Home

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Exploring the strategic impact of the ICO Digital Data Report on Policing

 

On 2nd July 2020, we ran a webinar for Senior Leaders to discuss the strategic impact of the Information Commissioner’s report on digital data and policing. 

The reality is that digital policing is no longer a specialist subject, it is everywhere and in every investigation. Yet the responses to this essential demand stream remain in the hands of a specialised few.

Our webinar discussed the far reaching consequences of the ICO report, provided key takeaways and signposted towards possible responses that will help drive the digital agenda forward across the policing landscape.

Please contact us for a summary of the webinar and the password to view the recording.

Information Commisioner's Office

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Instructed courses

All of our courses are available to be taught face to face in a classroom.

With the exception of the Drone Investigation course, these courses can also be delivered remotely, with a live feed from the instructor directly to your desktop. We are able to provide the same engaging, instructor-led training that our classroom sessions are renowned for – direct to your screen.

What’s more, we are passing on the savings from training without a classroom venue directly onto you!​

   DIGITAL INVESTIGATION COURSES

   CRYPTOCURRENCY COURSES

   MOSOVO COURSES

   DIGITAL FORENSICS COURSES

   OTHER COURSES

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Digital Tactical Advisor 1 (DTAC1)

(LAW ENFORCEMENT PROFESSIONALS ONLY)

DTAC1

This course is CPD Certified

Accredited CPD training means the learning activity has reached the required Continuing Professional Development standards and benchmarks. The learning value has been scrutinised to ensure integrity and quality. The CPD Certification Service provides recognised independent CPD accreditation compatible with global CPD requirements.

Our Digital Tactical Advisor One (5-day) course is aimed at detectives, intelligence officers, and other investigators who wish to enhance their knowledge and understanding of the digital environment, from both a risk and opportunity perspective within a criminal investigation.  

LEARNING OBJECTIVES

  • Describe the role of a Digital Tactical Advisor in the context of an investigation

  • Acquire communications data from telecoms service providers in accordance with the IP Act

  • Use MS Excel to perform basic data cleaning functions on communication data records

  • Produce annotated maps to show the locations of devices based on CDRs

  • Use non-intrusive open source intelligence techniques to assist in an investigation

  • Describe the operation of the internet and IP addressing

  • Navigate the darknet safely

  • Identify the investigative opportunities from a home wifi router

  • Enumerate the digital investigative opportunities in a number of scenarios

  • Give evidence at court with confidence

  • Mitigate confirmation bias in the context of a criminal investigation

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com.

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Digital Tactical Advisor 2 (DTAC2)

(LAW ENFORCEMENT PROFESSIONALS ONLY)

This course is CPD Certified

Accredited CPD training means the learning activity has reached the required Continuing Professional Development standards and benchmarks. The learning value has been scrutinised to ensure integrity and quality. The CPD Certification Service provides recognised independent CPD accreditation compatible with global CPD requirements.

The Digital Tactical Advisor Two (5-day) course is aimed at those who have completed the DMI course, or who have appropriate previous experience in digital investigations. More complex data sets are introduced, along with the necessity to overlay and compare them in order to draw robust evidential conclusions. Emphasis is placed on strategy, presentation of evidence, and documentation of process.

LEARNING OBJECTIVES

  • Gain confidence in acting as the Digital Tactical Advisor to the SIO for serious and major incidents;
  • Develop skills in strategy writing and documentation, including the acquisition and presentation of complex digital evidence to a court;
  • Understand more complex data sets such as IP logs, GPRS data, and Device Data Records;
  • Be able to deal with cases in which a defence expert may offer contrary evidence;
  • Recognise the evidential limitations of some digital evidence, and manage accordingly.

