Course Descriptions

The WRCTC delivers relevant, operational-level training to local, state and federal law enforcement agencies and community-based organizations in support of national priorities, and serves as a force multiplier in the global narcotics threat and transnational organized crime reduction efforts.

What We offer:

Click Here to download a detailed Course Catalog.

Cell Phone Use in Drug Trafficking Investigations

Cell Phone Use in Drug Trafficking Investigations

This course is a detailed introduction to how cell phone data can be used by investigators to enhance drug trafficking investigation. Instruction will cover use of historical communication data (records), real-time surveillance options, physical cell phone forensics considerations, and solutions that all law enforcement personnel should know. Legal issues about how to obtain and use this data will be covered as well as surveillance operations considerations, company-specific considerations, courtroom presentation issues, and other related matters. At the end of this course, students will have a very thorough understanding of what is possible with communication data in narcotics investigations, the several primary categories of available data, and how to determine the servicing companies for communications devices and accounts.

Upon successful completion of the course, students will be able to:

  • Describe the primary categories of data that are available from cell phones, including:
    • Retrievable data from physical devices, such as cell phones, using forensic techniques.
    • Activation, subscriber, and payment information.
    • Communication/call detail records with and without geographic information.
    • Law enforcement surveillance data from cell phones, such as traps and traces, pen registers Communications Assistance to Law Enforcement Act (CALEA) delivery, field device locations, “target development,” and communications intercept (aka “wiretaps”).
  • Determine the company that services a phone number, and Internet Protocol (IP) address, e-mail address, and web address.
  • Determine which provider company to contact.
  • Determine how to contact a specific provider company.
  • List the primary categories of legal demands that are used to lawfully obtain data and authorize surveillances, including customer consent, emergency legal demands, subpoenas,
  • court orders, and search warrants.
  • Describe the primary tools that may be used to map cell phone geographic data such as Micro- soft Streets and Trips and Iconico’s Screen Protractor software.

Prerequisites: None.

Course Length: 2 days/16 hours.

Who May Attend: Law Enforcement, Investigators, LEA Support.