CyberTip Triage and Open-Source Intelligence:
- Practical techniques to help ICAC investigators navigate their immense CyberTip workloads
- Highlight OSINT methods to quickly identify high-risk suspects with imminent access to children
- Include real-world child exploitation case studies to ensure course realism and immediate relevance to participants
- Participants will apply new skills in practical training scenarios involving simulated CyberTip processing, triage, and related OSINT challenges
Cryptocurrency and Dark Web Investigations:
- In-depth exploration of cryptocurrency; digital assets, the Dark Web; and the role of peer-to-peer platforms in CSAM production and distribution
- Examine the use of cryptography to protect digital records of transactions and anonymize perpetrators of child exploitation.
- Explore current trends in exchange mediums with no central authority, as well as tools and countermeasures for investigators
- Review high-profile Dark Web cases involving lucrative international child sexual abuse rings and pay-per-view livestreams of child sexual abuse and torture
- Customized virtual wallets and sample Dark Web profiles will be established for participants’ use to demystify cryptocurrency technologies and equip attendees with tailored, real-world training experiences that can be directly applied to investigations
The Importance of Forensic Interviewing in Technology-Facilitated Crimes:
Unique dynamics of technology-facilitated crimes, including perpetrators’ grooming and manipulation tactics, and the role of polyvictimization
How forensic interviewers can explore a child’s involvement in relevant virtual contexts and gather information about the use of digital devices without compromising the admissibility of the child’s statement
Explore the introduction of digital and other forms of evidence in the forensic interview
Participants will work in small teams to develop case strategies; conduct a mock forensic interview; and present their case plans to faculty
More details to come!