Thinking it's 'probably the right person, because so much info seems to fit', is never good enough. For an investigation to proceed lawfully, the subject must be identified positively.
This module demonstrates processing with many of the techniques and resources already covered in modules 2 - 5 and for the first time in this course Blogs, Forums, Databases, Chatrooms, Gaming & Gambling platforms, Online Marketplaces and Data Breach resources are introduced. So the course ends with with an emphasis on the positive identification of a person and the demonstration of wide multi-platform, multi-resource investigation processing.
Introducing & explaining a diverse selection of OSINT resources including blogs, forums, online marketplaces & breach data with demonstrations of the processes to investigate people & to make a positive identification of a subject.
The practitioner will understand the importance of a positive identification of a subject & will have knowledge of a wide selection of OSINT resources & the technical capability to process those resources.
SAFE PROCESSING REVIEW
RELIABILITY & CORROBORATION
INTELLIGENCE TO LOCATE & GATHER
REAL WORLD V ONLINE WORLD
ONLINE THREATS
TYPES OF THREAT
PROCESSING APPS
MOBILE EMULATOR DEPLOYMENT
PLATFORMS & RESOURCES
MANY PROCESSING EXAMPLES WITH WIDENING SCOPE
MULTIPLE PLATFORMS & RESOURCES PROCESSED INTERACTIVELY
BLOGS & BLOGGING PLATFORMS
FORUMS & MESSAGE BOARDS
CHATROOMS
GAMING PLATFORMS
GAMBLING PLATFORMS
PEOPLE SEARCH RESOURCES
ONLINE MARKETPLACES
DONE DEAL
ADVERTS.IE
GUMTREE
EBAY
TRIP ADVISOR
AIRBNB
AND MORE MARKETPLACES
DATABASES
INTRODUCING DATABASES
TYPES OF DATA
CONSENTED DATA
TYPES OF DATABASE
COMMERCIAL DATABASES
OPEN-SOURCE DATABASES
GRAPH DATABASES
PROCESSING OPPORTUNITIES
BREACH DATA
PROCESSING DATA FROM DATA BREACHES
LEGAL IMPLICATIONS
FREEMIUM BREACH DATA RESOURCES
INTELLIGENCEX
LEAK-LOOKUP
PREMIUM BREACH DATA RESOURCES
PASTE BIN RESOURCES
PASTE BINS & BREACH DATA
TEXTBIN
PASTEBIN SEARCH
PSBDMP
PASTE BIN SEARCH ENGINE
SAFE IDENTIFICATION OF A SUBJECT
LIVE EXAMPLES OF SAFE IDENTIFICATION
EXPANSIVE INVESTIGATION PROCESSING
LIVE EXAMPLE OF DETAILED INVESTIGATION PROCESS
USING RESOURCES & TECHNIQUES COVERED IN MODULES 2-6
Live Online Training: 03:30
Module Assessment: 00:30