How To Solve A Violent Home Invasion With A United Force

Size: px
Start display at page:

Download "How To Solve A Violent Home Invasion With A United Force"

Transcription

1 Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone in a community, police included, on the edge. The investigators know they need to tie these crimes to an underlying motive, which experience has led them to suspect involves narcotics, gang or other organized criminal activity. Under pressure from the mayor, city council, media, and residents themselves, the investigators are prepared to deploy the right tools to identify key evidence from social media, mobile device data, detailed call records and other sources and to put a stop to the crimes. 1

2 In progress: Home invasion with assault Patrol officers respond to the scene of a Saturday night home invasion robbery with assault in progress. They apprehend two suspects fleeing the home on foot. As officers take them into custody, one of the suspects manages to throw his smartphone to the ground and crush it with his foot. Officers seize the other suspect s smartphone without incident as they are taking both individuals into custody, and they separately bag and tag each device as evidence. In the field: Background investigation Statements from the two victims, in which both independently confirm the suspects talking to each other about someone named Jiggy, lead officers to believe that the suspects were not acting on their own. Officers think this incident is another in the series of home invasions they ve been responding to. 2

3 At the station: The initial search Officers obtain a search warrant for the undamaged device and use a UFED Camera to photograph both devices as part of their evidence intake process. Based on collected statements, the officers warrant empowers them to bypass the device s password and search for all communications data, including call logs, text messages, and app data from the past week. Developing the first leads After bypassing the suspect s password, the UFED InField search reveals: A set of messages, which appear out of context or out of sequence, using a popular messaging app to communicate with Jiggy. Officers believe some messages have been deleted. Photos of the victims home from various angles. A series of call logs showing both sent and received calls from four other numbers. Officers compile their extraction report in UFDR format and submit it, together with the victims statements, their reports, both devices and the photographs, to their digital forensic lab. 3

4 At the lab: The follow-up search The forensic examiners validate the officers UFDR report using UFED Ultimate. They then obtain additional search warrants for each mobile device to extract deleted data and geolocation metadata from the same time frame, one week previously, as the original search warrant. From the undamaged device, examiners recover deleted message fragments from the messaging app and geolocation data consistent with not only the images of the home, but also with prior incidents. 4

5 Overcoming the challenge of a damaged device Examiners are able to extract data from the damaged device using JTAG methods. Decoding the data in UFED Physical Analyzer, they find: A clear link between the two suspects in the planning of the home invasion. Examiners notice that the address number is transposed in several of the messages sent by the second suspect. Additional fragments of messages with Jiggy via a different social media app. The messages include drug dealers lingo, but they are incomplete, and the provider is known to be hostile to law enforcement legal process. The examiners warn investigators that there is a risk the provider will not supply the messages at all, leaving the case without critical evidence. Developing the first leads Now believing this to be a case of mistaken identity, the officers obtain a new search warrant to use social media account credentials on both devices. UFED Cloud Analyzer shows that the social media messages with Jiggy explicitly refer to drug deals. They provide probable cause to arrest that individual, who investigators learn is a dealer in a neighboring community. Search warrants on his devices provide the final context for the case. 5

6 Building the case Using UFED Link Analysis, investigators are able to show how the three suspects are tied together in the coordination and execution of six armed robbery/home invasions. Clear patterns of communication show Jiggy, an alias for the mastermind, giving orders to the two subordinates to hit particular houses. Mapping the subordinates geolocation data shows them casing the homes in the days leading up to the robberies. In addition, Jiggy s private social media posts show his paranoia and motivation to dominate the drug market in the region. 6

