Tag Archives: Cell Phone Forensic Services

Institute Of Computer Forensic Examinations And Criminal Investigations

THE INSTITUTE

The Institute of Computer Forensic Examinations and Criminal Investigations is Duly Licensed  as Continuing Education CE Training School (Y15802201)  by Texas Department of Public Safety Regulatory Services Division.  Additionally, ICFECI is a C.E. Provider registered (Registration Number :  2229)  by the Texas Department of Licensing and Regulations.

ICFECI offers training in relation to computer/cell phone forensics and criminal investigations with primary focus on Federal Criminal Code and RULES, Title 18 § 3006A.  Additionally, ICFECI offers training regarding RULES OF CRIMINAL PROCEDURE, Rule 16.  Discovery and Inspections.

ICFECI offers training in computer and cell phone forensics, including repair and maintenance of computers and cell phones.

Computer equipment training is done on Tableau products.  Computer and cell phone forensics tools training is done with Accessdata’s Forensic Tools, Oxygen Forensic Tools and Autopsy open source forensic tools.

The Institute’s training is offered to examiners who are already involved in digital forensics and need continuing education.

Taking computer/cell phone forensics continuing educations classes requires an introduction to ethics as a code of professional conduct and or responsibility.

Certificates of Completion

Upon completion, continuing educations certificates issued.

Refunds

If for any reason, courses do not meet your expectations, apply and a full refund will be issued.  If a course is cancelled for any reason, a refund will be issued or the fee can be applied to another course of your choice. C.E. credits will not be issued for or may be retracted for refunded courses.

Contact

Dan James

daniel_james@att.net

Institute of Computer Forensics and Criminal Investigations

www.icfeci.com

4364 Western Center Blvd., #304, Fort Worth, TX 76137

How Your Mobile Phone Can Save You from a Conviction

It would be nice to think that law and order was a black and white affair: this action is illegal and deserving of a prison sentence, while that action is legal and undeserving of censure. The truth is much murkier, especially when it comes to situations where it is one person’s word against another. Fortunately, modern technology comes to our rescue here too, as in so many areas of life, with digital forensic investigation.

Text and Call InformationSituations can get out of hand and what starts out as a friendly date can turn into an awkward encounter. In worst-case scenarios, it can end with an accusation of rape or sexual assault.Age fib:  Sometimes people can lie about their age and it can be hard to tell the difference between a legal eighteen-year-old and a mature fifteen-year-old. This is often a highly sensitive situation, as children are, rightly, deserving of the full protection of the law, but it can happen where the other party is innocent of any wrong intention and completely unaware that they have been deceived. Taking someone’s word for their age should not be a crime, but it can happen that a charge of statutory rape is laid. Having a private investigation service uncover text and email proof that the age given was legal, and being able to show a reasonable assumption of a legal and consensual relationship, will give you a better chance of earning leniency from a judge or the prosecution service.

Cheat: Being caught cheating can sometimes lead people to lie. It is easier to say ‘they forced me’ than to own up to a moment of lust, but if the cheated upon partner then insists on a police case being opened, you might be forced into making a defense. Having proof that the meeting and the sex were consensual can get you off the hook, leaving the cheat with some questions to answer to his or her partner!

Regret: Rarely, people can regret the impulsion to a one-night stand. Sometimes this is, as above, because they have a partner already, at other times it could be because they have religious beliefs or other moral concerns over their own behavior which they alleviate by putting the blame on the other person concerned: unfair and illogical, but humans are messy and emotional sometimes! Again, proof positive of their consent can be found on a mobile phone through cell phone forensic investigation.

GPS Data

GPS data pinpoints where the phone user is at any point in time and accurately reading this can help to confirm your story or show holes in an accusation.

It is this last point where mobile phones can really help in a situation where actions can be ambiguous or open to several interpretations. If a narrative does not line up with text and GPS data it is easier for a defense lawyer to unpick that narrative, providing doubt about the accusation and leading to a (deserved) acquittal and dismissal of charges.

 

Dangerous Digital Playground – Perverts, Pedophiles and Pimps ARE Hunting for Children

It’s an arduous task protecting children. After it’s too late, devastated parents want to know how their children could have been protected. As a criminal defense investigator, almost one-third of my cases involve sexual exploitation of children.  Sadly, I’ve handled more than 1600 these tragic situations. In the past, I’ve spoken to church and civic groups on this unsettling and disturbing topic.

