Cyber Crimes Investigation and Digital Forensics Using OSINT tools and techniques 

1. Course Objectives

  • Usage of Social Media Intelligence paradigms on social media handles like Facebook. twitter, Instagram, LinkedIn etc for Cyber Crimes investigation
  • Review, monitor and evaluate search engine information from Google, Bing, Yahoo, and others from dark web for Cyber Crimes investigation
  • Monitoring information on Websites, Directories, search engines, meta search engines as well as review user activity on digital platforms for gathering information of the entities involved in the crime scenes.
  • Access old cached data from internet by means of Website analysis and data collection
  • Identify fake profiles, sock puppets, and fake emails, as well as mail addresses from social networks, or Google results.
  • Search for photographs and videos on common social photo sharing sites such as Flickr, Google Photos, etc. , by image analysis tools
  • Use Google Maps and other open satellite imagery sources to retrieve images of users' geographic location and establish connection between the suspects involved in a cyber-crime as per their Digital Foot prints for Cyber Crimes Investigation

2. Relevance of the course with NALSAR’s Mission and Goals with justification

The amount of data being pushed to the Internet each minute is staggering. There are millions of hours of videos, billions of images, and zitabits of text that cannot be indexed by a mere search engine algorithm. The indexing of the data is distributed complexly across the Web technologies - on Surface web, Deep web and Dark web of the internet. Understanding, capturing and investigating these kinds of data sources needs special skills in cybernetics; this is what this certification does. This course enables the Law students and Legal professionals to undertand the art of Cyber Crime Investigation in conjunction of application of Cyber Laws in the domain of Digital Forensics. The course starts with the process of collecting and analysing data from the confesticated Digital evidence and then quickly moves into investigating techniques to gain access to un-indexed data. It explains and practically demonstrates a broad array of Open-Source Intelligence (OSINT) tools, such as setting up an OSINT analysis platform, accessing data from surface web and deep web and exploring the world of dark web using encrypted web browsers on the internet.

This certification, being a foundational course in open-source intelligence (OSINT) tools and techniques, teaches participants how to find, collect, and analyse data from the Internet. Far from being a beginner class, this course teaches participants the OSINT framework to be successful in finding and using online information, reinforced with over 30 hands-on bootcamp exercises.

3. Prospective target group of learners

Law students, Legal Professionals, Law enforcement officers Etc

4. Course Outcomes

  • Provide a comprehensive overview on the main work processes and general techniques that are necessary for the accomplishment of intelligence gathering on Cyber Crime scenarios from social media platforms and handles and using OSINT;
  • Create an identified/anonymous presence to be used to conduct online investigative research and data collection;
  • Identify risks to users from OSINT data collection and explain countermeasures to be utilised in providing anonymity for users
  • Enhance and customize the art of using OSINT techniques suitable for the collection of information for intelligence and counter intelligence purpose ;
  • Strengthen the investigative methods, analysis, and distribution of information for the purpose of tackling all forms of crimes in clear web, social media, and dark web.

5. Modules Covered with detailed session plan

Learning Modules: Day Wise

Day -1 Cyber Laws and Open Source Intelligence Basics:
  • Introduction to Cyber Laws and Cyber Crimes (hacking, Cyber Terrorism , Pornography , ISP Liability and Case studies)
  • Electronic evidence and it admissibility in the court of Law ( Section 65B Indian Evidence Act)
  • Basics to Internet Governance in reference to web Technologies –Web3.0
  • Introduction to Digital Forensics and Cyber Crime Scene Management
  • Cyber Crime Investigation law and procedure
  • What is intelligence and OSINT
  • Exploring various technical aspects of various social media frameworks and their architectures.
  • Robin Sage – A powerful Social Engineering experiment
  • Information is Everywhere
  • Lab 1
    • Understanding Practice Hands on Usage of Autopsy | An Open-Source Digital Forensics Tool
    • Using OSINT to trace, track and identify a fake/ puppet profile on social media platforms and using various OSINT tools for intelligence gathering purposes.
    • Explore and report concurrent timelines, motivated posting activates for similar type of profiles and connect their histograms and audit trails to any malicious or mollified agenda against governance structure
Day-2: Tools and engines for use in your OSINT searches:
  • Introduction to Social media intelligence (SOCMINT)
  • Looking at websites for SOCMINT analysis and reporting
  • Understanding Web Search engines and indexing patterns.
  • Disposable Search Engines and impact its impact on Social Media Analytics.
  • FOCA, Cree.py & Maltego
  • Lab 2: Building your own Google Custom Search Engine for the purpose of SOCMINT analysis and reporting.
Day -3: Technical Scenarios and Use Cases:
  • Counter Intelligence and Defenses
  • Fake BBC news site and spreading misinformation
  • Attacking the Stock Market
  • General Petraeus and Clinton
  • Volkswagen emissions scandal
  • Mossack Fonseca (Mossfon)
  • Intelligence Gathering Recipe
  • Lab 3: Gathering intelligence on an organization in comprehensive manner.
  • Final Lab Assessment Test (FLAT)

6. Mode of Conduct of the course

Online Mode using Virtual Cyber Forensics Lab by assigning Virtual Machine’s to each enrolled Participant. The candidates should have a laptop / desktop with a minimum bandwidth speed of 1 Mbps during the programme.

7. Eligibility

Candidates who are pursuing graduation or had graduated are eligible to register.

8. Admission Procedure

Submission of Online Application Form along with the requisite fee.

9. Duration & Tentative Schedule

Duration: Three Days

Programme Dates:

Batch I - July 5th- July 7th, 2024

Batch II - July 12th- July 14th, 2024

The online sessions shall commence by 9:30 AM and shall continue till evening 6:00 PM.
There shall be four sessions a day. 
Each session shall be of two hours each. There shall a small break between each session.
There shall be a lunch break from 1:30 PM to 2:00 PM.  
All the sessions shall be recorded and made available to the students on a LMS portal on the same day.


Apply Before: July 11th 2024

10. Number of seats : 70

For the students of NALSAR : 10

In case, the number of enrolments’ exceeds 70 and if there are sufficient number of candidates for more number of batches, the University will continue the programme for more number of batches and the schedule will be intimated to the candidates immediately after closure of the admissions.

11. Fee Structure

Rs. 6,000/-

12. Mode of Assessment

Final Lab Assessment Test (FLAT)

13. Award of Certificate

Award of certificate may be a Certificate of Participation to the candidates who attend 75% of the sessions or Certificate of Completion to those who clear the assessment test with at least 50% marks

Dr.K.V.K.Santhy

Center for Cyber Laws and Forensics Sciences (CLFS)

NALSAR University of Law 

09985645594

clfs@nalsar.ac.in

fapjunk.com
okey oyna agario
tempobet giris