7 Taking criminals off the street The investigators are able to build a solid case against all of the suspects for the armed robberies, assaults, and drug distribution. Leveraging UFED Reader, they present the entire case to their prosecutor, detailing a timeline of robbery-related events over a period of three months. In turn, the prosecutor charges all three suspects with multiple felony counts. This takes them off the street and puts an end to their criminal activities. The UFED Series delivers the most comprehensive mobile forensics extraction, decoding and analysis capabilities on the market, empowering investigators to unlock critical mobile device evidence and focus their investigations on the leads that matter. By leveraging the UFED Field Series and UFED Pro Series together as part of an end-to-end solution, law enforcement agencies can simplify complex analytical tasks, cultivate more leads in less time, and present evidence they can stand behind in court. About Cellebrite Cellebrite is the world leader in delivering cutting-edge mobile forensic solutions. Cellebrite provides flexible, field proven and innovative cross platform solutions for lab and field via its UFED Pro and UFED Field Series. The company s comprehensive Universal Forensic Extraction Device (UFED) is designed to meet the challenges of unveiling the massive amount of data stored in the modern mobile device. The UFED Series is able to extract, decode, analyze and report data from thousands of mobile devices, including, smartphones, legacy and feature phones, portable GPS devices, tablets, memory cards and phones manufactured with Chinese chipsets. With more than 30,000 units deployed across 100 countries, UFED Series is the primary choice for forensic specialists in law enforcement, military, intelligence, corporate security and ediscovery. Founded in 1999, Cellebrite is a subsidiary of the Sun Corporation, a publicly traded Japanese company (6736/JQ) To learn more, visit For more information contact sales 2015 Cellebrite Mobile Synchronization LTD. All rights reserved. 7

SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS

SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS Extract the Insights that Focus Investigations CELLEBRITE UFED PRO SERIES THE DATA SOURCES THAT MATTER MOST 95% MOBILE DEVICE ITSELF 59% THIRD-PARTY

More information

Build Stronger Cases with Mobile Device Link Analysis

Build Stronger Cases with Mobile Device Link Analysis White Paper Build Stronger Cases with Mobile Device Link Analysis How data from mobile devices reveals the patterns of life that can make for stronger proactive and reactive investigations - on the street

More information

Unlock Digital Intelligence Accelerate Investigations Anywhere

Unlock Digital Intelligence Accelerate Investigations Anywhere Unlock Digital Intelligence Accelerate Investigations Anywhere Cellebrite Mobile Forensics The Exploding Implications of Mobile Data The new smoking gun in criminal investigations? Mobile devices A man

More information

Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask

Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask Table of Contents How to Evaluate Mobile Forensics Training...3 1. Does the vendor ground you in forensic best practices

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system.

Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system. Inform RMS The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system. Covering the entire life span of records development from initial generation to

More information

RECORDS MANAGEMENT THAT WORKS THE WAY YOU DO

RECORDS MANAGEMENT THAT WORKS THE WAY YOU DO RECORDS MANAGEMENT THAT WORKS THE WAY YOU DO LAW ENFORCEMENT RECORDS MANAGEMENT When it comes to records management, no two public safety departments are the same; each department has different data needs

More information

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal

More information

CMPD s Predictive Crime Analytics Implementation. Harold Medlock Deputy Chief Charlotte-Mecklenburg Police Department

CMPD s Predictive Crime Analytics Implementation. Harold Medlock Deputy Chief Charlotte-Mecklenburg Police Department CMPD s Predictive Crime Analytics Implementation Harold Medlock Deputy Chief Charlotte-Mecklenburg Police Department CMPD BI Dashboards & Predictive Crime Analytics Agency Background Information Estimated

More information

Digital Forensics. Larry Daniel

Digital Forensics. Larry Daniel Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters

More information

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements 9 April 2013 Facilitator: Dr. Sheau-Dong Lang, Coordinator Master of Science in Digital Forensics University

More information

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics for Attorneys Overview of Digital Forensics Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence

More information

HARDCAT SABRE IS A COMPLETE END TO END LAW ENFORCEMENT INFORMATION MANAGEMENT SYSTEM

HARDCAT SABRE IS A COMPLETE END TO END LAW ENFORCEMENT INFORMATION MANAGEMENT SYSTEM HARDCAT SABRE IS A COMPLETE END TO END LAW ENFORCEMENT INFORMATION MANAGEMENT SYSTEM CASE/EVENT/INCIDENT MANAGEMENT EXHIBIT/PROPERTY MANAGEMENT JOB MANAGEMENT CHAIN OF CUSTODY LABORATORY INFORMATION MANAGEMENT

More information

EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD

EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD White Paper EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD Explaining UFED Cloud Analyzer Extraction and Analysis Processes With data privacy a major topic of discussion among consumers and service

More information

Social Media Use in Law Enforcement:

