Description
One of the most common questions we receive is, "How do I make a covert (sock puppet) account?" This is usually followed by, "Why is Facebook rejecting my sock puppet?"
It's true, these days it can be extremely difficult to create an effective covert investigation account. Many social media sites use advanced techniques to check the authenticity of profile pictures, phone numbers, email addresses and your Internet Protocol address.
Investigating online means creating social media accounts. It is important that you create accounts that are anonymous and do not readily identify you. Why is this necessary? As investigators we need to create these online personas in order to:
- Protect our identity,
- Protect our families,
- Protect our file(s),
- Protect our organization,
- Our subjects know we go online to investigate them,
- Defense lawyers warn their clients that we monitor their online activity,
- People are now moving to more privatized sites and forums where you need to be invited to join.
This is NOT an online undercover course.
In this course you will learn:
- How to create an effective online covert account,
- How to defeat social media account checkers,
- The issues surrounding covert accounts,
- How to join online groups,
- The benefits of "burner" phones.
When Offered
- Online
- Anytime
- Course length: 1 week or approximately 3 hours
Who Should Take This Course
Any investigator that investigates online.
Cyber Training International reserves the right to restrict student access due to the sensitivity of the subject matter being taught as per our Course Policies.
Prerequisite
Familiarity with the Internet and social media.
Course Goals
Upon the successful completion of this program students will be able to:
- Create an effective covert account,
- Join all social media sites using these accounts,
- Recognize the investigative issues surrounding these accounts,
- Understand the need for organizational policy surrounding these accounts.
Resource Material
Students will require the following:
- Laptop or desktop that uses either the Windows, MAC or Linux operating system.
- A smartphone - preferably a repurposed phone (not a work or current personal phone). At the very least be able to access WiFi networks.
- Purchase a SIM card ($10) - preferable but not necessary
- Unrestricted Internet access.
Course Evaluation
Successfully joining various social media sites using your covert account.
Course Outline
Please note:
- This course is not offered by the college.
- Upon successful course completion the student will receive a course certificate issued by Cyber Training International.
Cost
$80.00 (+5% GST)
Please see our Course Policies & Requirements for details.
Module 1 | Covert Accounts | |
---|---|---|
Unit 1 | Copyright Notice | |
Unit 2 | Welcome | |
Unit 3 | Resources | |
Unit 4 | Course Equipment Requirements | |
Unit 5 | Policies and Procedures | |
Unit 6 | Ethical Questions | |
Unit 7 | What is a research account? | |
Unit 8 | Active vs Passive Research | |
Unit 9 | Building An Effective Account | |
Unit 10 | More Things to Think About | |
Unit 11 | Things To Avoid | |
Unit 12 | Social Media Platforms | |
Unit 13 | Final Thoughts |