Police / Law Enforcement Training Courses On Open Source Intelligence And Using The Internet & Social Media As An Investigative Tool

Over the last 8 years we have provided these training courses to many hundreds of Police Officers & Support Staff from a number of forces and other law enforcement agencies in the UK.

Our courses are not for training people to engage with subjects on-line in an undercover style. That role is only to be undertaken by suitably trained undercover classed officers. Within the UK Police, Officers and Staff engaged in these types of undercover on-line enquiries and operations are referred to as Covert Internet Investigators or CII’s and must do the appropriate training course with The College of Policing. We do a similar course for people employed in enforcement roles outside of the Police who are engaged with these types of on-line enquiries and operations, which is called On-line Covert Investigations & Engagement Training (OCI&ET).

We understand that the Police in England & Wales are currently working to 5 Levels of Internet Investigations / Research with CII enquiries being at Level 5 (which is covered by our On-line Covert Investigations & Engagement Training but is not for the UK Police who must attain their full CII status). The other 4 levels are all involved in Internet Investigations / Research, harvesting information that is already in existence but which stops short of engaging on-line with the subject of their enquiry.

  • Level 1 – Overt Open Source Investigation & Research

Staff engaged in these activities are using standard networked computers gathering information from open websites which do not require an individual to sign up for an account to access. As such these staff will not require additional legal training.

All of our 2, 3, 4 & 5 day courses would appear to cover the required material at this level.

  • Level 2 – Core Open Source Investigation & Research

Staff engaged in these activities may have to use more covert computers to gather information from the internet including social networking sites, creating passive profiles but are not to engage with others on-line.

Staff must understand & consider the different legislation that may affect their enquiries and must be able to evidence the information that is recovered.

All of our 3, 4 and 5 day courses would appear to cover the required material at this level but obviously the longer courses allow us time to cover things in greater depth.

  • Level 3 – Covert Advanced Open Source Investigation & Research

Staff engaged in these activities will have to use covert computers to gather information from the internet including social networking sites, creating passive profiles but are not to engage with others on-line.

Staff must understand & consider the different legislation that may affect their enquiries and must be able to evidence the information that is recovered and be enter it into the intelligence system, with an understanding of the 5x5x5 system.

Again all of our 3, 4 and 5 day courses would appear to cover the required material at this level but obviously the longer courses allow us time to cover things in greater depth.

  • Level 4 – Covert Internet & Network Investigations

Staff engaged at this level of internet investigations are working on higher level enquiries, where they will need to have a greater understanding & knowledge of the relevant legislation and the intelligence system and being able to use the 5x5x5 system.

Our 4 and 5 day courses would appear to cover the required material at this level.

 

We understand that Police in Scotland & Northern Ireland are currently working to three Levels of Internet investigation with CII enquiries being at Level 3. The other two levels are all involved in internet investigations, harvesting information that is already in existence but stop short of engaging with the subject of their enquiry;

  • Level 1 – Overt Open Source Investigation & Research

All of our 2, 3, 4 & 5 day courses would appear to cover the required material at this level.

  • Level 2 – Covert Open Source Investigation & Research

Again all of our 2, 3, 4 & 5 day courses would appear to cover the required material at this level.

 

Courses

Our courses are very hands on, with the delegates spending a lot of time putting into practice the techniques they are shown. Most of the elements of the course have practical exercises attached, so it is essential for the course that each delegate has access to an internet enabled computer on a one to one basis, so they are able to access & explorer the internet whilst being showed the techniques to use.

The computers do not need to be anything special, in fact laptops are OK, they just need to have access to a reliable, fast and unrestricted internet connection.

If you do not have access to an appropriate training room then we can arrange one, but obviously this will be at an additional charge.

Our courses do not cover the technical aspects of how computers or the internet works. We do not cover forensics or recovering data from devices. All of these are not things that an investigative researcher, either inside or outside of the police, needs to know about. Compare it to police officers on a driving course who are taught how to drive safely at speed. They are not taught how the car works, that is for a mechanic to know about. How computers or the internet works are for computer or network forensic engineers to know about and to describe to a court.

Our courses cover how to save your research in a structured and provable manner and how to present that research in a statement for a court or tribunal. Again compare it to police officers on a driving course being taught how to drive safely at speed, not being taught how to put on a statement, as an experienced investigator there is little need to go further.

So if you would like to book a course for your staff, then just email us for details.

 

Presentations

We also regularly give presentations on this subject to interested groups, lasting from 30 minutes to several hours, depending on whatever the client has requested.

If you are having a meeting or conference and want an outside speaker, then just email us for details.