Social Network Investigations (CSNI)

4 days
Entry-level course
Course Description
Cellebrite Social Networks Investigations (CSNI) is a four (4) day entry level course designed for technically aware investigators, digital evidence analysts, and forensic practitioners. This course provides students with an introduction to social media investigations to include pre-seizure actions and basic investigative techniques.
Students will learn how to create undercover accounts and use open source intelligence to gather information from publicly available information from social networks such as Facebook, Twitter, Periscope, and more.
RESTRICTED TO LAW ENFORCEMENT AND PROSECUTORS ONLY
Students will learn how to create undercover accounts and use open source intelligence to gather information from publicly available information from social networks such as Facebook, Twitter, Periscope, and more.
RESTRICTED TO LAW ENFORCEMENT AND PROSECUTORS ONLY
Course Content

Social Media Basics
- Definitions of social media
- Popular social media networks and applications
- Popular online ad services
- Usefulness of social media networks

Undercover Accounts
- Introduction to resources, and tools used for undercover social media investigations
- Loading prepaid minutes
- Integrating undercover accounts
- Downloading social media network applications

Undercover Smart Phone
- Activating an undercover smartphone
- Loading prepaid minutes
- Integrating undercover accounts
- Downloading social media network applications

Entrapment
- Definitions of entrapment and predisposition
- Identifying ongoing patterns of conduct
- Proper undercover pace and tone
- Examples of entrapment

Undercover Device Evidence
- Necessity of proper evidence extraction
- Identifying evidence unique to the device
- Identifying evidence that may exist on offsite servers
- Benefits of using UFED Cloud to supplement a device extraction

Open Source Intelligence
- Manual web-based searches
- Third-party search engines
- Email and Cellular queries
- Darkweb and TOR

Consensual Account Reviews
- Necessity of proper evidence extraction
- Identifying evidence unique to the device vs server
- UFED overview
- Benefits of using UFED Cloud to supplement a device extraction

Social Media Data & Legal Process
- The Electronic Communications Privacy Act (ECPA)
- Categories of stored data and provider retention rates
- User notification policies by Internet Service Providers (ISPs)
- Law Enforcement Portals and legal process submission

Subpoenas
- Definition of subscriber data
- Use and drafting of subpoenas
- Requirements and authority of subpoenas
- Practical exercise issuing a proper subpoena

Transactional Data
- Definition of transactional data
- Use and drafting of court orders
- Requirements and authority of court orders
- Examples of assorted court orders

Stored Content & Communications
- Definition of content and communications
- Use and drafting of social network or cloud search warrants
- Requirements and authority of search warrants
- Examples of assorted social network and cloud search warrants

Investigations Involving Exigency & Children
- Definition and examples of exigency
- Obtaining social media data under exigent circumstances
- The National Center for Missing and Exploited Children
- Resources for intelligence and analytical assistance during emergencies
Last modified: Thursday, August 12, 2021, 8:17 AM