ROCK PART I ONLINE INVESTIGATIONS
The Regional Operational Centre in Khartoum in support of the Khartoum Process and AU-Horn of Africa Initiative (ROCK) is a regional project to fight criminal networks involved in human trafficking and smuggling, financed by the Emergency Trust Fund for Africa of the European Union, which was launched as part of the Khartoum process at the request of countries from the Horn of Africa.
To combat these illicit activities, the ROCK promotes the exchange of information and expertise that is essential in the fight against these criminal networks, while paying particular attention to strengthen the criminal justice chain and to enhance the prevention to protect victims.
Sharing information on irregular migration and associated criminal networks along migratory routes, as well as creating the conditions for their operational use in a legal and judicial framework, is a prerequisite to address transnational crime of THB and SoM.
Social media has been used by traffickers to recruit victims, to proliferate their trafficking operations (mainly for sexual exploitation) and to control victims through restricting their social media access, impersonating the victim, or spreading lies and rumors online. The internet has revolutionized human trafficking and this falls within the scope of ROCK.
- Teacher: Franck Cormary
ROCK PART II UNDERCOVER ONLINE INVESTIGATIONS
This course will enable you to improve your knowledge of online investigations.
- Prepare and use your technical equipment
- Collecting and analyzing data
- How to be undercover online
- Using tools to identify people
- Examining crypto-currencies
- Test your knowledge
- Teacher: Franck Cormary
This general evaluation on computer science will open you the doors of the others training
- Teacher: Franck Cormary
- Teacher: Franck Cormary
You will learn what all the detectives must know,
how to search Internet,
how to use tools to track people,
how to save evidences.
- Teacher: Franck Cormary
You will attend theory and practice course on forensic examination from a bootable USB stick called DARWIN
This tool is used in France by First Responders to get an overview of the suspected computers and prioritize the technical searches
The visited computer is write protected to be compliant with the chain of custody
The E-learning training will prepare you for the face to face training
- Teacher: Franck Cormary
This training is 9 modules to be able to understand how to seize, extract analyze and share DATA from a mobile device
- Introduction to mobile devices
- Precautions
- Phone detective
- Different kind of extractions
- Root and Jailbreak
- UFED 4 PC
- IOS extraction
- UFED Physical analyzer
- UFED reader
- Teacher: Franck Cormary