This interactive training identifies and demonstrates multiple free online resources that break through traditional search roadblocks. Participants will not only be shown how to “dig” into the internet for personal information about any target but also how to connect attributes across multiple open source data points. While popular sites such as Twitter, Instagram, and Facebook are covered in detail (including techniques that legally access some “hidden” content), the presentation goes much deeper into the vast resources available for researching personal information. Aside from social networks, other technologies such as meta-data, reverse cellular info extraction, mobile app exploitation, and Application Programming Interfaces (APIs) will be explained. The participants will then take all resources available to them and learn how to create their own methodology through practical exercises. All resources can be applied to domestic and international investigations. A custom Linux operating system pre-configured for immediate use will be provided.


Conduct advanced search queries across dozens of resources simultaneously Access content believed to be private on Facebook Locate a target’s long forgotten Facebook activity Access restricted information through cached results Conduct thorough searches on all social networks
Monitor live content and communication on social networks Recover Twitter posts from deleted and manipulated accounts Identify users of private cellular telephone numbers from social networks Retrieve subscriber information from any landline or cellular telephone number
Reverse-search photographs and videos for additional copies and details Search historical deleted versions of websites View multiple historic satellite images and street views of any location Identify all social networks in use by target username Use Android Emulators to exploit content only available in apps Create custom operating systems to always have a clean investigation environment.


Let’s Empower Intelligence