Massachusetts Office of the Attorney General – Cyber Crime Division

The Cyber Crime Division investigates and prosecutes complex criminal cases involving digital evidence, consultation on criminal matters involving technology, and the forensic examination of digital evidence. The Division also works to advance the comprehensive Cyber Crime Initiative, which includes the Massachusetts Digital Evidence Consortium, a working group of law enforcement digital evidence analysts who convene to standardize digital evidence analysis procedures and improve training and information sharing efforts.

 » Read more

Michigan Cyber-Command Center (MC3)

The Michigan Cyber-Command Center is directed by the Michigan State Police from within the stateÕs Emergency Operations Center. The cyber-command is staffed by a select group of skilled public and private professionals who are highly trained in emergency response to cyber-events. When activated after a security threat, the command is tasked with restoring computer systems and minimizing damage, as well as deploying rapid-response teams that help secure networks in addition to their aid in the development of training standards.

 » Read more

Orange County Sheriff High Tech Services Reserve Unit

Members of the High Tech Services Reserve Unit are made up of a combination of highly specialized individuals who are recognized as industry experts. They cover a wide range of topics and are well versed in their areas of expertise. Areas covered by this unit are: videography, still photography (film and digital format), database design, website development, Internet Safety presentations and assistance with computer crimes when called upon.

 » Read more

Colorado Department of Public Safety – Colorado Bureau of Investigation

CBI investigates and responds to cyber crimes in cooperation and coordination with local, state and federal law enforcement agencies. CBI also prepares annual reports concerning cyber crimes in Colorado for use by local and federal law enforcement officials and by ColoradoÕs governor. CBI can respond only at the specific request of a police department, sheriff’s’ office or district attorneys’ office.

 » Read more

Connecticut Department of Emergency Services and Public Protection – Computer Crimes and Electronic Evidence Laboratory

The Computer Crimes Laboratory, one of the founding members of the ICAC Task Force Program, is comprised of state and local police officers working in conjunction with computer forensic science examiners. The investigative component of the Computer Crimes Laboratory conducts both proactive and reactive criminal investigations, assists other federal, state and local law enforcement agencies, and provides trainings and an array of community resources. The computer forensic component of the Computer Crimes Laboratory performs forensic analysis on a wide range of electronic evidence,

 » Read more

Yale University Police Department – Information Technology Services (ITS) Unit and Investigative Services Unit

The Information Technology Services Unit aims to provide and maintain state-of-the-art computer hardware and software resources to assist members of the department in working efficiently, effectively, and safely. The ITS UnitÕs responsibilities include investigations, support in court hearings in conjunction with the State AttorneyÕs Office, laboratory examinations, and technology research that can benefit officers and command staff in the performance of their duties.

 » Read more

Delaware State Police – High Tech Crime Unit

The High Tech Crime Unit conducts comprehensive investigations involving computers and computer related technology. In 2007 the HTCU joined forces with the Delaware Attorney GeneralÕs Office, U.S. AttorneyÕs Office, and federal law enforcement agencies to form the Delaware Child Predator Task Force. This highly successful Task Force is responsible for coordinating online child exploitation investigations and prosecutions throughout the state as they proactively identify, arrest, and prosecute sexual predators who would use technology as a means to target and reach their victims.

 » Read more

IACP Conference