PREREQUISITES

Delegates wishing to attend the DTAC2 course should have completed the DTAC1 course, an equivalent digital investigation or DMI course, or be able to demonstrate relevant experience in the field of digital investigation tactics.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Cryptocurrency Investigation

Cryptocurrency-Investigation Tab

CITY & GUILDS ASSURED

Our City & Guilds Assured Cryptocurrency Investigation training is designed for anyone with a need to understand and investigate the ownership and use of cryptocurrencies such as Bitcoin.

The course is designed and delivered by Mark Laing, an experienced cybercrime investigator with decades of experience as a police detective. Delegates need no prior knowledge of cryptocurrency, as the course builds knowledge from the ground up with no expectation of a technical background.

Over the course of three days, delegates will learn about everything from the origins of Bitcoin in 2008 through to the current developments in the world of digital currencies. The training is constructed around a ‘Strategy of Deanonymisation’, empowering investigators to trace and identify users of anonymous currencies using freely available tools.

The course will also cover a number of essential topics including cryptocurrency wallets, on-ramps and off-ramps, search and seizure guidance, and mining. There are practical exercises throughout, including delegates creating their own wallets, culminating in a ‘mini-investigation’ in which delegates will be able to put their new skills to the test. As an extra challenge, there is an opportunity for delegates to compete in order to ‘steal’ a small amount of cryptocurrency from Mark!

Curriculum

  • History & context of cryptocurrency
  • The nature of Blockchain
  • The Bitcoin Core program
  • Cryptocurrency use-cases
  • Hashing
  • Cryptocurrency addresses
  • Keys & wallets
  • Cryptocurrency and OSINT
  • Mixers and tumblers
  • Ransomware
  • Block explorers
  • Address profiling
  • The anatomy of a transaction
  • The meaning & importance of a UTXO
  • Typical and atypical transaction types
  • Co-spending
  • Clustering & cluster tags
  • Deanonymising users
  • Retail exchanges

 

  • Peer-to-peer trading
  • ATMs
  • Vendors & merchants
  • Mining
  • The ‘mempool’
  • Transaction fees explained
  • Physical wallets
  • Hardware wallets
  • Software wallets
  • Hosted wallets
  • Search & seizure
  • Presentation of evidence

Bitcoin with magnifying glass isolated on white background

 

Learning Objectives

  • To introduce the history and global context of cryptocurrency;
  • To understand the fundamental concepts of a currency operated on a decentralized public ledger;
  • To recognise the investigative opportunities and limitations presented by blockchain;
  • To recognise the impact of anonymous addresses on efforts to trace funds;
  • To develop a defined strategy for the de-anonymisation of addresses, establishing lines of enquiry to identify the user of one or more bitcoin addresses;
  • To understand the role of ‘mining’ in the cryptocurrency environment, and the associated risks to infrastructure;
  • To fully understand how to identify and analyse a cryptocurrency transaction using free open source blockchain explorers;
  • To successfully use block explorers to trace criminal assets through multiple addresses;
  • To recognise the role public/private keys and how they are intrinsic to cryptocurrency;
  • To understand the potential for covert tactics that may be employed during an investigation;
  • To recognise the characteristics of a number of cryptocurrency wallets;
  • To understand the various ways in which cryptocurrency can be acquired (on-ramps), the ways in which it can be realised (off-ramps), and recognise the investigative opportunities that are created by both;
  • To evaluate both the legalities and practicalities of cryptocurrency seizures, and develop a ‘best practice’ for a number of scenarios;
  • To recognise the scale of cryptocurrency beyond Bitcoin, and identify key differences between Bitcoin and a number of ‘altcoins’.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Cryptocurrency Investigation - COMPLETE

 

This is a FIVE-day course, which comprises ALL of the learning objectives from:

  • the City & Guilds Assured 3-day Cyptocurrency Investigation course,
  • the Enhanced Cryptocurrency & Chainalysis Reactor Essentials 1-day course,
  • the Chainalysis Reactor Certification (CRC) 2-day course.

