New High Tech Investigation Techniques (Advanced)

New High Tech Investigation Techniques (Advanced) – This one day session expands on the basic online investigation techniques that are vital to any Officer’s arsenal of tools. This is a very full day of instruction intended on teaching a unique response to crime with unconventional free resources. Additionally, a session demonstrating how hackers are creating havoc will help deliver an educated response from an Officer to the victims of internet crime. Times can be adjusted to fit your needs. Participants receive lifetime access to the Basic Investigations Resources and Advanced Investigations Portal areas of the site which include updated links, content, software, guides, and templates. All session details can be found by clicking the course link above.

Open Source Intelligence Techniques

This session identifies and demonstrates over 200 free online resources that can aid Investigators in solving both technical and non-technical crimes. Participants will be shown how to “dig” into the internet for personal information about any target. While popular sites such as Twitter, MySpace, and Facebook are covered in detail (including techniques that legally access some “private” content), the presentation goes much deeper into the vast resources available online for researching personal information. Additionally, instructions for identifying local events such as flash mobs and fights in real time will be presented in great detail. Aside from web sites, other technologies such as digital camera data, document meta-data, Geo-location services, and live communication monitoring will be explained. These sources can also be used to conduct thorough background checks on potential employees. All resources can be applied to domestic and international investigations.

Among many other techniques, the attendees will learn how to conduct the following queries.

General search queries on dozens of search engines
Use online translation tools to search and translate foreign text
Monitor live content and communication on social networks
Create online map layers to identify communication by location
Thorough searches of all social networks
Access content believed to be private on social networks
Search Geo Location data within Twitter streams
Analyze micro blogging content by location
Reverse search by photograph
Search historical versions of websites
Locate documents related to target subject
Identify crime rings using online auction sites
Locate online photo albums shared by target subjects
Locate online videos related to subject of investigation
Analyze EXIF data in photographs to identify suspects
Search online forums for communication

Case Examples

Actual case examples are demonstrated that apply several of the techniques discussed to solve a series of felonies. This demonstration gives a complete view of how the techniques are used in unison to solve individual cases.

Collecting Online Content

The audience will be shown how to use various technologies to assist with any type of investigation. Topics include internet provider emergency contacts, online evidence documentation, online video extraction, social networks analysis, and more. Several methods of manually extracting online content will be explained as well as the benefits of each. Precise methods of obtaining content directly from Facebook and other networks will be demonstrated. All procedures will be explained from start to finish including preparation of search warrants and emergency requests. Digital templates will be available to all participants.

Online Investigation Techniques

The audience will be shown how to use advanced technologies to assist with any type of investigation. Topics include identifying compromised email addresses, “spoofing” caller ID, anonymous forwarding email addresses, anonymous forwarding phone numbers, identifying shortened links, monitoring online digital radio frequencies, locating stolen data phones, rental vehicle information, and more. All procedures will be explained from start to finish and links will be available to all participants.

Online Investigation Resources (API’s)

This session identifies and demonstrates several free online resources that compile many of the websites presented during the basic course. This automated process can aid Investigators in solving both technical and non-technical crimes. Participants will be shown how to request, retrieve, and analyze the content received during this process. All attendees will also get access to premium licensed API keys for unlimited searching.

Intel Analysis Software

This session will demonstrate free software tools that will aid an Officer during any type of investigation. A custom portable web browser will be given to the participants that include configured plugins that add new search features. These include reverse image location, automatic media download, instant screen capture, and more. Additionally, the browser is configured to block website analytics that can divulge sensitive information about the searcher. Other software includes tools that clone websites, locate twitter data, recover deleted files, display historical versions of satellite mapping data, and identify metadata within online documents. Attendees will have full access to the entire collection of software demonstrated during the session.

Hiding From The Internet

Police Officers and their families are constantly at risk of being targeted by criminal suspects. This session identifies publicly available vulnerabilities that expose sensitive information about Officers. Resources for eliminating this public and private data are explained as well as expected results. Attendees will learn how to eliminate their personal information, including address and contact information, from both public and private databases. Online resources for eliminating personal information will be provided to all recipients.

Posted on December 6, 2011, in Uncategorized. Bookmark the permalink. Comments Off on New High Tech Investigation Techniques (Advanced).

Comments are closed.

%d bloggers like this: