OSINT REFRESHER MODULE 6 FACEBOOK, TIKTOK, YOUTUBE, FLICKR

Thinking it's 'probably the right person, because so much info seems to fit', is never good enough. For an investigation to proceed lawfully, the subject must be identified positively.

This module demonstrates processing with many of the techniques and resources already covered in modules 2 - 5 and for the first time in this course Blogs, Forums, Databases, Chatrooms, Gaming & Gambling platforms, Online Marketplaces and Data Breach resources are introduced. So the course ends with with an emphasis on the positive identification of a person and the demonstration of wide multi-platform, multi-resource investigation processing.

TRAINING OBJECTIVES OF MODULE 6 OF THE OSINT REFRESHER

Introducing & explaining a diverse selection of OSINT resources including blogs, forums, online marketplaces & breach data with demonstrations of the processes to investigate people & to make a positive identification of a subject.

LEARNING OUTCOMES OF MODULE 6 OF THE OSINT REFRESHER

The practitioner will understand the importance of a positive identification of a subject & will have knowledge of a wide selection of OSINT resources & the technical capability to process those resources.

TABLE OF CONTENTS

SAFE PROCESSING REVIEW

RELIABILITY & CORROBORATION

INTELLIGENCE TO LOCATE & GATHER

REAL WORLD V ONLINE WORLD

ONLINE THREATS

TYPES OF THREAT

PROCESSING APPS

MOBILE EMULATOR DEPLOYMENT

 

PLATFORMS & RESOURCES

MANY PROCESSING EXAMPLES WITH WIDENING SCOPE

MULTIPLE PLATFORMS & RESOURCES PROCESSED INTERACTIVELY

 

BLOGS & BLOGGING PLATFORMS

FORUMS & MESSAGE BOARDS

CHATROOMS

GAMING PLATFORMS

GAMBLING PLATFORMS

PEOPLE SEARCH RESOURCES

 

ONLINE MARKETPLACES

DONE DEAL

ADVERTS.IE

GUMTREE

EBAY

TRIP ADVISOR

AIRBNB

AND MORE MARKETPLACES

 

DATABASES

INTRODUCING DATABASES

TYPES OF DATA

CONSENTED DATA

TYPES OF DATABASE

COMMERCIAL DATABASES

OPEN-SOURCE DATABASES

GRAPH DATABASES

PROCESSING OPPORTUNITIES

 

BREACH DATA

PROCESSING DATA FROM DATA BREACHES

LEGAL IMPLICATIONS

FREEMIUM BREACH DATA RESOURCES

INTELLIGENCEX

LEAK-LOOKUP

PREMIUM BREACH DATA RESOURCES

PASTE BIN RESOURCES

PASTE BINS & BREACH DATA

TEXTBIN

PASTEBIN SEARCH

PSBDMP

PASTE BIN SEARCH ENGINE

 

SAFE IDENTIFICATION OF A SUBJECT

LIVE EXAMPLES OF SAFE IDENTIFICATION

 

EXPANSIVE INVESTIGATION PROCESSING

LIVE EXAMPLE OF DETAILED INVESTIGATION PROCESS

USING RESOURCES & TECHNIQUES COVERED IN MODULES 2-6

 

LOT-X-R Module 6
CPD Credits: 4 Hours
Duration:

Live Online Training: 03:30

Module Assessment: 00:30

CPD Certificate:

18 Blended III Modules III Training (LEAs) 18 Blended OSINT Modules OSINT Training 18 OSINT Modules