ASIS Webinar: Open Source Intelligence

You will never conduct an investigation in the same manner as you did before you attend this webinar. Touch points include the following: Surface and deep web searching; advanced online search techniques and strategies; online privacy / anonymity tools; counterintelligence techniques used by the criminal element; utilization of database systems; archiving tools and methods to obtain archived pages and hidden information; search techniques of blogs, social networks, and forums; geolocating; image recognition; transfer of large files; screen shot capabilities; and analysis, organization, preparation, and writing reports with the information developed.