useful information about behaviors of human traffickers, location of victims, and patters of illicit trade. Our training teaches you how to target and identify human traffickers and recover victims using open source intelligence through Rescue Ops. Room 8:00 — 9:45am PACKET SNIFFING (runs until 1130) Provides an understanding into the operation of the Transmission Control Protocol/Internet Protocol (TCP/IP), reviewing basic terms and concepts, and introducing the operation of various TCP/IP communication and application protocols. Hands-on exercises will be used to reinforce the lecture topics. Regency 8 Palm 1 Regency 2 Regency 1 WHITMORE CASE STUDY (repeated Wed 1300) The suspect used multiple profiles to contact and extort girls all over the country. Detectives from 8 different departments worked on the investigation to completion and prosecute. Suspect faced federal charges for possession/ distribution of child pornography and extortion. Regency 3 DIRECT EXAMINATION OF A COMPUTER FORENSIC EXAMINER The focus is on the fundamentals of presenting a forensic examiner at trial. Highlighted are possible exhibits that prosecutors can use to help explain technology devices and computer forensics during the foundation portion of the examination. Tips for effectively presenting computer forensic evidence at trial are provided. Regency 4 CASE STUDY ON SHUHEL ALI, “INTERNATIONAL CHILD PREDATOR” Ali travelled from Manchester England to Brevard County Florida for the purpose of impregnating a 13-year-old victim and starting his own incestuous family. Ali intended to father and sexually abuse this child from birth. During the operation Ali traveled to numerous countries sexually abusing minor children. This case study is very graphic. Palm 2 Room 3:00 — 4:45pm 9:45 — 10:00am 11 Break 8 99 Tuesday Afternoon — December 16, 2014 Tuesday Morning — December 16, 2014 MAC 101 Students will be exposed to Apple computers at an entry level. This class in intended to those individuals who are new to the Mac OS or Apple hardware. Students will also be provided with Mac OS shot cuts and comparisons between the Mac OS and Windows OS. 11:30 — 1:00pm 9 Lunch Palm 1 Palm 2 Regency 3 Regency 2 Regency 1 FACES - FACIAL RECOGNITION FOR LAW ENFORCEMENT FACES provides the ability to search images through a facial database consisting of over 30 million records including mug shot and driver’s license photos for investigative purposes. Regency 4 PACKET SNIFFING (continued from 0800) Provides an understanding into the operation of the Transmission Control Protocol/Internet Protocol (TCP/IP), reviewing basic terms and concepts, and introducing the operation of various TCP/IP communication and application protocols. Hands-on exercises will be used to reinforce the lecture topics. SOCIAL NETWORK INVESTIGATIONS AND TECHNOLOGY TOOLS Provided will be information on social networking websites useful to investigations and how to effectively search those sites. Also covered is using Google Advanced Operators and techniques to capture profiles for evidentiary purposes. Legal consideration as well as techniques to protect investigators will also be discussed. TECH INV 101 - TRACING IP ADDRESSES We’ll review terms and concepts, introduce the structure of the Internet and TCP/IP communication protocols, IP addressing, and the use of anonymizers. We’ll also examine higher-layer protocol issues, and their related tools, to include domain names and IP address blocks, tracing the route of packets, Web sites, e-mail, and social networks. Regency 5 Regency 5 ROUNDUP EMULE FORENSIC ARTIFACTS This lab will familiarize attendees with the eMule file-sharing client. Students will install and use the program, then examine the digital trace evidence. The attendees will review an eMule investigative session and the corresponding seized evidence. Regency 8 PROACTIVE INVESTIGATIONS USING INTERNET EVIDENCE FINDER (IEF) Look at new features and artifact support. New user will be walked through an Internet Child Exploitation and Luring case and we’ll demonstrate how IEF can help you find relevant evidence. There also will be open discussion on features you would like to see us add. Regency 6 DARKNETS (repeated Wed 1000) Anonymous networks are popular for sharing child abuse material, and they present new challenges to law enforcement. This talk provides an overview of anonymous networks such as Tor and Freenet. COMPUTER FORENSICS FOR PROSECUTORS - PART 2 Digital evidence is pervasive in today’s criminal trials making it imperative that prosecutors understand the intricacies of computer forensics. This presentation covers the fundamentals of computer forensics and discusses the many forensic artifacts that are useful to prove up a variety of criminal charges. NCMEC LESP An online resource for law enforcement and prosecutors from NCMEC’s Exploited Children Division. The Hash Search and the CVIP Reference Guide will be discussed and demonstrated...including user shortcuts. Regency 6 SNAPCHAT This session will provide practical information on Snapchat’s functionality as well as policies and procedures for submitting legal process and requesting user information. APPLE IDEVICE FORENSICS Attendees will become familiar with the acquisition and analysis of data from non-iOS devices (iPod Classic, Nano, and Shuffle) and with the methods of acquiring data from iOS devices (iPod Touch, iPhone, and iPad). Also provided are techniques to analyze potential evidence from iOS devices. OSTRIAGE (runs until 1645) OsTriage can extract operating system and registry details, USB device history, browser history of major browsers, search engine search terms, cloud storage applications, encryption, P2P and other applications, and passwords. It displays and categorizes images/videos based on a list of over 500,000 SHA's of interest and 300+ keywords. Regency 7 Regency 3 TAKING DOWN A HUMAN TRAFFICKING RING DEALING IN CHILDREN A look into the joint investigation of ExecutiveModels.net and how law enforcement was able to build a case against not just the Pimp/Agency Owner, but also the Agency’s Photographer and one of the Agency’s VIP Clients in an effort to combat the commercial sexual exploitation of children. Regency 7 Regency 4 CASE STUDY – MINOR FEMALE AND YOUTH PASTOR The victim will provide information about the grooming, emotions, and law enforcement interactions with her about the case were her church’s youth pastor groomed her for sex, was arrested with a no contact order, yet contacted Room 1:00 — 2:45am CHILD PROTECTION SYSTEM (CPS) UPDATE Designed for currently licensed and experienced peer-to-peer investigators. Topics include new dashboard “perspectives” to provide triage assistance, IP-GUID-Username subscription / real-time notification, media library integration and more. This lab is for demonstration only. A current CPS license is not required. Regency 8 Palm 1 COMPUTER FORENSICS FOR PROSECUTORS - PART 1 Digital evidence is pervasive in today’s criminal trials making it imperative that prosecutors understand the intricacies of computer forensics. This presentation covers the fundamentals of computer forensics and discusses the many forensic artifacts that are useful to prove up a variety of criminal charges. Regency 2 Regency 1 PROSECUTING TRAVELERS The presenter will explain best practices learned and discuss how the developing case law may affect investigations and prosecutions in the future. There will be a focus on trial presentation and how to combat popular defenses including entrapment. Palm 2 Room 10:00 — 11:30am BEYOND POWERPOINT: CREATING ENGAGING PRESENTATIONS Provided is a response to the self-peer exploitation (sexting) issue. Attendees will be provided with links to download presentations and a mobile app targeting youth and presenting humor as a strategy to deal with the pressure to send intimate images. 2:45 — 3:00pm Break 10 10 10
© Copyright 2024