Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Social Media and OSINT Investigative Techniques

Description

Social networking sites and cell phones have expanded cybercrimes and created new channels for sharing information that could also be utilized by law enforcement to investigate crimes and identify suspects. With OSINT, many techniques can be used to gather intelligence across the internet and social media platforms. Examples of OSINT include tracing usernames, emails, text hide software, phone number searches, OSINT dashboards, reverse images, websites, screen catch, trace and track linkage analysis, and so much more. This introductory course will review the use of cyber technology, discussing web platforms, AI and bot technology, linkage analysis, and social networking sites such as Facebook, Instagram, Tumblr, Twitter, Google+, Telegram, Omegle, Discord, Twitch, Spotify, Diaspora (dark web), MEWE, and many others to understand and investigate cybercrime. This course is excellent for new investigators as well as seasoned investigators.

This course includes many OSINT tools and how to create a sock puppet protecting investigators' identities for cyber investigations. This course primarily focuses on Open-source Intelligence (OSINT) and social media, chat, and gaming platforms. We will touch on OSINT that can be used on cell phones, such as hidden applications cloaking, and we will review networking, routers, and how to conduct a router interrogation, step-by-step. This course also includes information on warrant templates for over 500 social media and gaming platforms, discussing some of the most common and what each collect regarding IP addresses, URLs, voice, pictures, videos, financial data, etc. We will also discuss current case studies using linkage analysis, OSINT, and technological combinations used for success. We will close the training by discussing the importance of 3-D digital evidence and courtroom testimony. Most case studies include sextortion and other sex crimes as examples.  

This class focuses on social media and open-source intelligence (OSINT). A separate social media class is offered that includes cell phone techniques. Look for social media and cell phone investigative procedures in the course catalog.

This course is part of a 3-day course: Analyzing social media, Cell Phone, and OSINT Techniques. Check with PATC for more Information on the 3-day course.

*The course will not necessarily be taught in the same order as listed below and in outline. Bring tools for taking notes. Computer not required but encouraged. (2-day event)

Upon Completion:

Participants will be able to:

  1. Common crimes committed on social networking sites.
    1. The use of "bots."
    2. Artificial intelligence in gathering data.
  2. Understand the basic steps for preserving a profile.
    1. Identifying its creator.
    2. Set up undercover profiles (steps in creating a sock puppet)
    3. Gather profile information.
    4. Importance of email addresses and usernames in linkage analysis.
  3. Review social networking sites.
    1. Obtain evidence from servers and OSINT.
  4. How to create and use a sock puppet for undercover investigations.
  5. Review step-by-step router interrogations.
  6. Digital evidence and courtroom testimony.
  7. Understand and define the basic terms related to investigating cybercrimes.
  8. Understand and explain cyber data.
    1. Including dark web and virtual private networks (VPNs)
    2. Capture IP addresses, URLs, Metadata, and more. 
  9. Describe the links between social networking sites and the acceleration of crimes.
    1. Telegram, Omegle, Chat investigations, gaming platforms, and more sites.
  10. Employ specific techniques and evolving tactics for successful cyber investigations.
  11. Learn how to intercept digital evidence.

Press enter to see more results