If you are seeing this in RED, then the free rooms are no longer available. You can still register for the event but you must make your own hotel reservations at 877-684-7704. The room rate will be $89.00 per night and use the code “GML610B” when making your reservation.
MLEOA will pay for the first 50 participants who register for a room. After those rooms are filled, participants will be responsible for making their own reservations and arranging payment. If the option to register for a room is not available, then the first 50 rooms are already taken and you need to make your own arrangements by contacting Scarlet Pearl at (228) 392-1889 and reference the MLEOA conference. MLEOA room rate is $89.00 per night.
“CELL PHONE AND SOCIAL MEDIA INVESTIGATIONS”
Overview of social networks
The features of each network and how they differ in strengths/weaknesses.
The types of evidence that law enforcement that can obtain from social networks (identify unknown subject. connect identities to phone numbers. connect other profiles.
obtain clothing descriptions from specific days. mobile location stamps. list of associates. nick names. photos of incriminating items. sales of property. etc).
Examples of particular offenses/investigations that can benefit from social media analysis.
How to build undercover profiles
How to use the profile for investigations
Cell phone record analysis
Tower mapping for whereabouts
Using phone records to build conspiracy communications
Cell data to ID unknown suspects.
Preservation of records pending investigation
The federal statutes that can compel social media networks and cell phone companies to produce records to local agencies — Title 18 USC 2701-2712 “Electronic Communication Privacy Act”
(i.e.. how our local legal demands are honored outside of our geographical jurisdiction at the Facebook headquarters in California)
Search Warrants & the types of language used to obtain certain types of data
Subpoenas — Investigatory v. Motions
Letters of preservation of account content
ISP provider contact methods
How these processes differ from ordinary search warrants that produce physical searches/evidence.
Which types of companies will honor search warrants under this Federal Act (credit card companies. email servers. social media. cell phone records. dating apps. etc).
DAY FOUR (Half day)
Internet Sex crime investigations
Child predator internet luring (cell data records to identify suspect during the investigation).
Human Trafficking/promoting prostitution investigations (connecting internet ads and the advertised contact information. such as cell phone numbers. etc).
Instructor: Matthew Defore
MATTHEW D. DEF ORE
8691 Northwest Drive Southaven, MS (662)772-6300 firstname.lastname@example.org
• Masters of Public Administration, Belhaven University, projected completion date: 2018
• Masters of Criminal Justice,
Legal Studies Department,
University of Mississippi, 2013
• Bachelors of Science, Exercise Physiology, University of
PUBLIC SAP ETY EXPERIENCE
• Detective, Southaven Police
• Police Officer. University of Mississippi Police
• Lafayette County Firefighter/EMS First
INSTRUCTOR & I EAC’H1N€i EX1'ERIENCE
and developed agency-wide Criminal
Procedure Curriculum &
• Assisted with agency policy’ proposals/updates
• State of MS DI JI Instructor
• Guest lnstructor: Lafayette County Law Enforcement
Officer’s Training Academy
• Field ’training Officer
ACADEMIC AWARDS & ACHIEVEMEN I’S
• Mississippi Law Enforcement Officers Training Academy: Ranked
first in class
• Mississippi Law
Training Academy: Top
• DUI 100 Club 2t)14
• 2012 Medal of Valor
Recipient — Lafayette
Enforcement Officers Association
• Sigma Alpha Lambda H
onor Society, University of Mississippi
• Alpha Phi Sigma
Honor Society. University of Mississippi
• Sergeant at Arms — University of Mississippi Criminal