*Non-negotiable Prerequisite: SST Basic Digital Threat
Assessment 1 Day Training.

Further preparatory instructions for the Advanced DTA class will be provided in the registration email.

Advanced Digital Threat Assessment Training will build and expand significantly on the content covered during the prerequisite Basic DTA Training. Participants will leave with a concrete understanding of how to find and curate relevant digital information as is typically represented in a real-life digital threat assessment data gathering scenario. Major engagement and hands-on practice will take place as participants are assembled into investigative teams and given a mock real-life scenario.

The final practical assignment will consist of working collaboratively as a team to navigate the realms of the social media world using both familiar and new techniques to produce a digital baseline report using a template. Participants will receive templates and supplied standard operating procedures to leave with confidence in being able to independently establish a threat makers’ digital baseline and produce a comprehensive report.

Advanced DTA Learning Outcomes:

Privacy

  • Personal vs. Professional vs. Research accounts and policy.
  • Staff Safety: Safeguards to protecting yourself and your personal information.
  • The wealth of information that tech giants keep on users (Google, Facebook).
  • Guidelines to ensure no digital trail is left.

Utilizing the power of search engines and all investigative tools

  • Boolean search operators.
  • Setting up Google Alerts.
  • Cache data.
  • Webpage history.
  • The utility of Firefox and Chrome browser add-ons.

Digging deeper for information online

  • Username tracking.
  • Training your brain to see past the noise and overwhelming amount of social media content and focusing on relevant findings.
  • How to effectively establish a school, individual, and community digital behavioral baseline.
  • Where to start an online search to find as much relevant content as possible in a timely manner before it disappears: e.g. a bomb threat, school lockdown, cyberbullying.

Youth Investigations

  • Using social media to find a missing person (e.g. Snapchat, IP address logs).
  • Introduction to language analysis and strategic interviewing.
  • Dealing with online threat-related behaviors and anonymous threats.
  • Current best practices for teams dealing with sexting and sextortion related incidents as well as guidelines around education and awareness.
  • Law enforcement: “Need to know” regarding preservation and production orders.
  • Exigent circumstances: What are they? What information is provided when you are in a school emergency?

The vast smartphone world

  • Tracking capabilities and data stored.
  • Examining metadata of photographs.
  • Best practices for preservation of evidence/crucial data.
  • Reverse phone number searching.

Twitter

  • Geolocational specific Twitter searches (GPS coordinate searching): Drawing a geo- fence over your school and monitoring the digital heartbeat of your community.
  • Using 3rd party Twitter websites to find incredibly detailed data about a user.
  • Setting up your own Twitter dashboard: Automating your searches to save yourself time.

Facebook

  • Privacy implications of the evolving FB platform.
  • Personal vs. Professional Privacy.
  • How to locate publicly available data and dig DEEP.
  • Building sociograms for negative peer groups.

The Online Underground: Evil exists

  • ISIS recruitment: latest trends.
  • Inordinate knowledge: swatting and doxing.
  • Forums: 4chan and Reddit.
  • The basics of the dark and deep web.
  • Identifying young people on the pathway to criminal radicalization.

An accurate level of risk through the threat assessment process cannot be determined without considering the digital behavioral baseline of the threat maker(s). It is imperative to understand the tools and methods available to your threat assessment teams provided in this valuable training.