Introduces and explains the lawful basis of a Synthetic Identity (SI) and demonstrates, live and on-line the creation and management of overt & covert SIs for deployment by a Public Authority practitioner.
Introducing Synthetic Identities, what they are, the reasons why we use them, the legal authority, and how to create and maintain a safe and effective Synthetic Identity.
The practitioner will understand why it is prudent to deploy at least one Synthetic Identity during III (OSINT) investigation and will have the capability to create and maintain an effective and appropriate Synthetic Identities.
Module 4-U is specifically for Public Sector employees and differs substantially from Module 4-R for the private sector
WHAT IS A SYNTHETIC IDENTITY?
DEFINITION OF A SYNTHETIC IDENTITY
OTHER TERMINOLOGIES & THEIR DEPRECATION
Sock Puppet
False Identity
False Persona
ONLINE PSEUDONYMS
HOME OFFICE (UK) GUIDANCE
ONLINE COVERT ACTIVITY
DIFFERENTIATING OVERT & COVERT
OVERT DEPLOYMENT
COVERT DEPLOYMENT
MANAGING SYNTHETIC IDENTITY RESTRICTIONS
SOCIAL MEDIA & FAKE ACCOUNTS
PREPARATION
DEFAULT LOCATION OF A SYNTHETIC IDENTITY
THE LIFETIME OF A SYNTHETIC IDENTITY
REQUIREMENT FOR MULTIPLE SYNTHETIC IDENTITIES
ATTRIBUTES AND ONLINE ASSETS
SYNTHETIC IDENTITY PROFILING
SYNTHETIC IDENTITY NAME GUIDANCE
EMAIL SELECTION & DEPLOYMENT
SECURE PASSWORDS
CREATING A SYNTHETIC IDENTITY
MAKE A RECORD OF THE PROCESS
NON-ATTRIBUTABLE FOOTPRINT
SYNTHETIC IDENTITY GENERATORS
PROFILE DEVELOPMENT
IMAGES FOR SYNTHETIC IDENTITIES
Profile Images
Profile Images & EXIF Data
SYNTHETIC IDENTITY DEPLOYMENT
CREATING ONLINE ACCOUNTS
SYNTHETIC IDENTITIES & MOBILE APPS
ACCOUNT AUTHENTICATION
AUTHENTICATION TEXT MESSAGES
INVESTIGATION DEPLOYMENT
MANAGING & SHARING SYNTHETIC IDENTITIES
SYNTHETIC IDENTITIES & SECURITY
AVOIDING SYNTHETIC IDENTITY CONFLICTS
BROWSER COOKIES
THINGS TO REMEMBER