Page 32 - Master Training Catalog 01222021 stc
P. 32

P a g e  | 32

          months of training to become computer forensics analysts and participate in
          a nine-month field internship in an HSI field office supporting child
          exploitation investigations.  Upon successful graduation from the program,
          many are offered permanent positions with HSI.
      •  Computer/Mobile/Vehicle/Drone Forensics:  HSI is a leader in the field of
          digital forensics and has the largest computer forensics program in the
          Federal government; with over 400 computer forensics agents and
          analysts.  HSI CFAs provide training to other federal, state, local and foreign
          law enforcement partners in all digital forensics disciplines and provide Tier
          1 support to field offices.
      •  3-D Printing: 3-D Printing has been used to help identify victims of child
          exploitation in cases where human remains have been discovered and were
          unidentifiable.  In these cases, an MRI image is taken and loaded into the
          3D printer.  A replica of the skull is printed and provided to a forensics
          anthropologist at the National Center for Missing and Exploited Children for
          forensic reconstruction.  The reconstruction is then run through facial
          recognition and identification is attempted.
      •  Hard Drive Repair:  In many cases, individuals will attempt to destroy
          evidence contained on their digital devices, hard drives become damaged at
          the scene due to fire or liquid damage, or damaged hardware is discovered
          in the course of an investigation.  The experts at C3 are trained to repair
          these drives and acquire digital evidence for use in prosecutions.
      •  Encryption/Decryption:  Privacy concerns and inexpensive encryption has
          led to the ability to obtain evidence from encrypted devices.  C3 has a robust
          decryption program that is powered by a network of computers placed in
          each SAC office which not only allows for the secure/encrypted transfer of
          evidence, but also allows investigators to combine the processing power of
          these computers to assist in decrypting digital devices.
   27   28   29   30   31   32   33   34   35   36   37