While general Internet research appears simple, the Web can be very difficult to navigate when searching for timely, accurate, and actionable intelligence.

The complexities of the Internet can produce missing information, and a user’s safety, integrity, and privacy can be compromised if they are unaware of the inherent risks that come with online research and investigation.

The most comprehensive Internet research and intelligence e-learning program available, Using the Internet as an Investigative Research Tool™ equips students with the knowledge and techniques required to effectively use the Internet as an Open Source Intelligence, research, and investigation tool.

Module 1

Students are guided through many of the advanced search features of both popular and lesser-known search engines, and similar search portals. Learn about:

  • “Boolean” and “Enforced Term Operators”
  • Meta search tools
  • Web directories
  • Mining Open Source Intelligence tools
  • Browser options and configurations
  • Concept of Internet global language distribution
  • Differences between the Internet and the World Wide Web

Module 2

Building on Module 1 skills, this second module introduces the principles of open source research and the intelligence analysis process. Learn about:

  • Guidelines for the critical analysis of Internet-sourced information and dissemination of research results
  • The structure of Hypertext Markup Language (HTML)
  • How search engines index individual documents
  • Tools for website scanning, downloading, and translating
  • The Internet Archive
  • Identification of, and search for, IP addresses
  • WHOIS lookups
  • Online data storage tools (critical for the preservation and integrity of online-sourced materials and evidence)

Module 3

While delving into online environments that may be interactive, avoid detection by anticipating pitfalls and concealing your identity with:

  • Use of proxy servers and Web-based anonymizing tools

Piece together a “big picture” from fragmented information gleaned from “user-generated content” sites, such as:

  • Forums, discussion groups, and blogs

Understand the online “footprint” that is left behind when navigating through the Web. Ensure online safety and security while while conducting online investigations, with:

  • Desktop firewalls
  • Browser security updates
  • Spyware detection and removal utilities

Demonstrations, case studies, and interactive practical exercises accelerate learning, along with the examination of Web server log files and temporary Internet files.

Module 4

Focusing on the future of the Information Age, students will explore Web 2.0 & 3.0 technology, and take advantage of the attitudes and practices of the new generation of Internet users. Learn about:

  • Email tracing, automated feeds, online chat, and instant messaging
  • Online media
  • Mobile communication technology, wireless Internet access, and Internet-specific crime trends
  • Online gaming sites, where real money expended in a virtual environment creates a new area of engagement for the justice system

Examine personal privacy and data security, in relation to:

  • Identity theft – including phishing, pharming, blue-jacking, and others
  • Online auctions
  • Investigative aids, such as RSS feeds and other automated search technology

Use essential “aide memoirs”, which provide a framework for all online investigations, including:

  • TII’s “Online Investigator’s Checklist™”
  • TII’s “Online Research Framework™”
Back to E-Learning Courses