Fa White 1 Line 1 Out Trans

Get in touch

Contact Us
First
Last

Let's talk

**Please note that we can only take instruction via a Barrister or Solicitor, we do not take instruction directly from private individuals.

We are always interested in talking to experienced forensic scientists with a minimum of 5 years of forensic science work who are interested in working as Consultants to undertake ad-hoc work for us.

Call us

01235 774870

Email us

science@forensic-access.co.uk

Q
Home » Training » Open-Source & Social Media Intelligence (OSINT & SOCMINT) – Law Enforcement

Open-Source & Social Media Intelligence (OSINT & SOCMINT) – Law Enforcement

2 Days

The two-day fundamental awareness course instructs investigators, journalists, researchers, HR & vetting operatives on how to commence an OSINT investigation with some hints and tips along the way.

Get in touch

Contact Us
First
Last

Let’s talk

**Please note that we can only take instruction via a Barrister or Solicitor, we do not take instruction directly from private individuals.

We are always interested in talking to experienced forensic scientists with a minimum of 5 years of forensic science work who are interested in working as Consultants to undertake ad-hoc work for us.

Call us

01235 774870

Email us

science@forensic-access.co.uk

Q
Who is this Course for?
  • Police Forces
  • Legal Professionals
  • Journalists
  • Researchers
  • HR and Vetting Operatives
Course Topics

This Open-Source & Social Media Intelligence (OSINT & SOCMINT) course will cover these main topics:

  • What is Open Source & Social Media Intelligence – Overview of methods, definitions and descriptive on how and when best to use.
  • OSINT Infrastructure – What hardware, software, security, and connections does an investigator require. How to protect the researcher.
  • Legislation – Key legislation to consider when conducting research.
  • Challenges conducting UK OSINT – What challenges an investigator may face.
  • Mobile Emulation – Explanation around what options we can you use for mobile emulation.
  • Online Investigation – Key considerations from the start, how to design a strategy.
  • Web Browsers – Explanation, what are the options and difference benefits.
  • Search Engines – Explanation of using multiple search engines for research.
  • Research techniques (manual & automated) – Examples of research techniques, Boolean searching and advanced online searching.
  • Online Forums – Overview of forum searching.
  • Social Networks – Focusses on the current and trending social media applications and how we obtain data. For example, Facebook, Instagram, Tik-Tok etc.
  • Online False Identities (OFI) – How to create OFI’s and the management of them.
  • Email Investigation – How to conduct email investigations.
  • Username Investigation – Search usernames across surface web and links to profiles.
  • Email Data Breach Techniques – How to identify email data breaches and how we use this information in an investigation.
  • People Searching – Examples of people searching techniques.
  • Telephone numbers in investigations – Methods where we can use telephone numbers to gain intelligence.
  • Company Investigation – What company information can we achieve from OSINT.
  • Geo Locations and Mapping Tools – Wearable’s review & obtaining location-based information and how to present it.
  • Document Searching – Methods on how to conduct document searching.
  • EXIF / Meta Data Review – How to review EXIF and Meta Data.
  • Reverse Image Searching – Reverse searching of images on the internet and tools, add-ons that can assist.
  • Images Analysis – Further image analysis techniques and considerations.
  • Videos, YouTube & Live Streaming – Video capture techniques, Risks this can pose and explanation.
  • Domain Name Investigation – Descriptive of what information we can achieve.
  • IP Address Investigation – Geo locate IP address information and its limitations.
  • Wi-Fi Analysis – Wi-Fi investigation methods.
  • Government Databases – Other data bases that can help, support our research.
  • Cryptocurrency – General overview and basic awareness session.
  • Software Requirements – Software solutions are looked at more in depth. Risks and evidential Capture.
  • Evidential Capture – What products do we need to provide clients (Specific on area).
  • Documentation and Reporting – How we best present our research.

As this is a dynamic subject area some topics may be added/removed with current trends.

Legislation and Guidelines 

  • Association of Chief Police Officers (ACPO) Principles
  • Computer Misuse Act
  • Criminal Procedure and Investigations Act (CPIA)
  • General Data Protection Regulation (GDPR)
  • Regulatory of Investigatory Powers Act (RIPA) & Institute of Practitioners in Advertising (IPA)
FAQs

Do you offer bespoke training services?

Yes. We can offer training in all areas of forensic science, so please email us at training@forensic-access-group.co.uk to discuss your requirements.

How is payment for the course made?

Please email our Forensic Training Manager at training@forensic-access-group.co.uk to book your place.

Why should I choose Forensic Access for training?

This course is led by Senior Cell Site Analysis experts at our sister company, IntaForensics. Carl Osborne has designed a course to share his expertise from real-world experience in conducting digital investigations involving Open-Source & Social Media Intelligence (OSINT & SOCMINT).

How long does the course last?

This is a two-day course.

Course Location:

Reserve your place

register for training
First
Last
Forensic Access
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.