Advanced Internet Investigations with Google Hacks!

The most intensive course in online investigations available anywhere, including using "Google Hacks".

About this course

Advanced Internet Investigations…with Google Hacks! takes you into all places in the Internet to find data, information, and intelligence to bolster your investigations.  This course covers a broad range of using the Internet as an investigative tool, advanced keyword searches, both Google and Bing search hacks, and online safety.  The course length is over 4 hours and 30 minutes.

 

An investigation that does not include using the Internet as part of the Investigative process is potentially missing a great amount of information that can be beneficial, if not critical, to a complete investigation.   Private databases, such as law enforcement databases, are inaccessible to the public.  However, the public, along with all investigators, have total unfettered access to the public areas of the Internet in regards to social networking Web sites, forums, chat rooms, blogs, and online groups.  This course gives that information to you.

 

Who will benefit from this course?

  • Law enforcement officers, investigators, and special agents
  • Gang unit members, narcotics officers, and school resource (DARE) officers
  • Private investigators
  • Managers, supervisors, human resource officers
  • Intelligence analysts

Course requirements

  • Basic computer skills.
  • Internet  access

This course is not a “digital forensics” course, and  can even benefit forensic analysts if their duties also involve investigations of persons or businesses.  The methods and software in this course comprise a complete package of becoming an expert Internet research analyst.

 

Course Details

This course has been taught to hundreds of local, state, and federal law enforcement officers from the United States and Canada.  The techniques demonstrated in this course are in current practice by all levels of the government investigative agencies and private investigative firms.  This course has also been taught in a previously “watered-down” format to law firms that have asked to learn advanced Internet searching methods for case development.  This online course is not watered-down and is the same course that has been taught to restricted government agencies behind closed-doors.

 

If you are a criminal investigator or private investigator, this course gives you everything you need to know to effectively use the Internet as an Investigative tool in all of your cases.  For others requiring information for pre-employment background investigations, personal security searches, or penetration testing of confidential corporate information, the techniques and methods demonstrated can fulfill nearly any investigative requirement to find information on the Internet. 

 

Internet searches:  Advanced Google searches using Boolean search terms and searches known as “Google Hacks” and “Bing Hacks” will be demonstrated.  Students will have access to a downloadable, sortable, and searchable spreadsheet containing over 8,000 hacks to aid in Internet searching and focusing results to information not otherwise able to be found.

 

Investigative methods:   Keeping track of your searches and gathering information using organized methods and software (commercial, open source, and freely available software applications) are demonstrated and recommended.  Instruction on corroborating information, eliminating false leads, and maintaining ethical standards are stressed throughout the course.  The methods taught will help keep you from being overwhelmed with information or falling into “rabbit holes” of bad leads and inaccurate information. 

 

Social media investigations:  Learn about the most popular social networking Web sites and how to navigate each social media service provider to thoroughly investigate and gather intelligence. 

 

The Dark Web and the Deep Web:  Experience entering the Dark Web to search hidden Web sites, the Internet underground and marketplace using safe techniques to reduce the risk of system compromise due to malicious software.  Learn how criminals use the Dark Web to commit crimes and hide their identity. 

 

Privacy awareness:  Throughout the course, students will be introduced to methods of protecting personal information and increasing their safety online and in the physical world. 

 

Evidence collection:  Methods to collect electronically stored information (ESI) from Web sites in a manner that will meet or exceed evidence collection standards.   Methods of collecting evidence demonstrated include commercial, free, and open source software applications.

 

 Internet Protocol (IP) Addresses:  A basic framework of IP addresses as it relates to Web sites and e-mail.  

 

Electronic Surveillance:  Oral intercepts (wiretaps), Pen Registers, and Keyloggers are discussed in a manner of instruction, but not for the purpose of employing electronic surveillance methods.

 

Minimizing Your Footprint on the Internet:  Learn how to reduce the amount of your personal information online, reduce the risk of identity theft, and prevent compromise of your online investigation with covert techniques.

 

Ethics: Information and guidance on ethical use of Internet research as well as policy creation guidance for corporate and government agencies is discussed to reduce the risk of unethical behavior and ramifications of misused information. 

 

Supplemental files: 

Sortable Excel spreadsheet containing over 8,000 “hacks” and advanced search operators for both Google and Bing. 