One example of a case that haunts me: I was asked to forensically examine a laptop belonging to a thirteen year old child. The laptop contained the typical social media platforms. Within those social media platforms were pictures, videos and text of an inappropriate and enticing nature, sent directly to the child. There were subsequent text messages and photo exchanges. The end result was tragic.

Everyone seems to understand the dangers of The Internet, and we know that there are plenty of websites that are inappropriate for minors. I want to be very clear. Fewer kids are using email and websites. That means, social media platforms are the playgrounds for perverts, pedophiles and pimps.

WHO?

I use the term “predator” to cover the “3 P’s” of the digital playground: perverts, pedophiles, and pimps.  I define perverts as those who derive sexual gratification from something that is illegal and/or outside the “norms” of society.  Pedophiles are bit more specific—adults who enjoy sexual acts with children. There are other, more specific classes of “-philes” that identify specific age groups of minors.  And, the pimps? These are the “entrepreneurs” of the dark world of sex crimes.  Motivated by money, they profit from their illegal sexual “business.” To keep it simple, I’ll call them predators.

Predators hunt.

Minor children (male and female) are being targeted by predators (male and female). It’s not just opposite sexes to be concerned about. An older female (even an older teen) will befriend a younger girl on social media.  The same is true for boys. This has nothing to do with a child’s sexual orientation. To a predator, a child is an “object,” not a person.

WHAT?

Predators are seeing to “groom” (introduce, foster and normalize) children into sexual activity.  Although many believe this is limited to actual physical sexual acts, it’s much broader and complicated than that. Predators seek photos and videos of children dressed, naked, and “taking direction.” Once a child is groomed into a sexualized situation, the predator has opened the door to personal contact.  This can be a “date” (in the predator’s mind), but I’m seeing any contact feeding human trafficking.  Children are bought, sold, and traded across jurisdictions for sex.

WHERE?

These tragedies are happening across the US, and all over the world. If a community has cell towers, computers, and digital devices—the predators are already there. We have a tendency to think, “This could never happen here.”  It’s happening.  It’s already happened.  And, it will happen again.

WHEN?

Cellphones, tablets  and any type of computer (including game systems) are “open” 24//7. Predators are hunting for children every morning, noon, and night.

HOW?

Most predators make outbound contact with a potential victim on a social media platform by “liking” or commenting on a topic or photo your child is interested in.  Frequently called a “DM” (direct message), the predator will often contact a child via the platform’s messaging plug in features. The messages often start with humor, or a subject a child has expressed interest in via a “fan page,” group, or “friend of a friend.” As I said above, these people are experts in children. From the initial contact, the predators often encourage children to download other apps, such as WhatsApp, SnapChat, or others.  (Predators mistakenly believe these apps are 100% private.) Once contact is established, the process of grooming a child for exploitation begins. Within a few messages, these predators can convince many children to send photos, video, and identifying data.

WHY?

This is the most asked questions by the families of victims. It’s also the hardest to answer. The bottom line is this, some people are evil.

There are people that are sexually attracted to children. There is no polite way to convey this concept. We can indulge in long theoretical discussion of “if” these people were once victimized.  But, the bottom line is this is a horrific crime.

And, the emerging reality—exploitation of children is a business for some predators.  There are people on social media, both male and female, that are actively “recruiting” children into prostitution and human trafficking.  They “pimp” (sell or rent) a minor, male or female for sexual purposes, for money. The bottom line is this, exploitation of children is a crime.

CONCLUSION:

Next time as an adult, you receive a message to be friends, and the messages have inappropriate materials, know that your children are receiving the same. Yes.  This IS happening if your child is on social media. My advice is this: Social media is not the place for children!  If your child must be on social media, monitor what they are doing.

As technology continues to change and expand at a breakneck pace, we have to be vigilant regarding social media. As quick as I can type, there are new websites, apps and social media platforms being released every day.  Know what’s on your home computers, your children’s phones and other devices, and keep the communication in your home flowing both ways.  This is an important topic, and we will circle back around to additional specific strategies in the very near future.`