Two days of the course will be the Chainalysis Reactor Certification (CRC) which provides practitioners with the knowledge and skills to analyse and trace transactions on the Bitcoin blockchain. This training using Reactor—the tool of choice for investigators, compliance officers, analysts, and regulators.

LEARNING OBJECTIVES

  • The history, purpose, and current political status of bitcoin
  • The principles of blockchain and digital currency
  • Cryptocurrency addresses and different wallet types
  • The methods by which people buy and sell crypto-currency
  • The anatomy of a cryptocurrency transaction
  • Accessing and researching Blockchain data
  • Covert investigative tactics such as address monitoring and ‘dusting’
  • The process of mining, and the potential links to an investigation
  • Seizure and confiscation of cryptocurrency
  • Develop a defined strategy for the de-anonymisation of cryptocurrency addresses and wallets
  • Appreciate the similarities and differences between Bitcoin and several ‘altcoins’
  • Tumblers/mixers;
  • Understanding off-chain payment channels such as Bitcoin’s ‘Lightning’ network;
  • Case studies of cryptocurrency crimes, including a bitcoin investment scam;
  • Conduct transaction analysis and recognize key patterns
  • Leverage open-source intelligence (OSINT)
  • The COMPLETE course includes Chainalysis Reactor Certification – learn to use the world’s leading cryptocurrency investigation platform, after which you may take the CRC assessment to become a Certified user.

LEARNING OBJECTIVES

Cyptocurrency Investigation

  • To introduce the history and global context of cryptocurrency;
  • To understand the fundamental concepts of a currency operated on a decentralized public ledger;
  • To recognise the investigative opportunities and limitations presented by blockchain;
  • To recognise the impact of anonymous addresses on efforts to trace funds;
  • To develop a defined strategy for the de-anonymisation of addresses, establishing lines of enquiry to identify the user of one or more bitcoin addresses;
  • To understand the role of ‘mining’ in the cryptocurrency environment, and the associated risks to infrastructure;
  • To fully understand how to identify and analyse a cryptocurrency transaction using free open source blockchain explorers;
  • To successfully use block explorers to trace criminal assets through multiple addresses;
  • To recognise the role public/private keys and how they are intrinsic to cryptocurrency;

 

  • To understand the potential for covert tactics that may be employed during an investigation;
  • To recognise the characteristics of a number of cryptocurrency wallets;
  • To understand the various ways in which cryptocurrency can be acquired (on-ramps), the ways in which it can be realised (off-ramps), and recognise the investigative opportunities that are created by both;
  • To evaluate both the legalities and practicalities of cryptocurrency seizures, and develop a ‘best practice’ for a number of scenarios;
  • To recognise the scale of cryptocurrency beyond Bitcoin, and identify key differences between Bitcoin and a number of ‘altcoins’.

Enhanced Cryptocurrency & Chainalysis Reactor Essentials

  • Recap of cryptocurrency fundamentals & our Strategy of Deanonymisation
  • A closer look at tumblers/mixers
  • Understanding off-chain payment channels such as Bitcoin’s ‘Lightning’ network

 

  • Case studies of major cryptocurrency crimes, including the 2020 Twitter hack, the Silk Road billion-dollar seizure, and a bitcoin investment scam
  • Chainalysis Reactor Essentials training – including all major features of the software, and a temporary licence

Chainalysis Reactor Certification (CRC)

  • Understand Bitcoin transaction fundamentals
  • Conduct transaction analysis and recognize key patterns
  • Trace the origin and destination of bitcoin
  • Evaluate different categories of actors in the ecosystem
  • Apply techniques to identify services on the Bitcoin Blockchain
  • Leverage open-source intelligence (OSINT)
  • Solve real-world case studies using a full-spectrum of techniques
  • Learn how mixers operate and how to identify them
  • Understand the process of subpoena requests and responses

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Chainalysis Reactor Certification (CRC)

 

The Chainalysis Reactor Certification (CRC) credential provides practitioners with the knowledge and skills to analyse and trace transactions on the Bitcoin blockchain. This training using Reactor—the tool of choice for investigators, compliance officers, analysts, and regulators—is provided in a small virtual or in-person classroom setting over TWO days.