 

More information is covered in this course than a simple “Internet searching” course.  As this course contains methods taught and in use by all levels of investigative agencies, the methods are powerful, useful, and pertinent to nearly all investigations. 

 

 

Your Instructor

Brett Shavers is a former law enforcement investigator and digital forensics expert.  He has authored two books on both digital forensics (X-Ways Practitioner’s Guide) and high tech investigations (Placing the Suspect Behind the Keyboard) as well as having taught as an adjunct university instructor for the University of Washington’s Digital Forensics program.  Brett has taught variations the Advanced Internet Investigations course to hundreds of law enforcement officers over the past ten years and has combined the subjects into one comprehensive course in which students have lifetime access.

Curriculum

  • Course Introduction
  • Introduction
  • Introduction
  • Information and Intelligence
  • Publicly Available Information
  • Solving Crimes Using the Internet
  • Crowdsourced Investigations
  • Methodology of Online Investigations
  • Avoiding Rabbit Holes and Scope Creep
  • Tying a Person to a Computer
  • An IP Address (or e-mail) is not a Person
  • Configure Your Internet Browser as an Investigative Tool
  • Configure Your Internet Browser as an Investigative Tool
  • Searching Tools
  • Advanced Google Searches
  • Google Hacks!
  • Automated Search Tools
  • Social Networking Intelligence
  • Searching for a Person
  • E-mail
  • E-mail
  • Anonymity on the Internet
  • TOR and The Dark Web
  • Geolocation
  • Geolocation
  • Metadata - Photos
  • The Marketplace on the Internet
  • Online Classifieds (Craigslist and others)
  • HoneyPot
  • Setting a Trap With a Forum
  • Avoiding PitFalls
  • Pitfalls and False Flags
  • Personal and Family Safety
  • Personal and Family Safety
  • Professionalism
  • Ethical Considerations
  • Ethics
  • Going Beyond Publicly Available Information
  • Oral Intercepts (wiretaps), Pen Registers, & Keyloggers
  • **UPDATE** Fully Configured, Fully Bookmarked Packed Internet Investigations Browser
  • Short lesson on a cool pre-configured browser (and it's free!)
  • Oryon C Portable Documentation
  • Conclusion
  • Conclusion
  • Certificate of Completion

About this course

Advanced Internet Investigations…with Google Hacks! takes you into all places in the Internet to find data, information, and intelligence to bolster your investigations.  This course covers a broad range of using the Internet as an investigative tool, advanced keyword searches, both Google and Bing search hacks, and online safety.  The course length is over 4 hours and 30 minutes.

 

An investigation that does not include using the Internet as part of the Investigative process is potentially missing a great amount of information that can be beneficial, if not critical, to a complete investigation.   Private databases, such as law enforcement databases, are inaccessible to the public.  However, the public, along with all investigators, have total unfettered access to the public areas of the Internet in regards to social networking Web sites, forums, chat rooms, blogs, and online groups.  This course gives that information to you.

 

Who will benefit from this course?

  • Law enforcement officers, investigators, and special agents
  • Gang unit members, narcotics officers, and school resource (DARE) officers
  • Private investigators
  • Managers, supervisors, human resource officers
  • Intelligence analysts

Course requirements

  • Basic computer skills.
  • Internet  access

This course is not a “digital forensics” course, and  can even benefit forensic analysts if their duties also involve investigations of persons or businesses.  The methods and software in this course comprise a complete package of becoming an expert Internet research analyst.

 

Course Details

This course has been taught to hundreds of local, state, and federal law enforcement officers from the United States and Canada.  The techniques demonstrated in this course are in current practice by all levels of the government investigative agencies and private investigative firms.  This course has also been taught in a previously “watered-down” format to law firms that have asked to learn advanced Internet searching methods for case development.  This online course is not watered-down and is the same course that has been taught to restricted government agencies behind closed-doors.

 

If you are a criminal investigator or private investigator, this course gives you everything you need to know to effectively use the Internet as an Investigative tool in all of your cases.  For others requiring information for pre-employment background investigations, personal security searches, or penetration testing of confidential corporate information, the techniques and methods demonstrated can fulfill nearly any investigative requirement to find information on the Internet. 

 

Internet searches:  Advanced Google searches using Boolean search terms and searches known as “Google Hacks” and “Bing Hacks” will be demonstrated.  Students will have access to a downloadable, sortable, and searchable spreadsheet containing over 8,000 hacks to aid in Internet searching and focusing results to information not otherwise able to be found.

