The Qwarie OSINT Public Training Course
Using the Internet as an Investigative Tool
Duration: 4 Days
Included: Buffet Lunch, Tea, Coffee and Biscuits, Course handouts, notepad, pens, document wallet & memory stick
Not Included: Accommodation, Breakfast, Dinner, Computer (bring a laptop to the course)
Scope of the Course
If you think that just by letting your staff have some access to the internet so they can Google things, means that they are using the internet as an investigative tool then you and they are missing out on a world full of information and their investigations may not be as thorough as needed and may actually be compromised.
There are many items that make up Open Source Intelligence and we are able to provide a full training course giving those attending a practical knowledge & working experience of a number of issues including:
- The Use Of Open Source Intelligence In Investigations
This will give delegates an understanding of the different types of situation and incidents where accessing information from various online resources has assisted in their investigation and how these techniques can also be used against them.
It will also introduce the definition of Open Source Intelligence and the different areas on the internet where it can be accessed.
- Advanced Searching Techniques, Search Engines & Meta Search Engines
Without knowing how to search properly the internet can never be fully utilized; so by showing delegates how to use the Advanced Search Techniques and then by giving them a chance to use these techniques in practical scenarios we can get people to quickly become much more effective on-line investigators.
This is then built on by providing delegates with an understanding of how search engines function, some of the different search engines available to them, along with the use of meta search engines and search engine utilities.
- The Structure Of The Internet, Domain Name Registration & Website Investigations
This will demonstrate to delegates how the internet that we have now has developed and is governed and give them an opportunity to undertake practical scenarios into using the demonstrated investigative techniques into the domain name registration system.
It will also show delegates a number of different investigative techniques that can be used whilst investigating a website.
- Computer Security & Footprints
This will introduce to the delegates the various software options that can be used the make a computer more secure whilst accessing the internet. It will also demonstrate what footprint is left by a computer visiting a website, who can view it and how it can be altered.
It will also demonstrate to delegates how to set up a cheap but effective standalone system for use in their investigations and introduce the delegates to the use and advantage of remote desktops.
- Understanding Emails As An Investigative Resource
Although most people are used to receiving and reading emails, as an investigator there is so much more we should be aware of; What does the email address tell us about the person sending it? Where were they when they sent the email? Where are they when they receive an email from us? Most of these questions can be answered using the techniques demonstrated and in the practical scenarios given to the delegates to undertake.
- Understanding Social Networking Sites As An Investigative Resource
Whilst many people are well used to using Facebook or Twitter, there is much more that the effective internet investigator should be aware of, so they can access the maximum amount of information from a social networking account, even if that account has privacy settings in place, restricting access to it.
This will also introduce the delegates to a number of other techniques which can be used whilst investigating social networking sites and to some of the other social networking sites that are used by individuals that may be of interest to an investigator.
- Legal, Policy & Ethical Issues, Using Audit Trails During An Inquiry & Preparing Your Evidence For Use In The Legal System
Whilst not a law course, this section will introduce the delegates to the key bits of legislation in the UK that they should be aware of when making online enquiries. It also covers issues around the need for a proper policy & structure within an organization where these enquiries are undertaken and the ethical issues connected with it.
Delegates will also see demonstrated a number of ways of how to keep a record of not only where information was located but how it was located, saved in a structured and provable manner. And how this can then be introduced as evidence into a court/legal system.
- Tasking, The Intelligence Cycle & Dealing With / Grading Intelligence From Open Source Resources
This introduces delegates to tasking and the intelligence cycle in relation to undertaking online investigations. It also covers dealing with and grading intelligence from online resources within a number of different intelligence systems and also highlights the additional issues that need to be considered when evaluating intelligence from online enquiries.
- Databases & How To Use Them As An Investigative Resource
The majority of the information on the internet is not going to be located by someone only using a search engine. This will introduce delegates to the deep web and some techniques in how to use a number of different types of databases, to maximize the amount of information on an individual, property or company.
- Other Online Investigative Resources
The last section introduces delegates to a number of other online investigative resources, from meta data and QR Codes to the dark net and the internet of things.