Virtual Self-Paced 2 Day Class - Social Media & Online Investigations w/ Nighthawk
A virtual self-paced 2 day class ($450) that a student can complete by watching a pre-recorded 2 day virtual class while completing hands-on practical’s.
Access to virtual class material and recordings for up to 60 days or until completion of class (whichever occurs first).
This class is only open to Law Enforcement, Government Crime Analysts, Prosecutors/District Attorneys, and government criminal investigators.
The class is designed for students to learn the skills needed to conduct internet-based investigations along with obtaining data from Social Media companies with a court order. Students will be introduced to Open-Source Intelligence Techniques (OSINT) that can be used to obtain evidence and information about offenders without the need for legal orders. Students will be introduced to Internet Protocol, Advanced Google Search Techniques, and creating online identities for Online Investigations.
Students will work with a forensic mapping tool to analyze Snapchat geolocation data and LeadsOnline Nighthawk to analyze social media and geolocation data.
Students who don’t have a Nighthawk account can contact LeadsOnline to request a free trial at support@leadsonline.com. Advise LeadsOnline that you are taking the self-paced class thru Hi-Tech Investigations.
Hi-Tech Investigations is a trusted training partner with LeadsOnline.
Students who complete this course will receive a training certificate along with a 10% discount off 1 future in-person or virtual Hi-Tech class (limit 1 per paid student).
Click the Learn More button to create your Hi-Tech online account and then to pay for the class via credit card. Make sure you pay for the class using the student’s Hi-Tech online login.
Email training@hi-techinvestigations.com to pay via check and to also inquire about a discount for multiple students ($75 off the 2nd purchase and additional purchases per agency).
-
-
Part 1 - Introduction to class, resources, & intelligence companies
Students will be introduced to the class material and outline for the two days of instruction. Students will be provided with federal and local resources to help their investigations. Students will be introduced to paid intelligence companies that can provide useful records.
Please download the student files using the download link in this lesson.
To contact the instructor, email training@hi-techinvestigations.com
Students will be introduced to the class material and outline for the two days of instruction. Students will be provided with federal and local resources to help their investigations. Students will be introduced to paid intelligence companies that can provide useful records.
Please download the student files using the download link in this lesson.
To contact the instructor, email training@hi-techinvestigations.com
-
Part 2 - Social Media Investigations & Browser Add-Ons/Extentions
Students will be shown various browser add-ons and extensions that they can use to help in online investigations. Students will be shown how to add and use browser extensions for Firefox and Google web browsers. Students will be introduced to different social media companies and shown examples of how social media can help capture crimes and suspects.
Students will be shown various browser add-ons and extensions that they can use to help in online investigations. Students will be shown how to add and use browser extensions for Firefox and Google web browsers. Students will be introduced to different social media companies and shown examples of how social media can help capture crimes and suspects.
-
Part 3 - Snapchat
Snapchat will be discussed in this part. Students will first be given instruction on how to identify a Snapchat account, preserve the account records, and how to send a search warrant to Snap Inc using their Law Enforcement web portal. Search warrant language will be discussed. Different data Snap collects of their customers will be discussed.
Snapchat will be discussed in this part. Students will first be given instruction on how to identify a Snapchat account, preserve the account records, and how to send a search warrant to Snap Inc using their Law Enforcement web portal. Search warrant language will be discussed. Different data Snap collects of their customers will be discussed.
-
Part 4 - Facebook & Instagram
Facebook and Instagram will be covered. Students will be shown what type of data Meta Platforms keeps of their customers. Students will be shown how to properly identify a Facebook/Instagram user account, preserved the account, and obtain records via a search warrant using Meta Platforms Law Enforcement web portal. Various free websites will be discussed that can help identify accounts and posts of subjects. Read world examples will be provided.
Facebook and Instagram will be covered. Students will be shown what type of data Meta Platforms keeps of their customers. Students will be shown how to properly identify a Facebook/Instagram user account, preserved the account, and obtain records via a search warrant using Meta Platforms Law Enforcement web portal. Various free websites will be discussed that can help identify accounts and posts of subjects. Read world examples will be provided.
