This interactive training identifies and demonstrates over 100 free online resources that can aid anyone searching the internet with breaking through the traditional roadblocks. Participants will be shown how to "dig" into the internet for personal information about any target. While popular sites such as Twitter, Instagram, and Facebook are covered in detail (including techniques that legally access some "hidden" content), the presentation goes much deeper into the vast resources available online for researching personal information. Additionally, instructions for new real-time monitoring will be presented in great detail. Aside from web sites, other technologies such as document meta-data, reverse cellular caller ID, and Application Programming Interfaces (APIs) will be explained. These sources can also be used to conduct thorough background checks on potential employees or locate client vulnerabilities. All resources can be applied to domestic and international investigations. Many custom tools will be shared with the audience for free lifetime use.
Among many other techniques, the attendees will learn how to conduct the following queries:
- Conduct advanced search queries on dozens of search engines
- Identify users of private cellular telephone numbers
- Access restricted information through cached results
- Monitor live content and communication on all social networks
- Conduct thorough searches of all social networks
- Access content believed to be private on social networks
- Locate a target's long forgotten Facebook activity
- Search Geo Location data within Twitter, Flickr, and Instagram streams
- Reverse search photographs for additional copies and details
- Search historical deleted versions of websites
- Locate documents related to target subject
- Search online forums for communication
- View multiple satellite imagery and street views of any location
- Identify cropped and manipulated photographs
- Retrieve Caller ID information from any landline or cellular telephone number
- Identify all social networks in use by target username
The software session will demonstrate over 40 free software tools that will aid an internet searcher during any type of investigation. A custom portable web browser will be given to each participant that includes configured plugins that add new search features. These include reverse image location, automatic media download, instant screen capture, proxies, and many more. Additionally, the browser is configured to block website analytics that can divulge sensitive information about the searcher. Other software includes tools that clone websites, locate twitter data, recover deleted files, display historical versions of satellite mapping data, change an IP address, extract still images from videos, Track GPS devices, locate additional social networks, and identify metadata within online documents. Attendees will have full access to the entire collection of software demonstrated during the session.
The audience will also be shown how to use advanced technologies to assist with any type of research. Topics include identifying compromised email addresses, "spoofing" caller ID and email addresses, anonymous forwarding email addresses, anonymous forwarding phone numbers, identifying shortened links, monitoring online digital radio frequencies, locating stolen data phones, identifying rental vehicle information, discovering anyone's IP address, and more. All procedures will be explained from start to finish and links will be available to all participants.
A very basic understanding of internet searches and the presence of social networks.
Nothing is required. Students are allowed to bring computer devices, but this is not mandatory for the course.