LEARNING OBJECTIVES

  • Understand Bitcoin transaction fundamentals
  • Conduct transaction analysis and recognize key patterns
  • Trace the origin and destination of bitcoin
  • Evaluate different categories of actors in the ecosystem
  • Apply techniques to identify services on the Bitcoin Blockchain
  • Leverage open-source intelligence (OSINT)
  • Solve real-world case studies using a full-spectrum of techniques
  • Learn how mixers operate and how to identify them
  • Understand the process of subpoena requests and responses

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Enhanced Cryptocurrency & Chainalysis Reactor Essentials

 

1-day – Remote delivery (max 20) or classroom (max 12)
For delegates who have previously completed our Cryptocurrency Investigation training, this one day additional training course is designed to cover more advanced elements of the topic, and provide a grounding in the use of Chainalysis Reactor, the powerful blockchain intelligence software.  Designed and delivered by Mark Laing, a Certified Chainalysis Training Partner and experienced cybercrime detective, the course will include a temporary training license to use Reactor during the training, giving you a hands-on experience of the tools.

LEARNING OBJECTIVES

  • Recap of cryptocurrency fundamentals & our Strategy of Deanonymisation
  • A closer look at tumblers/mixers
  • Understanding off-chain payment channels such as Bitcoin’s ‘Lightning’ network
  • Case studies of major cryptocurrency crimes, including the 2020 Twitter hack, the Silk Road billion-dollar seizure, and a bitcoin investment scam
  • Chainalysis Reactor Essentials training – including all major features of the software, and a temporary licence

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Cryptocurrency Awareness

Cryptocurrency

Developed in 2009, cryptocurrency has emerged as a way to store, send, and receive money anonymously. This anonymity makes it attractive to those who wish to use money for illicit purposes, as it removes the ability for investigators to rely on traditional financial investigation methods.

The 1-day Cryptocurrency Awareness course is delivered by a former police cybercrime detective,  experience of investigating the criminal use of cryptocurrency. It will cover the fundamentals of Blockchain, and how digital currencies work from the user perspective. You will learn the ways in which people may acquire cryptocurrency, how it is stored, and you will see first-hand how a transaction is completed.

After this, the course will demonstrate how the public nature of a blockchain gives unique opportunities to an investigator, in terms of tracing money and identifying users.  You will learn techniques that you will be able to use immediately, without need for any specialist software or equipment.

 

LEARNING OBJECTIVES

  • Understand how digital currencies work for a user
  • Develop an understanding around blockchain fundamentals
  • Recognise how to purchase, store and transact with cryptocurrencies
  • Understand what opportunities an investigator has available to them for tracing and identifying users.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

MOSOVO (5-day course)

(LAW ENFORCEMENT PROFESSIONALS ONLY)

 

Our MOSOVO courses are aimed at Law Enforcement only for those that monitor and investigate those members of society that are perceived to present a serious and credible threat to the general public.

This 5-day course will provide a comprehensive range of necessary skills and specialist knowledge in the digital environment to fully identify the relevant opportunities, whilst also weighing up the risks and safeguarding issues.

This course will develop existing skills focused on a specific types of offenders.

LEARNING OBJECTIVES

  • Understand ways in which a subject may hide their digital activities from their police management officer
  • What can be achieved by examining a home router
  • What can be achieved by using a wifi ‘sniffing’ program (non-intercept)
  • Recognising popular apps designed to hide online activity
  • Current trends in the distribution of IIOC
  • Awareness of the risks to management officers visiting subject premises
  • Three easy ways to spot a SHPO breach: recently used sites, deleted applications, and missing USB devices
  • Full home wifi router examination to identify undeclared devices
  • Acquiring further intel from router concerning filesharing applications
  • Using the command line on Windows machine to identify potential SHPO breaches
  • Triage tools to identify a breach (pre-device seizure only)
  • Internet of Things device recognition
  • App-based OSINT to identify social media profiles & potential victims
  • Darkweb familiarisation
  • Assessing the subject’s use of Social Media platforms using Open Source Intelligence tools & techniques
  • Understanding the legislation concerning the use of such techniques
  • Recognising how to use covert OSInt techniques safely, including tradecraft for the creation and maintenance of the false persona;
  • Understanding the investigative opportunities linking a subject’s internet use with IP and communications data

