Investigating Social Networks (CSNI)

shield 

4 days
Intermediate-level course

The Investigating Social Networks (CSNI) course is a 4-day program designed for technically savvy investigators, digital evidence analysts, and forensic practitioners. This course provides students with an introduction to social media investigations to include pre-seizure actions and basic investigative techniques. Students will learn how to create undercover accounts and use open source intelligence to gather information from publicly available information from social networks such as Facebook, Twitter, Periscope, and more.

RESTRICTED TO LAW ENFORCEMENT AND PROSECUTORS ONLY



Course Content

sidebar image 
Social Media Basics
  • Definitions of social media
  • Popular social media networks and applications
  • Popular online ad services
  • Usefulness of social media networks
sidebar image 
Undercover Accounts
  • Introduction to resources, and tools used for undercover social media investigations
  • Loading prepaid minutes
  • Integrating undercover accounts
  • Downloading social media network applications
sidebar image 
Undercover Smart Phone
  • Activating an undercover smartphone
  • Loading prepaid minutes
  • Integrating undercover accounts
  • Downloading social media network applications
sidebar image 
Entrapment
  • Definitions of entrapment and predisposition
  • Identifying ongoing patterns of conduct
  • Proper undercover pace and tone
  • Examples of entrapment
sidebar image 
Undercover Device Evidence
  • Necessity of proper evidence extraction
  • Identifying evidence unique to the device
  • Identifying evidence that may exist on offsite servers
  • Benefits of using UFED Cloud to supplement a device extraction
sidebar image 
Open Source Intelligence
  • Manual web-based searches
  • Third-party search engines
  • Email and Cellular queries
  • Darkweb and TOR
sidebar image 
Consensual Account Reviews
  • Necessity of proper evidence extraction
  • Identifying evidence unique to the device vs server
  • UFED overview
  • Benefits of using UFED Cloud to supplement a device extraction
sidebar image 
Social Media Data & Legal Process
  • The Electronic Communications Privacy Act (ECPA)
  • Categories of stored data and provider retention rates
  • User notification policies by Internet Service Providers (ISPs)
  • Law Enforcement Portals and legal process submission
sidebar image 
Subpoenas
  • Definition of subscriber data
  • Use and drafting of subpoenas
  • Requirements and authority of subpoenas
  • Practical exercise issuing a proper subpoena
sidebar image 
Transactional Data
  • Definition of transactional data
  • Use and drafting of court orders
  • Requirements and authority of court orders
  • Examples of assorted court orders
sidebar image 
Stored Content & Communications
  • Definition of content and communications
  • Use and drafting of social network or cloud search warrants
  • Requirements and authority of search warrants
  • Examples of assorted social network and cloud search warrants
sidebar image 
Investigations Involving Exigency & Children
  • Definition and examples of exigency
  • Obtaining social media data under exigent circumstances
  • The National Center for Missing and Exploited Children
  • Resources for intelligence and analytical assistance during emergencies
Last modified: Tuesday, May 19, 2020, 9:04 AM