This two day (16 hour) course is designed to take you into the world of social media research and investigations in a safe and inconspicuous manner using an abundance of social media resources that are widely used but under-considered, as sources of information by most clients. Attendees are encouraged to bring their laptops to use in this class.
On day one you will learn how to safely prepare a computer to conduct research and investigations using the internet. You will learn how set up non-attributable computers which are critical to conducting cyber research and investigations of networks and/or tracking individuals via their social media profiles and posts, without leaving your identity and digital footprints for others to find. By the end of day one you will learn ammonization techniques to successfully conduct covert research and investigations.
On day two you will start your journey into understanding the various social media sites. You will discover many non-affiliated websites that provide detailed information of individuals and their activity contained on social media sites. You will go to social media sites and do live searches and mapping to where the user might be posting and their locations. You will be introduced to the use of Google advanced search techniques, uncovering detailed telephone information, details contained within blogging websites and the invisible web. You will learn various methods to securely capture and save the information you uncovered that will be used in your research and investigations. Finally, you will learn to capture videos from various social media sites, work with photographs and videos posted by your subject by learning the intricate digital footprints of where pictures were taken, their source and options available to see if they are being used elsewhere on the internet.
NOTICE: Due to the nature of searches some websites may contain graphic content including profanity, and sexual and violent images.
Attendee Requirements: Attendees are encouraged to bring a laptop computer configured with Windows XP, Windows Vista, Windows 7, Mac OS X, or Linux operating systems. The attendee’s must have full privileges to the use of the computer – including the ability to install software and applications within the operating system. Each attendee’s computer must have the ability to access a 802.11 b/g/n Wi-Fi network in an unrestricted or unfiltered nature. Please contact Denton Kidd if clarification is required on these class specifications.
Students will receive course handouts and a USB Flash Drive with free software and materials.
Welcome to Dataveillance
Dataveillance is a social media and open source intelligence research company that provides training to law enforcement, private sector legal community, and the corporate security and IT divisions of corporations in conducting cyber social media investigations and reconnaissance.
Social media and virtual environments are unexploited sources of data. Data gathered from social media will fundamentally alter the way police proactively patrol and investigate crimes, the way the legal community manages cases, vets prospective jurors and employers protect their assets.