E-Kit Training & Supply
On-site training is available for both private sector and law enforcement. Please contact an E-Kit Representative for more information. 815-245-8476
This course is designed to introduce officers to the investigative value associated with networks & the internet. Officers will obtain the basic knowledge and skills to recognize networking and internet topics for law enforcement personnel. Areas addressed in this course include the networking hardware, software, ethics, and network examination standards. Planning for onsite enforcement activities: Note taking, Electronic Evidence Field Collection E-Kits, report writing, legal concerns when dealing with a network environment. Special emphasis will be given to computer network investigations as it pertains to cyber crime, terrorists and the internet. The course will also address legal principals regarding computer crimes, digital investigative units. Future computer investigations and cyber terrorism are addressed in this course including; “Cloud Computing”, “Data Centers”, “NGI-New Generation Internet”, “Intranet & VOIP”, “Convergence Technology” and “Private Security Objectives & Law Enforcement”.
- Describe the different cyber crime situations where computer forensic investigation would be appropriate in a network environment. Describe basic network configuration.
- Describe types of evidence investigator may encounter with computer networks and the Internet. Describe network data, discuss how large amounts of data are usually broken down to small packets and transferred over a network environment. (I.P. tracking, firewalls, virus protection, etc.)
- Describe software (Neo Trace, Net Tumbler, etc.) and forensic ethical standards, as well as legal and privacy issues.
- Describe and demonstrate how to identify, investigate, capture, analyze, preserve and process computer network
- Demonstrate the use of proven investigative and examination strategies. Follow guidelines from the National Institute of Justice, RCFL & Secret Service.
- Describe the need to only use specialists and networking professionals in the collection of network related evidence.
- Describe and demonstrate acquisition, collection, seizure and safekeeping of storage media and how it relates to chain of custody requirements. On site enforcement activities with "E-Kit Field Collection materials".
- Describe law enforcement assistance available to first responders with networking or cyber criminals: Secret Service Electronic Crimes Task Forces, Federal Theft Task Force, High Tech Criminal Investigators Association, F.B.I. Cart Response Unit and National Security Administration.
- Utilize common forensic tools in the electronic discovery process with subpoenas, search warrant, and consent to
search. Describe the "chain of custody" as it relates to the proper collection and documentation of networking
- A special emphasis will be placed on the legal & civil liability associated with private business. Officers should always seek legal assistance from their States Attorneys Office with law enforcement activities. This is also true for Federal Agents who should seek out assistance from the U.S. Attorneys Office.