-
Part 5 - TikTok, Reddit, X Corp, Discord, Kik
Other social media platforms to include TikTok, Reddit, X Corp (formerly twitter), Discord, and Kik will be discussed. Information on how to properly identify, preserve, and obtain records from via search warrants will be discussed. Open-source websites to better search and locate evidence from these Social Media companies will also be discussed.
Other social media platforms to include TikTok, Reddit, X Corp (formerly twitter), Discord, and Kik will be discussed. Information on how to properly identify, preserve, and obtain records from via search warrants will be discussed. Open-source websites to better search and locate evidence from these Social Media companies will also be discussed.
-
Part 6 - Google Earth Pro Setup & Snapchat Practical Instructions
Students will be guided on how to download and setup Google Earth Pro. Students will then be shown how to use Google Earth Pro and how to import a KMZ file to view Snapchat location data that was processed using LeadsOnline Nighthawk. Students will then be given instruction on how to complete the hands-on practical using Snapchat location data.
Students will be guided on how to download and setup Google Earth Pro. Students will then be shown how to use Google Earth Pro and how to import a KMZ file to view Snapchat location data that was processed using LeadsOnline Nighthawk. Students will then be given instruction on how to complete the hands-on practical using Snapchat location data.
-
Part 7 - Snapchat location practical review
The Snapchat location practical will be discussed. Students will be shown what location data could have been discovered to show estimated travel and locations for the three suspects. The students will be shown how location pattern analysis can be performed to identify suspects based on their residence and work locations.
The Snapchat location practical will be discussed. Students will be shown what location data could have been discovered to show estimated travel and locations for the three suspects. The students will be shown how location pattern analysis can be performed to identify suspects based on their residence and work locations.
-
-
-
Part 8 - Social Media Records in Nighthawk
Students be introduced to LeadsOnline Nighthawk. Students will be shown how to access their Nighthawk account and how to view active cases. The technical support/help area will be discussed along with preserving and obtaining legal demands in Nighthawk and the LeadsOnline toolbox. Students will be shown what type of data Nighthawk supports. Students will be guided on how to create a case in Nighthawk, create subjects, and how to load social media records.
Students be introduced to LeadsOnline Nighthawk. Students will be shown how to access their Nighthawk account and how to view active cases. The technical support/help area will be discussed along with preserving and obtaining legal demands in Nighthawk and the LeadsOnline toolbox. Students will be shown what type of data Nighthawk supports. Students will be guided on how to create a case in Nighthawk, create subjects, and how to load social media records.
-
Part 9 - Analyzing Social Media records in Nighthawk
Students will be instructed on how to make a bookmark in Nighthawk and how to visualize their digital data. Students will be shown how to use the Interaction Network Diagram, Count-By Tool, and Interaction Frequency reports to identify evidence and communication with other Social Media users.
Students will be instructed on how to make a bookmark in Nighthawk and how to visualize their digital data. Students will be shown how to use the Interaction Network Diagram, Count-By Tool, and Interaction Frequency reports to identify evidence and communication with other Social Media users.
-
Part 10 - Visualizing Social Media data in Nighthawk
Students will be instructed on how to use the List Tool and SIFT Tool to locate evidence in Social Media data. Students will be shown how to view media files in communication using the SIFT tool. Students will be shown how to use the map to view geolocation data, use measuring tools, and viewing the cell site density.
Students will be instructed on how to use the List Tool and SIFT Tool to locate evidence in Social Media data. Students will be shown how to view media files in communication using the SIFT tool. Students will be shown how to use the map to view geolocation data, use measuring tools, and viewing the cell site density.
-
Part 11 - Word List Exercise & Social Media Exercise
Students will be instructed on how to use the Word List to locate evidence of crimes. Students will then be shown how to tag located evidence and then later how to view this tagged evidence in the SIFT tool which can be exported and shared. Students will then be given time to complete the Social Media exercise.