Social Media Use in Law Enforcement: Research Crime prevention and investigative activities continue to drive usage. November Background and methodology Overview Social media is increasingly valuable to the way law enforcement professionals

More information

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER CONTENTS Executive summary...2 The digital forensic investigation impasse...3 Lessons from

More information

Computer Forensics. Securing and Analysing Digital Information

Computer Forensics. Securing and Analysing Digital Information Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live

More information

A White Paper from AccessData Group. The Future of Mobile E-Discovery

A White Paper from AccessData Group. The Future of Mobile E-Discovery A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+

More information

A White Paper from AccessData Group. The Future of Mobile E-Discovery

A White Paper from AccessData Group. The Future of Mobile E-Discovery A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+

More information

East Haven Police Department

East Haven Police Department East Haven Police Department Type of Directive: Policies & Procedures No. 410.2 Subject/Title: Issue Date: Preliminary Criminal Investigations July 29, 2014 Effective Date: References/Attachments: N/A

More information

Don t be a Victim of Violent Crime

Don t be a Victim of Violent Crime Don t be a Victim of Violent Crime Working to make life safer and healthier Don t be a Victim of Violent Crime Violent crime is a very real hazard for shopworkers. Every year around 10,000 retail workers

More information

POLICE OFFICER. 4. Work in partnership with the District Attorney s Office to obtain and file criminal complaints on arrested subjects.

POLICE OFFICER. 4. Work in partnership with the District Attorney s Office to obtain and file criminal complaints on arrested subjects. POLICE OFFICER Class specifications are intended to present a descriptive list of the range of duties performed by employees in the class. Specifications are not intended to reflect all duties performed

More information

Case Study: Mobile Device Forensics in Texting and Driving Cases

Case Study: Mobile Device Forensics in Texting and Driving Cases Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge

More information

PROCEDURE Use of Translators and Interpreters. Number: E 0115 Date Published: 1 July 2015

PROCEDURE Use of Translators and Interpreters. Number: E 0115 Date Published: 1 July 2015 1.0 Summary of Changes This procedure has been amended to replace reference to Language Line with ALS (Capital Translation and Interpreting). 2.0 What this Procedure is about This procedure guides officers

More information

Case Study: Smart Phone Deleted Data Recovery

Case Study: Smart Phone Deleted Data Recovery Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics

More information

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified

More information

d CRIMINAL INVESTIGATION ADMINISTRATION OF JUSTICE 5 Spring 2015

d CRIMINAL INVESTIGATION ADMINISTRATION OF JUSTICE 5 Spring 2015 d CRIMINAL INVESTIGATION ADMINISTRATION OF JUSTICE 5 Spring 2015 Instructor: Steven J. Katz West Los Angeles College Course Section No. 7574 MW 7:35am-9:10am ARTC E-mail: katzsj@wlac.edu Contact Telephone:

More information

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Crime Location Crime Type Month Year Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop Theft April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop

More information

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014 TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014 SUBJECT TITLE PREVIOUSLY ISSUED DATES Criminal Investigations 7/4/2014 REFERENCE RE-EVALUATION DATE CALEA

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

Massachusetts Major City Chiefs. Best Practices in Eyewitness Identification and the Recording of Suspect Interviews

Massachusetts Major City Chiefs. Best Practices in Eyewitness Identification and the Recording of Suspect Interviews Massachusetts Major City Chiefs Best Practices in Eyewitness Identification and the Recording of Suspect Interviews September 2010 Introduction In December 2009 the Boston Bar Association published Getting

More information

www.lgrmg.ca Setting the Standard in Risk Management Consulting and Investigation Services

www.lgrmg.ca Setting the Standard in Risk Management Consulting and Investigation Services www.lgrmg.ca Setting the Standard in Risk Management Consulting and Investigation Services Setting the Standard in Risk Management Consulting and Investigation Services AN INTRODUCTION Lions Gate Risk

More information

SharePoint Training DVD Videos

SharePoint Training DVD Videos SharePoint Training DVD Videos SharePoint 2013 Administration Intended for: Prerequisites: Hours: Enterprise Content Managers / Administrators Planners / Project managers None 16 hours of video + 18 hours

