An introduction to the Web as a research and intelligence tool for Financial Investigators, this
first module will guide students through many of the advanced features
of both popular and lesser known search tools. In addition to the use of
“Boolean” and “Enforced Term Operators,” which can significantly impact
the results presented by search engines, students will explore the use
of meta search tools and Web directories. Students will also be
introduced to a number of “Internet Geology” tools essential for mining
Open Source Intelligence from the “Deep Web.”


Building
upon the skills gained during Module 1, this second module will
introduce investigators to the principles of open source research and
the intelligence analysis process. As well as guidelines for the
critical analysis of Internet-sourced information, and the analysis and
dissemination of research results, students will examine the structure
of Hypertext Markup Language (HTML) and how search engines can (and
sometimes cannot) index individual documents. Web site scanning and
downloading utilities will be demonstrated, in addition to a number of
translation tools and the Internet Archive. IP addresses and WHOIS
lookups will also be introduced.


While
online, and in particular, when delving into unknown or possibly
interactive environments, the potential to inadvertently become involved
in an undercover operation or to begin communicating with other Web
users for the purposes of gathering evidence is a very real risk, with
very real legal and investigative consequences. Learning how to
anticipate and circumvent these online pitfalls is a skill which is
gained with experience, foresight and planning. In many of the online
environments examined within this module, the necessity to conceal or
obfuscate your identity may arise, and your familiarity with the safe
and effective use of proxy servers or Web-based anonymising tools will
assist in these situations. Finally, no online investigation should ever
be undertaken without the appropriate consideration given to online
safety and security. The use of desktop firewalls, browser security
updates, and spyware detection and removal utilities should be
compulsory, and investigators should have an appreciation of the online
“footprint” left behind when navigating through the Web with the
examination of Web server log files and temporary Internet files
demonstrated in this module.


With
a focus on the future of the Information Age, this module explores Web
2.0 technology and user-generated content, and examines how the
attitudes of a new generation of Internet users is changing the face of
the Internet beyond recognition. Email tracing, automated feeds, online
chat, and instant messaging are all explored, in addition to the
proliferation of online media, where the line between entertainment and
evidence can become blurred. Issues surrounding mobile communication
technology, wireless Internet access, and Internet-specific crime trends
are also examined in this comprehensive module.