Thinking it's 'probably the right person, because so much info seems to fit', is never good enough. For an investigation to proceed lawfully, the subject must be identified positively.
This module demonstrates processing with many of the techniques and resources already covered in modules 2 - 5 and for the first time in this course Blogs, Forums, Databases, Chatrooms, Gaming & Gambling platforms, Online Marketplaces and Data Breach resources are introduced. So the course ends with with an emphasis on the positive identification of a person and the demonstration of wide multi-platform, multi-resource investigation processing.
Introducing & explaining a diverse selection of OSINT resources including blogs, forums, online marketplaces & breach data with demonstrations of the processes to investigate people & to make a positive identification of a subject.
The practitioner will understand the importance of a positive identification of a subject & will have knowledge of a wide selection of OSINT resources & the technical capability to process those resources.
SAFE PROCESSING REVIEW
RELIABILITY & CORROBORATION
INTELLIGENCE TO LOCATE & GATHER
REAL WORLD V ONLINE WORLD
TYPES OF THREAT
MOBILE EMULATOR DEPLOYMENT
PLATFORMS & RESOURCES
MANY PROCESSING EXAMPLES WITH WIDENING SCOPE
MULTIPLE PLATFORMS & RESOURCES PROCESSED INTERACTIVELY
BLOGS & BLOGGING PLATFORMS
FORUMS & MESSAGE BOARDS
PEOPLE SEARCH RESOURCES
AND MORE MARKETPLACES
TYPES OF DATA
TYPES OF DATABASE
PROCESSING DATA FROM DATA BREACHES
FREEMIUM BREACH DATA RESOURCES
PREMIUM BREACH DATA RESOURCES
PASTE BIN RESOURCES
PASTE BINS & BREACH DATA
PASTE BIN SEARCH ENGINE
SAFE IDENTIFICATION OF A SUBJECT
LIVE EXAMPLES OF SAFE IDENTIFICATION
EXPANSIVE INVESTIGATION PROCESSING
LIVE EXAMPLE OF DETAILED INVESTIGATION PROCESS
USING RESOURCES & TECHNIQUES COVERED IN MODULES 2-6