In this workshop, law enforcement and school officials will learn how to obtain the proper information when responding to online threats of school violence. This is especially important when there is “leakage” and the posting party is targeting students and school personnel. It is critical for the professionals to obtain crucial information and evidence in these cases and initiate due process paperwork in a timely manner to secure them. Being able to identify the perpetrator immediately provides both law enforcement and schools the ability to act quickly and proactively to reduce the threat of school shootings and other forms of violence. The presenter will also discuss the Electronic Communications Privacy Act (ECPA) and how to obtain information about the online posts of the offending student. Participants will learn about obtaining specific evidence from the student's social networks, cell phones, and residences to prove or disprove intent on committing these atrocities.
Learning Objectives:
Discuss the three-step process of investigating internet crimes.
Discuss the importance of Preservation, Exigent Circumstances, and Search Warrants if needed.
Understand how to obtain IPs, screen names, screen captures, email headers, and statements for the investigation.
Overview of computer and cell phone forensics and when it is appropriate to seize these items from a victim or a suspect to be analyzed.
The attendee will learn that once the person making the threat is identified, to proceed with the 4 areas of consent or search warrant being their residence, social networks, computers, and cell phones. Once examinations into these 4 areas are completed you will then know their intent or if they were truly "just kidding." This result will no doubt stop the school shooting from occurring and get that student the mental health treatment they need.