Course detail: Obtaining & Understanding Cloud-Based Evidence

Course Description: 

Today's technology is based on immediate access to an individual's accounts and data that is retained using numerous cloud-based electronic service providers, stored both within the United States and internationally. This two-day course tackles challenges in place when obtaining content stored in the cloud and utilization of tools and techniques required to extract data from the content presented by electronic service providers. 

Participants will be placed into small groups to create search warrants to obtain online content with these warrants peer reviewed by the class. Participants will use tools and techniques presented in the course to extract data from content provided by electronic service providers in a way to understand the evidence provided. 

Instructor will provide course materials prior to course for you to load to your computers. You will likely need to work with your own IT people to ensure materials are loaded.
You are strongly encouraged to take Basic Internet Investigations prior to this training. 

Core Competency: 
  • Participants will employ best practices as they investigate any crime from its beginning to its eventual disposition; either as an individual, or as part of an investigatory team. 
Course Objectives: 
  • Identify cloud-based evidence.
  • Identify effective investigative tools necessary to view content provided by electronic service providers.
  • Identify resources to assist with obtaining cloud-based evidence.
  • Identify and gain knowledge of software used to memorialize volatile digital evidence.
  • Learn terminology used in cloud-based evidence. 
Instructional Methods:
  • Lecture
  • Case Study
  • Group Scenario
  • Peer Review
  • Independent Practice 
Who Should Attend: 
  • Law Enforcement Only 
Course Requirements:
  • 100% Participation and Attendance
  • Completion of Pre-Skills Check and Post-Skills Check
Agenda:
Day 1 
1 hours Case Study
2 hours Presentation from prosecutor - case law - online storage challenges
1 hour DFU resources to extract content - tools to deal with large volumes of data - list of state wide resources
LUNCH
2 hours - Lecture search warrant structure top to bottom
1 hour - Group scenario - Write warrant for content three venues
1 hour - Peer Review

Day 2
1 hour - Review of Day 1
1 hour - Case Study
2 hour - Google content extraction
LUNCH
1 - KIK content extraction
1 - Facebook content extraction
1 - SnapChat content extraction
1 - Variety of tools - json file extensions - used by numerous ESP's

Individuals with disabilities are encouraged to attend University of Kansas sponsored events. If you require a reasonable accommodation in order to participate in an event, please email KLETC or call 620.694.1400 at least three weeks before the first day of the event. Some events may require notice earlier than three weeks and require you contact a specific individual; if so, that information is provided in the event-specific information.

This training is supported by the North CentralRegional Planning Commission through its seven Homeland Security regions inKansas, focusing on Combatting Violent Domestic Extremism. 

Available sessions