Cellular Telephone Exploitation Course

Bureau of International Narcotics and Law Enforcement Affairs
U.S. Embassy, Paraguay

Cellular Telephone Exploitation Course Overview

This course teaches students how to conduct searches of suspected individuals using various sophisticated cyber forensics systems. The course includes lessons in how to conduct searches of both the public Web and the private Web (i.e., the Deep or Dark Web) and various social media platforms and networks that are often used to conduct illegal activities. It helps to identify entities, affiliates and affiliations, locations, aliases and other data points, including email addresses and social media profiles, associated with the suspect(s) under surveillance.

Torres’s Cyber Forensics course also includes Cellular Phone Exploitation (CELLEX), in which students are taught how to use CELLEX software to extract data, such as phone numbers, text messages and emails, from mobile phones and other personal devices.

Course Curriculum

Day 1, Part I: Digital Forensics Overview

  • Welcome; Course Overview and Objectives; Student/Teacher Introductions; Opening Remarks
  • Main Duties for Investigators
  • Relevant U.S. Government Intelligence and Investigatory Agencies
  • Legal Standards Relating to Searching Data and Evidence Preservation
  • Review and Q&A

Day 1, Part II: Introduction to the Dark Web and Data Mining

  • What is the Dark Web?
  • How Do Bad Actors Us the Dark Web to Conduct Criminal Activities?
  • Anonymity, Tor, Dark Web and Cloaking
  • Demonstration of Dark Web Data Mining Software
  • Student Hands-On Practice: Online Investigations and Data Mining
  • Review, Quiz and Q&A

Day 2: Smartphone Forensics (CELLEX)

  • Smartphone Forensics Overview
  • Tools: Free/Open Source vs. Paid
  • Smartphones vs. Non-Smartphones
  • Smartphone Operating Systems (OS): Android, iOS, Others
  • Mobile Phone Components: Hardware, SIM cards, SD Cards
  • Smartphone File Systems and Data Structures
  • Data Recovery, Decoding, Validation and Examination
  • Tracing User Smartphone Activities
  • Local vs. Online vs. Apps
  • Messaging and Social Networking
  • Smartphone Investigation Analysis, Data Searches and Reporting Analysis
  • Geolocation and Link Graph Analysis
  • Locked Smartphones and SIM Cards
  • Smartphone Malware and Spyware
  • Practice Labs: Smartphone Forensics
  • Review, Quiz and Q&A

Day 2: Special Training Segments, Final Exams, Evaluations and Graduation

  • Corruption, Integrity and Ethics in Law Enforcement
  • Human Rights in Law Enforcement
  • Discussion and Course Review
  • Final Written Exam
  • Final Performance Exam – Practical Exercises Utilizing Course Software and Cybercrime Simulation Exercise
  • Closeout and Final Q&A
  • Student/Course Evaluations
  • Graduation and Certificate Presentation

For More Information Contact
Training@Torresco.com