More information

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE SUPERVISORY CRIMINAL INVESTIGATOR II 43* D 13.241 SUPERVISORY CRIMINAL INVESTIGATOR

More information

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime

More information

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene

More information

Guidelines on Digital Forensic Procedures for OLAF Staff

Guidelines on Digital Forensic Procedures for OLAF Staff Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to

More information

1/26/15. Chapter 2 Crime Scene

1/26/15. Chapter 2 Crime Scene Chapter 2 Crime Scene Chapter 2 Crime Scene By the end of this chapter you will be able to: By the end of this chapter you will be able to: Investigation and Evidence Collection 1 Investigation and Evidence

More information

Digital Forensics for Attorneys - Part 2

Digital Forensics for Attorneys - Part 2 Lars Daniel, EnCE Digital Forensics for Attorneys - Part 2 Experts, Analysis, Challenging Evidence Digital Forensics For Attorneys Part I Overview of Digital Forensics Types of Digital Evidence Acquisition

More information

THE DOLLARS AND SENSE OF VIDEO EVIDENCE MANAGEMENT

THE DOLLARS AND SENSE OF VIDEO EVIDENCE MANAGEMENT THE DOLLARS AND SENSE OF VIDEO EVIDENCE MANAGEMENT 5 THINGS YOU NEED TO KNOW FOR COST-EFFECTIVELY INTEGRATING AND DEPLOYING BODY-WORN CAMERA SOLUTIONS INTRODUCTION Across the country, law enforcement agencies

More information

Siebel for Investigative Case Management. An Oracle White Paper August 2007

Siebel for Investigative Case Management. An Oracle White Paper August 2007 Siebel for Investigative Case Management An Oracle White Paper August 2007 Siebel for Investigative Case Management OVERVIEW OF SIEBEL FOR INVESTIGATIVE CASE MANAGEMENT 3 UNIVERSAL CASE INBOX.... 4 INCIDENT

More information

Pensacola Police Department

Pensacola Police Department Pensacola Police Department Neighborhood Services Division Cadets- $345,200 Central Records- $383,700 Communications Center- $1,569,000 Community Oriented Policing Squad- $1,228,100 Neighborhood Services-

More information

Mission. Department Description

Mission. Department Description POLICE Mission To consistently provide effective, professional and dependable law enforcement services to every citizen, visitor and business within the City of Clearwater. Department Description The Police

More information

Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix

Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix Ady Cassidy Systems Consultant Nuix Ady is a computer forensic investigator and ediscovery consultant with more than 10 years experience as a Computer

More information

How To Be A Computer Forensics Examiner

How To Be A Computer Forensics Examiner Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner

More information

POLICE. Patrol Bureau

POLICE. Patrol Bureau POLICE MISSION Working with our diverse communities to safeguard the lives and property of the people we serve, to reduce the incidence and fear of crime, and to enhance public safety. BUSINESS LINES The

More information

Overview of Current Criminal Justice Information Systems

Overview of Current Criminal Justice Information Systems Overview of Current Criminal Justice Information Systems by James X. Dempsey Center for Democracy & Technology www.cdt.org Criminal justice information systems can be divided roughly into two categories:

More information

Rules and Procedures. Rule 312 August 23, 2001. Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES

Rules and Procedures. Rule 312 August 23, 2001. Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES Rules and Procedures Rule 312 August 23, 2001 Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES Rule 312, Crime Laboratory - Evidence and Crime Scenes, is hereby re-issued to establish Police Department

More information

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 1811 Occupational Series is Marked by Support

More information

Preservation for a Safer World

Preservation for a Safer World Preservation and Archiving Special Interest Group (PASIG) Preservation for a Safer World Hong-Eng Koh Senior Director (Global Lead) Justice & Public Safety A Very Fragmented World

More information

An Esri White Paper March 2012 GIS for Law Enforcement

An Esri White Paper March 2012 GIS for Law Enforcement An Esri White Paper March 2012 GIS for Law Enforcement Esri, 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB esri.com Copyright 2012 Esri All rights

