Explains and demonstrates the safe investigation processes of decision making, contemporaneous note taking, sensitive processing, eForensic security and preparation for eDisclosure. These processes shall be demonstrated time and again during subsequent Live Online Training events, so that the practitioner will acquire the capability to process an investigation for safe and effective prosecution (litigation).
Introducing the Tasking of an Investigation, the Intelligence Cycle, the safe and effective investigation process with detail concerning the logging of all activity, the eForensic preservation and management of material and the contents of a Case eBundle.
The practitioner will understand how an III / OSINT investigation is deployed, and performed in a safe and legally compliant manner.
Module 5 Part B does differentiate but only in the Live Online Training, where investigation opportunities that are available only to Law Enforcement officers are introduced.
INVESTIGATION PROCESSING
TASKING THE INVESTIGATION
GETTING STARTED WITH A SAFE III (OSINT) INVESTIGATION
POLICY
COMPLIANCE WITH THE LEGISLATION
SAFE PROCESSING
COMPLY WITH THE POLICY
LAWFUL BASIS
AUTHORISATION & WARRANTS
LOG RECORDS FOR SAFE PROCESSING
THE DEPLOYMENT LOG
THE DECISION LOG
THE AUDIT LOG
THE INTERNET SEARCH LOG
PURPOSE, SCOPE, DIRECTION & OBJECTIVES
UNDERSTANDING THE PURPOSE OF THE INVESTIGATION
SCOPE OF THE INVESTIGATION
DIRECTION & MANAGEMENT
PROCESSING OBJECTIVES
PRESERVING THE INVESTIGATION
PRESERVING INTELLIGENCE AND MATERIAL
SCREEN RECORDING
FILE HASHING
THE BLOCKCHAIN OPTION
SOFTWARE TO ASSIST WITH SAFE PROCESSING
CONTENTS OF A CASE eBUNDLE
PREPARING FOR eDISCLOSURE