Cellebrite Social Network Investigations (CSNI) Course

Image: Social Media Investigations Training for Law Enforcement

Button: Download CSNI Syllabus

Level - Intermediate

Course Length: 4-Days

Cost of CSNI: $1,995 USD - Instructor-Led

RESTRICTED TO LAW ENFORCEMENT AND PROSECUTORS ONLY

Button: Find CSNI Class

By passing an examination in this course, you will earn certification in Cellebrite Social Network Investigations.

The Cellebrite Social Network Investigations (CSNI) course is a 4-day program designed for technically savvy investigators, digital evidence analysts, and forensic practitioners. This course provides students with an introduction to social media investigations to include pre-seizure actions and basic investigative techniques. Students will learn how to create undercover accounts and use open source intelligence to gather information from publicly available information from social networks such as Facebook, Twitter, Periscope, and more.

Using real life application and comprehensive instruction on legal processes (subpoenas, orders, warrants), students will learn how to identify and contact suspects. To complete the workflow, students will learn how to seize devices for extraction and how to work with the data that is returned from forensic examinations. Students will also learn methods to deconflict their cases from other law enforcement officers. As the course progresses, students will be exposed to tools and techniques to collect social media evidence from devices and cloud data sources (UFED Touch and Cloud Analyzer). Students will earn a CSNI certificate documenting satisfactory completion of a knowledge exam with a score of 80% or better.

The CSNI course is comprised of the following modules and lessons:

1. Introduction

2. Social Media Basics

  • Definitions of social media
  • Popular social media networks and applications
  • Popular online ad services
  • Usefulness of social media networks
3. Undercover Accounts
  • Introduction to resources, and tools used for undercover social media investigations.
  • Creating and properly documenting an undercover email address
  • Guidelines for using undercover photos
4. Undercover Smart Phone
  • Activating an undercover smartphone
  • Loading prepaid minutes
  • Integrating undercover accounts
  • Downloading social media network applications
5. Entrapment
  • Definitions of entrapment and predisposition
  • Identifying ongoing patterns of conduct
  • Proper undercover pace and tone
  • Examples of entrapment
6. Undercover Device Evidence
  • Necessity of proper evidence extraction
  • Identifying evidence unique to the device
  • Identifying evidence that may exist on offsite servers
  • Benefits of using Cloud Analyzer to supplement a device extraction
7. Open Source Intelligence
  • Manual web-based searches
  • Third-party search engines
  • Email and Cellular queries
  • Darkweb and TOR
8. Consensual Account Reviews
  • Necessity of proper evidence extraction
  • Identifying evidence unique to the device vs server
  • UFED overview
  • Benefits of using Cloud Analyzer to supplement a device extraction
9. Social Media Data & Legal Process
  • The Electronic Communications Privacy Act (ECPA)
  • Categories of stored data and provider retention rates
  • User notification policies by Internet Service Providers (ISPs)
  • Law Enforcement Portals and legal process submission
10. Subpoenas
  • Definition of subscriber data
  • Use and drafting of subpoenas
  • Requirements and authority of subpoenas
  • Practical exercise issuing a proper subpoena
11. Transactional Data
  • Definition of transactional data
  • Use and drafting of court orders
  • Requirements and authority of court orders
  • Examples of assorted court orders
12. Stored Content & Communications
  • Definition of content and communications
  • Use and drafting of social network or cloud search warrants
  • Requirements and authority of search warrants
  • Examples of assorted social network and cloud search warrants
13. Investigations Involving Exigency & Children
  • Definition and examples of exigency
  • Obtaining social media data under exigent circumstances
  • The National Center for Missing and Exploited Children
  • Resources for intelligence and analytical assistance during emergencies

RESTRICTED TO LAW ENFORCEMENT AND PROSECUTORS ONLY

Button: Find CSNI Class


Last modified: Wednesday, 17 May 2017, 11:45 AM