More information

Strategy for Mobile ID

Strategy for Mobile ID Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2

More information

Goal to recognize, document and collect evidence at a crime scene

Goal to recognize, document and collect evidence at a crime scene Crime Scene Investigation and Evidence Collection Lecture Credits: Anthony (Bud) Bertino Goal to recognize, document and collect evidence at a crime scene Sherlock Holmes» Sir Arthur Conan Doyle in the

More information

STATE POLICE TROOPER

STATE POLICE TROOPER JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE TROOPER Employees in this job are police officers, responsible for the enforcement of all traffic and criminal laws of the

More information

Overview of Computer Forensics

Overview of Computer Forensics Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National

More information

Battling Current Technological Trends

Battling Current Technological Trends Law Enforcement Incident Response to Cybercrimes & Battling Current Technological Trends Corey J. Bourgeois, Computer Forensic Examiner & David Ferris, Investigator Louisiana Department of Justice HTCU

More information

QUICK REFERENCE GUIDE. Workplace Violence. What You Need to Know to Protect Yourself and Your Employees

QUICK REFERENCE GUIDE. Workplace Violence. What You Need to Know to Protect Yourself and Your Employees QUICK REFERENCE GUIDE Workplace Violence What You Need to Know to Protect Yourself and Your Employees Types of Workplace Violence: 2 Workplace Violence While the motivation and circumstances of each incident

More information

CRIMINAL JOURNEY MAPPING

CRIMINAL JOURNEY MAPPING The Quarterly Magazine for Digital Forensics Practitioners Issue 23 May 2015 Digital ForensicS / magazine WIN! an ipod Nano CRIMINAL JOURNEY MAPPING How to use Cyber Criminal Journeys to support forensics

More information

Cool Forensic Investigations Young Women s Leadership Academy. Grand Prairie Police Department Amanda Self, CCSA Leticia Hidalgo

Cool Forensic Investigations Young Women s Leadership Academy. Grand Prairie Police Department Amanda Self, CCSA Leticia Hidalgo Cool Forensic Investigations Young Women s Leadership Academy Grand Prairie Police Department Amanda Self, CCSA Leticia Hidalgo Overview Benefits for School and Educators Benefits for Students What is

More information

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5

More information

12.412 DOMESTIC VIOLENCE

12.412 DOMESTIC VIOLENCE 12.412 DOMESTIC VIOLENCE References: Procedure 12.400, Incident and Miscellaneous Reporting Procedure 12.403, Crime Victim/Witness Notification and Assistance Procedure 12.413, Enforcement of Court Orders

More information

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement

More information

Large Scale Cloud Forensics

Large Scale Cloud Forensics Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam

More information

Jail, Warrants and Court Security

Jail, Warrants and Court Security CHAPTER 4 Jail, Warrants and Court Security St. Louis County Sheriff s Office 2 The New Orleans Blueprint for Safety Jail, Warrants and Court Security Jail Booking, Supervision, and Release Training Memos

More information

Setting the Standard for Safe City Projects in the United States

Setting the Standard for Safe City Projects in the United States Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,

More information

SECURITY. SITUATIONAL AWARENESS. INTERAGENCY CONNECTIVITY.

SECURITY. SITUATIONAL AWARENESS. INTERAGENCY CONNECTIVITY. SOLUTION BRIEF SECURITY. SITUATIONAL AWARENESS. INTERAGENCY CONNECTIVITY. Whether you re a federal agent on a drug bust interacting with local law enforcement agencies or a county sheriff talking to the

More information

LAKE CITY POLICE DEPARTMENT GENERAL ORDERS MANUAL

LAKE CITY POLICE DEPARTMENT GENERAL ORDERS MANUAL LAKE CITY POLICE DEPARTMENT GENERAL ORDERS MANUAL SUBJECT CHIEF OF POLICE Traffic Crash Investigations Signature on File NUMBER 119 ISSUE DATE December 30, 2011 REVISION DATE TOTAL PAGES 8 AUTHORITY/RELATED

More information

SOLUTION. Forensic Video Analysis

SOLUTION. Forensic Video Analysis SOLUTION Forensic Video Analysis reveal the concealed IN A WORLD OF SURVEILLANCE CAMERAS, catching a criminal suspect on video isn t much of a problem. For law enforcement and homeland security, the real

