top of page
15.resized.jpg

Conducting Open-Source Investigations tradecraft, key skills and best practice, 29 & 30 April 2024

 

  • An exclusive workshop that aims to provide a comprehensive and practical introduction to conducting effective internet investigators using open-source information and techniques.

 

  • Aimed at all investigators and analysts who want to conduct effective internet investigations.

 

  • It is essential that all investigators, not just those working in a digital role, have a working knowledge of conducting effective internet investigations due to the importance of the online world in our lives and many of today’s investigations.

 

  • The emphasis of the workshop is to make it as practically based as possible to enable you to take the key skills and concepts and put them into practice from day one. You won’t require any specialist software to carry out effective searches.

 

  • Certificates of CPD available

 

The course will include:

  • Basic Searching Techniques

 

  • Investigating Website

 

  • Searching Digital and Online Images

 

  • Investigating Emails and Email Addresses

 

  • Social Media Sites

 

  • Searching online databases

AGENDA - BST                          

Day One

9.50am-10am: Welcome and introduction, Carol Jenkins, The Investigator and introduction to Neil Smith or expert trainer.

 

10am-10.40am: Session One: Introduction to the course, aims and objectives and to the basic principles of internet searching techniques. Setting up your computer to conduct effective and secure online investigations, golden rules and best practice.

 

10.40am-11am: Break

 

11am-Noon: Session Two: Basic Searching Techniques, current best practice and latest thinking around basic searching techniques to enable delegates to conduct rapid searches that produce effective results

 

Noon-12.10pm: Questions and recap of morning session. Preview of afternoon sessions.

 

12.10pm-12.40pm: Break

 

12.40pm-1.40pm: Session Three: Investigating Websites, best practice and latest thinking around how investigate websites, how to access them, how to search them, what to look for and how to use any intelligence in a legal and ethical way.

 

1.40pm-2pm: Break

 

2pm-3pm: Session Four: Digital and Online images: an introduction to searching digital and online images and to concepts such as reverse image searching which enables investigators to establish the identity and or source of an image. Basic principles of evidence capture.

 

3pm-3.10pm: Summary of the day and preview of day two.

 

3.10pm: Day one finishes.

 

Day Two

9.50am-10am: Welcome and introduction, Carol Jenkins, The Investigator

 

10am-11am: Session One: Investigating Email and Email addresses, best practice around investigating emails and email addresses to prove the identity of an individual and other vital information which could provide useful to an investigation.

 

11.20am: Break

 

11am-Noon: Social Media sites: a look at the opportunities that various social media sites present that could provide vital intelligence for your investigation and advice on how best to search them.

 

Noon-12.10pm: Questions and recap of morning session. Preview of afternoon sessions.

 

12.10pm-12.40pm: Break

 

12.40pm-1.40pm: Searching online databases: a look at the wealth of database that can be accessed and searched for vital information for your investigation.

 

1.40pm-2pm: Recap of learning and open session for questions.

 

2pm: Course finishes

 

Course objectives and learning outcomes

Course Objectives

  • To provide learners with a comprehensive and operational introduction to conducting effective internet investigations using open sources information and techniques

 

  • To provide learners with all the relevant information needed to set up their computer to conduct effective and secure online investigations, paying particular attention to their digital footprint, personal safety and the integrity of the investigation.

 

  • To provide learners with the latest searching techniques and a thorough grounding of the legal and ethical implications of conducting open-source investigations

 

  • To provide learners with current opportunities to carry out effective searching of social media sites and the intelligence that can be gleaned from these sites.

 

  • To provide learners with an introduction to searching digital and online images and an introduction to the concept of ‘reverse image’ searching to enable them to establish the identity and or source of an image.

 

  • To provide learners with the relevant skills to investigate websites that might be relevant to an inquiry, how to access them, how to search them, what to look for and how to use any intelligence in a legal and ethical way.

 

  • To provide learners with the relevant skills needed to investigate emails and email addresses to prove the identity of an individual and other vital information which could provide useful to an investigation.

 

  • To provide learners with an outline of a number of databases that can be accessed and searched for vital information for your investigation.

 

Learning Outcomes

Attendance at the course will provide the following learning outcomes:

  • The learner will be competent in conducing effective internet investigators in a professional and ethically sound manner.

 

  • The learner will be competent in conducting effective internet investigations using relevant and industry-recognised open-source techniques that will ensure the integrity and efficiency of their investigations.

 

  • The learner will have the relevant skills to recognise the value of social media sites as an important intelligence source and to be able to search key sites in a proficient and ethical manner

 

  • The learner will have the relevant skills to conduct searches of digital and online images and to carry out reverse image searches to establish the identity and or source of an image.

 

  • The learner will have the relevant skills to investigate websites that might be relevant to an inquiry, how to access them, how to search them, what to look for and how to use any intelligence in a legal and ethical way.

 

  • The learner will have the relevant skills needed to investigate emails and email addresses to prove the identity of an individual and other vital information which could provide useful to an investigation.

 

  • The learner will have the relevant skills to search a number of open-source database for information for an investigation.

 

Our expert trainer

Our workshop will be led by established open-source trainer, speaker and investigator Neil Smith. He previously worked as an investigator in a UK force and now conducts internet investigations for a range of public and private sector organisations as well as teaching and giving presentations to law enforcement and other public and private sector organisations across the world. He has been working with the Investigator since our inception and has delivered many highly successful events that have been well-received by investigators in the UK and internationally.

HOW TO BOOK

Cost: £319.99 + VAT (GBP) per delegate (LEA and Government Agency rate).  £419.99 + VAT (Industry rate). 

Booking: Please send the delegates name(s), email address(es) and purchase order (made out to The Investigator) to booking@the-investigator.co.uk or telephone +44(0)844 660 8707 for further information. 

 

Under no circumstances will a delegate be able to register using a free webmail address (ie: gmail, Yahoo, Outlook, Hotmail, AOL etc) but you can use one to login into Teams once your work email has been verified.​

 

Payment can be made by PayPal/debit/credit card (corporate card fees apply + 3%). ​The meeting link will be sent out 7 days before the event.

bottom of page