Students will be instructed on how to use the Word List to locate evidence of crimes. Students will then be shown how to tag located evidence and then later how to view this tagged evidence in the SIFT tool which can be exported and shared. Students will then be given time to complete the Social Media exercise.
-
Part 12 - Social Media Exercise Review & Creating A Storyboard
The Social Media exercise will be reviewed. Students will be shown evidence that was available to be discovered from the geolocation data and communications. Students will then be shown how to create a storyboard in Nighthawk and a case export.
The Social Media exercise will be reviewed. Students will be shown evidence that was available to be discovered from the geolocation data and communications. Students will then be shown how to create a storyboard in Nighthawk and a case export.
-
Part 13 - Undercover Social Media Accounts
Students will be instructed on best practices in creating an undercover social media account. Creating profile photos and fake personas will be discussed. Multiple free websites and resources will be provided along with protecting yourself online.
Students will be instructed on best practices in creating an undercover social media account. Creating profile photos and fake personas will be discussed. Multiple free websites and resources will be provided along with protecting yourself online.
-
Part 14 - Advanced Google Searches
Students will be instructed on techniques to search Google using advanced Google queries. Students will work hands-on using the different advance Google search terms to find information about subjects on the internet. Additional search engines will be discussed.
Students will be instructed on techniques to search Google using advanced Google queries. Students will work hands-on using the different advance Google search terms to find information about subjects on the internet. Additional search engines will be discussed.
-
Part 15 - Internet Protocol & Internet Service Providers
Students will be introduced to Internet Protocol and how IP addresses can be traced. Static and Dynamic IP address will be discussed along with mobile device IP addresses. Students will be provided with free online websites to identify the Internet Service Provider from an IP address and how to locate a sender IP address from an email header. DNS website searches and wireless network locations will be discussed.
Students will be introduced to Internet Protocol and how IP addresses can be traced. Static and Dynamic IP address will be discussed along with mobile device IP addresses. Students will be provided with free online websites to identify the Internet Service Provider from an IP address and how to locate a sender IP address from an email header. DNS website searches and wireless network locations will be discussed.
-
Part 16 - Dark Web Investigations
Students will be introduced to the Dark Web and various darknet sites. Students will be shown how to access the Tor Network along with security precautions. Various darknet illegal sites will be discussed.
Students will be introduced to the Dark Web and various darknet sites. Students will be shown how to access the Tor Network along with security precautions. Various darknet illegal sites will be discussed.
-
Part 17 - Ride Share Companies
Students will be instructed on what type of data Lyft and Uber collects of their customers. Students will be instructed on how to obtain this customer data and how to analyze the data. A case example will be discussed on how to forensically map location data from rideshare companies.
Students will be instructed on what type of data Lyft and Uber collects of their customers. Students will be instructed on how to obtain this customer data and how to analyze the data. A case example will be discussed on how to forensically map location data from rideshare companies.
-
Part 18 - Open-Source Intelligence Techniques (OSINT)
Students will be instructed on Open-Source Intelligence Techniques (OSINT). Students will be shown numerous free OSINT websites that can be used to search for anything using the internet. Username searches, EXIF media, video downloaders, geolocation websites, and reverse image searches will be discussed. Students will be provided with ways to conduct searches of themselves to identify personal information on the internet and how to remove their data.
Students will be instructed on Open-Source Intelligence Techniques (OSINT). Students will be shown numerous free OSINT websites that can be used to search for anything using the internet. Username searches, EXIF media, video downloaders, geolocation websites, and reverse image searches will be discussed. Students will be provided with ways to conduct searches of themselves to identify personal information on the internet and how to remove their data.
-
Part 19 - Finale
This concludes class. Email the instructor to notify that you have completed watching all videos and have completed the hands-on exercises. A training certificate will be provided along with a 10% off discount code to use for 1 future in-person or virtual Hi-Tech class. Not transferrable to anyone else.
This concludes class. Email the instructor to notify that you have completed watching all videos and have completed the hands-on exercises. A training certificate will be provided along with a 10% off discount code to use for 1 future in-person or virtual Hi-Tech class. Not transferrable to anyone else.
-