More information

Crime Scene Search and Processing

Crime Scene Search and Processing Objective: Crime Scene Search and Processing Crime scene search scenarios involve significant teamwork. Each team member should be assigned a specific duty during the crime scene processing. Explorers

More information

The Enhanced Digital Investigation Process Model

The Enhanced Digital Investigation Process Model The Enhanced Digital Investigation Process Model Venansius Baryamureeba and Florence Tushabe barya@ics.mak.ac.ug, tushabe@ics.mak.ac.ug Institute of Computer Science, Makerere University P.O.Box 7062,

More information

Physical Security. Overview

Physical Security. Overview Physical Security Currently in this Country defence and security including private sector have responded to rising concerns about theft, fraud, and terrorism by sharpening their focus on physical security

More information

of the Chancellor SUMMARY OF CHANGES

of the Chancellor SUMMARY OF CHANGES Subject: SECURITY IN THE SCHOOLS Page: 1 of 1 SUMMARY OF CHANGES This regulation supersedes A-412 dated September 13, 2005. It sets forth the reporting and notification requirements that school officials

More information

Designated personnel will be trained and authorized to conduct field testing.

Designated personnel will be trained and authorized to conduct field testing. SUBJECT KANSAS CITY MISSOURI POLICE DEPARTMENT PROCEDURAL INSTRUCTION Arrest Procedures - Possession of Controlled Substance REFERENCE RSMo. Chapter 195 Code of City Ordinances Chapters 18 and 26 PI: Questioning

More information

The CHICAGO STORY. Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments

The CHICAGO STORY. Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments The CHICAGO STORY Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments 3rd Largest U.S. City 2.9 million residents 228 square miles CPD 2 nd largest

More information

IBM Content Analytics: Rapid insight for crime investigation

IBM Content Analytics: Rapid insight for crime investigation IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from

More information

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.

More information

Vancouver Police Department Crown Counsel Queries Audit

Vancouver Police Department Crown Counsel Queries Audit Vancouver Police Department Crown Counsel Queries Audit Simon Demers, Audit Manager Vancouver Police Department February 2010 Vancouver Police Department 312 Main Street Vancouver, British Columbia V6A

More information

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft

More information

A Victim s Guide to Understanding the Criminal Justice System

A Victim s Guide to Understanding the Criminal Justice System A Victim s Guide to Understanding the Criminal Justice System The Bartholomew County Prosecutor s Office Victim Assistance Program Prosecutor: William Nash 234 Washington Street Columbus, IN 47201 Telephone:

More information

Introduction to CCTNS. (Crime & Criminal Tracking and Network System)

Introduction to CCTNS. (Crime & Criminal Tracking and Network System) Introduction to CCTNS (Crime & Criminal Tracking and Network System) Agenda About CCTNS Objectives of CCTNS Project Components Scope of Work Goals & Expectations from CCTNS CCTNS & Existing Legacy System

More information

A Survey on Mobile Forensic for Android Smartphones

A Survey on Mobile Forensic for Android Smartphones IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones

More information

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

Criminal Investigation CRJ141. Matthew McCarty

Criminal Investigation CRJ141. Matthew McCarty Criminal Investigation CRJ141 Matthew McCarty Chapter 1 Criminal Investigation: An Overview CSI Effect The exaggerated depiction of how television forensic science operates, creating a phenomenon in which

More information

One third of investigators still do not have the resources to utiltize social media properly for investigations.

One third of investigators still do not have the resources to utiltize social media properly for investigations. Industry Insights One Step Ahead: How Social Media is Changing the Face of Investigations One third of investigators still do not have the resources to utiltize social media properly for investigations.

More information

To do Justice, as no one is above the Law nor beneath its protection.

