Introduces and explains the principles of gathering open source intelligence with an overview of the processes deployed to gather and preserve intelligence.
Introducing the principles of an III (OSINT) investigation with an overview of the process of intelligence gathering in compliance with policies and legislation.
The practitioner will understand the principles of an III (OSINT) investigation and have an overview of the process of intelligence gathering so that any evidence might be admissible at a legal hearing.
The Investigation processes and policies that apply specifically to the Public Sector are taught to the Private Sector trainees so that they learn how to apply safe and effective procedures.
THE PRINCIPLES OF DIGITAL EVIDENCE
TERMINOLOGY
GOOD PRACTICE & GUIDANCE
THE PRINCIPLES
EXPLANATION OF THE PRINCIPLES
PREPARATION FOR PROCESSING
AUTHORITY TO PROCESS
LAWFUL BASIS
PRACTITIONER ANONYMITY
COVERT PRACTITIONER INTERACTION
TECHNICAL REQUIREMENTS
INTRODUCTION TO PROCESSING
THE INVESTIGATION PLAN
CAPTURE & PRESERVATION
CAPTURING ONLINE EVIDENCE
COMPLIANT GATHERING & PRESERVATION OF DATA
THE PURPOSE OF LOGGING
THE AUDIT LOG
MICROSOFT STEPS RECORDER
SCREEN RECORDING
PROJECT IRIS
DEPLOYMENT LOG
DECISION LOG
CONTEMPORANEOUS NOTES
INTERNET SEARCH LOG
CRIME SCENES ON THE INTERNET
WEBMAIL & IP ADDRESSES & ACCOUNT INFORMATION
WEBSITES / FORUM POSTINGS / BLOGS
SOCIAL NETWORKING PLATFORMS
ONLINE SEARCH RESOURCES
DIGITAL FILES (TEXT & IMAGES)
MAPPING & GEOLOCATION
DATABASES
ONLINE MARKETPLACES
BLOCKCHAIN & CRYPTOCURRENCIES
THE DARK WEB
DATA BREACH
COMMAND LINE INVESTIGATIONS