 

Investigative methods:   Keeping track of your searches and gathering information using organized methods and software (commercial, open source, and freely available software applications) are demonstrated and recommended.  Instruction on corroborating information, eliminating false leads, and maintaining ethical standards are stressed throughout the course.  The methods taught will help keep you from being overwhelmed with information or falling into “rabbit holes” of bad leads and inaccurate information. 

 

Social media investigations:  Learn about the most popular social networking Web sites and how to navigate each social media service provider to thoroughly investigate and gather intelligence. 

 

The Dark Web and the Deep Web:  Experience entering the Dark Web to search hidden Web sites, the Internet underground and marketplace using safe techniques to reduce the risk of system compromise due to malicious software.  Learn how criminals use the Dark Web to commit crimes and hide their identity. 

 

Privacy awareness:  Throughout the course, students will be introduced to methods of protecting personal information and increasing their safety online and in the physical world. 

 

Evidence collection:  Methods to collect electronically stored information (ESI) from Web sites in a manner that will meet or exceed evidence collection standards.   Methods of collecting evidence demonstrated include commercial, free, and open source software applications.

 

 Internet Protocol (IP) Addresses:  A basic framework of IP addresses as it relates to Web sites and e-mail.  

 

Electronic Surveillance:  Oral intercepts (wiretaps), Pen Registers, and Keyloggers are discussed in a manner of instruction, but not for the purpose of employing electronic surveillance methods.

 

Minimizing Your Footprint on the Internet:  Learn how to reduce the amount of your personal information online, reduce the risk of identity theft, and prevent compromise of your online investigation with covert techniques.

 

Ethics: Information and guidance on ethical use of Internet research as well as policy creation guidance for corporate and government agencies is discussed to reduce the risk of unethical behavior and ramifications of misused information. 

 

Supplemental files: 

Sortable Excel spreadsheet containing over 8,000 “hacks” and advanced search operators for both Google and Bing. 

 

More information is covered in this course than a simple “Internet searching” course.  As this course contains methods taught and in use by all levels of investigative agencies, the methods are powerful, useful, and pertinent to nearly all investigations. 

 

 

Your Instructor

Brett Shavers is a former law enforcement investigator and digital forensics expert.  He has authored two books on both digital forensics (X-Ways Practitioner’s Guide) and high tech investigations (Placing the Suspect Behind the Keyboard) as well as having taught as an adjunct university instructor for the University of Washington’s Digital Forensics program.  Brett has taught variations the Advanced Internet Investigations course to hundreds of law enforcement officers over the past ten years and has combined the subjects into one comprehensive course in which students have lifetime access.

Curriculum

  • Course Introduction
  • Introduction
  • Introduction
  • Information and Intelligence
  • Publicly Available Information
  • Solving Crimes Using the Internet
  • Crowdsourced Investigations
  • Methodology of Online Investigations
  • Avoiding Rabbit Holes and Scope Creep
  • Tying a Person to a Computer
  • An IP Address (or e-mail) is not a Person
  • Configure Your Internet Browser as an Investigative Tool
  • Configure Your Internet Browser as an Investigative Tool
  • Searching Tools
  • Advanced Google Searches
  • Google Hacks!
  • Automated Search Tools
  • Social Networking Intelligence
  • Searching for a Person
  • E-mail
  • E-mail
  • Anonymity on the Internet
  • TOR and The Dark Web
  • Geolocation
  • Geolocation
  • Metadata - Photos
  • The Marketplace on the Internet
  • Online Classifieds (Craigslist and others)
  • HoneyPot
  • Setting a Trap With a Forum
  • Avoiding PitFalls
  • Pitfalls and False Flags
  • Personal and Family Safety
  • Personal and Family Safety
  • Professionalism
  • Ethical Considerations
  • Ethics
  • Going Beyond Publicly Available Information
  • Oral Intercepts (wiretaps), Pen Registers, & Keyloggers
  • **UPDATE** Fully Configured, Fully Bookmarked Packed Internet Investigations Browser
  • Short lesson on a cool pre-configured browser (and it's free!)
  • Oryon C Portable Documentation
  • Conclusion
  • Conclusion
  • Certificate of Completion