To do Justice, as no one is above the Law nor beneath its protection. Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The

More information

Digital Evidence Collection and Use. CS 585 Fall 2009

Digital Evidence Collection and Use. CS 585 Fall 2009 Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers

More information

10/11/2012. Digital Forensics for Attorneys - Part 2. Digital Forensics For Attorneys. Experts. Larry E. Daniel, EnCE, DFCP, BCE

10/11/2012. Digital Forensics for Attorneys - Part 2. Digital Forensics For Attorneys. Experts. Larry E. Daniel, EnCE, DFCP, BCE Larry E. Daniel, EnCE, DFCP, BCE Digital Forensics for Attorneys - Part 2 Experts, Analysis, Challenging Evidence Digital Forensics For Attorneys Part I Overview of Digital Forensics Types of Digital Evidence

More information

MILWAUKEE COUNTY DISTRICT ATTORNEY S OFFICE DISTRICT ATTORNEY JOHN T. CHISHOLM

MILWAUKEE COUNTY DISTRICT ATTORNEY S OFFICE DISTRICT ATTORNEY JOHN T. CHISHOLM MILWAUKEE COUNTY DISTRICT ATTORNEY S OFFICE DISTRICT ATTORNEY JOHN T. CHISHOLM THE MILWAUKEE COMMUNITY PROSECUTION MODEL A VISION OF SMART, EFFICIENT, AND EFFECTIVE LAW ENFORCEMENT 1. The Community prosecution

More information

role in that system. Class discussion and debate will be encouraged. Semester Instructional Unit I

role in that system. Class discussion and debate will be encouraged. Semester Instructional Unit I Name of Course: Criminal Law Grade 11-12 Level(s): Brief Description (Course Catalog): This course will deal with the basic legal terms, concepts, and principles of criminal law and procedures. Students

More information

Operation Ruff Rider

Operation Ruff Rider METROPOLITAN BUREAU OF INVESTIGATION WWW.MBI-POLICE. NET Since 1978 Multi-Agency LARRY G. ZWIEG DIRECTOR Telephone: (407) 836-9701 Facsimile: (407) 836-9743 Email: MBIOrlando@ocfl.net Metropolitan Bureau

More information

1. ABSTRACT PROBLEM SOLVING PROCESS

1. ABSTRACT PROBLEM SOLVING PROCESS 1. ABSTRACT PROBLEM SOLVING PROCESS SCANNING - Assistant Chief Paul Felice of the Glendale, Arizona Police Department initiated a problem-solving project with the department's Community Action Team (CAT)

More information

Greenville, SC Police Department GENERAL ORDER Subject Force Response

Greenville, SC Police Department GENERAL ORDER Subject Force Response Greenville, SC Police Department GENERAL ORDER Subject Force Response Number 200A6 Type Operational Effective Date September 20, 2011 Amends/ Rescinds 200A5 Pages 1 of 11 Re-evaluation Annual-January References

More information

The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland.

The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland. The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations State of Maryland June 1, 2011 1 Section B. The Criminal Justice Dashboard (Dashboard) is

More information

Law Enforcement Records Management Systems

Law Enforcement Records Management Systems Positron Public Safety Systems Page 1 of 9 Law Enforcement Records Management Systems A Public Safety Primer Positron Public Safety Systems Page 2 of 9 Table of Contents 1.0 INTRODUCTION 3 2.0 COMPONENTS

More information

Piecing Digital Evidence Together. Company Information

Piecing Digital Evidence Together. Company Information Piecing Digital Evidence Together Company Information About IntaForensics About Us Established in 2006, IntaForensics has grown to become one of the leading providers of digital forensic services in the

More information

Android Physical Extraction - FAQ

Android Physical Extraction - FAQ Android Physical Extraction - FAQ Nadav Horesh June, 2012 1 Table of Contents Introduction... 3 Android Debugging Bridge (ADB)... 4 Q: What does ADB stand for and how does it work?...4 Q: So can ADB be

More information

TE AS FORENSIC SCIENCE ACADEMY TM

TE AS FORENSIC SCIENCE ACADEMY TM TE AS FORENSIC SCIENCE ACADEMY TM "BETTER SCIENCE LEADS TO BETTER JUSTICE FOR ALL" I strongly feel the courses offered through the Texas Forensic Science Academy certificate program are a true benefit

More information

Speaker Sheldon Silver. Breaking New York s Addiction to Prison: Reforming New York s Rockefeller Drug Laws

Speaker Sheldon Silver. Breaking New York s Addiction to Prison: Reforming New York s Rockefeller Drug Laws Speaker Sheldon Silver Breaking New York s Addiction to Prison: Reforming New York s Rockefeller Drug Laws In 1973 New York enacted, what were considered at the time, the harshest drug laws in the nation.

More information