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

MOSOVO (3-day course)

(LAW ENFORCEMENT PROFESSIONALS ONLY)

MOSOVO Management of Serious Offenders and Sexual Offenders

 

Our MOSOVO courses are aimed at Law Enforcement only for those that monitor and investigate those members of society that are perceived to present a serious and credible threat to the general public.

This 3-day course will provide a range of necessary skills and specialist knowledge in the digital environment to identify the relevant opportunities, whilst also weighing up the risks and safeguarding issues.

This course will develop existing skills focused on a specific types of offenders.

LEARNING OBJECTIVES

  • Understand ways in which a subject may hide their digital activities from their police management officer
  • What can be achieved by examining a home router
  • What can be achieved by using a wifi ‘sniffing’ program (non-intercept)
  • Recognising popular apps designed to hide online activity
  • Current trends in the distribution of IIOC
  • Awareness of the risks to management officers visiting subject premises
  • Three easy ways to spot a SHPO breach: recently used sites, deleted applications, and missing USB devices
  • Full home wifi router examination to identify undeclared devices
  • Acquiring further intel from router concerning filesharing applications
  • Using the command line on Windows machine to identify potential SHPO breaches
  • Triage tools to identify a breach (pre-device seizure only)
  • Internet of Things device recognition
  • App-based OSINT to identify social media profiles & potential victims
  • Darkweb familiarisation

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

MOSOVO Awareness (1 day)

(LAW ENFORCEMENT PROFESSIONALS ONLY)

MOSOVO Awareness

Our MOSOVO courses are aimed at Law Enforcement only for those that monitor and investigate those members of society that are perceived to present a serious and credible threat to the general public.

This 1-day course will provide an awareness of the skills and required digital knowledge when managing violent and sexual offenders.

LEARNING OBJECTIVES

  • Understand ways in which a subject may hide their digital activities from their police management officer
  • What can be achieved by examining a home router
  • What can be achieved by using a wifi ‘sniffing’ program (non-intercept)
  • Recognising popular apps designed to hide online activity
  • Current trends in the distribution of IIOC
  • Awareness of the risks to management officers visiting subject premises’
  • Three easy ways to spot a SHPO breach: recently used sites, deleted applications, and missing USB devices

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.comm

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

OSINT

OSINT Tab

This course is CPD Certified

Accredited CPD training means the learning activity has reached the required Continuing Professional Development standards and benchmarks. The learning value has been scrutinised to ensure integrity and quality. The CPD Certification Service provides recognised independent CPD accreditation compatible with global CPD requirements.

Also referred to as Open Source Intelligence (OSINT) training, this FOUR-DAY course is aimed at investigators in all roles who have a need to search, identify, acquire, and evidence data that exists on the public internet.

LEARNING OBJECTIVES

  • Understand the structure of the internet, and be able to investigate domains and services;
  • Be able to acquire data in an evidentially robust manner;
  • Be able to identify evidence and intelligence across many social networks;
  • Understand other sources of publicly available data about individuals and other entities;
  • Be able to use mobile apps to add additional depth to research;
  • Be competent to investigate the evidence from the dark web, and trace cryptocurrency transactions;
  • Use freely available tools to investigate the integrity and origin of digital images;
  • Identify ways in which poor configuration of services can be exploited to acquire hidden data.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Open Source Refresher

This one-day Open Source Refresher is aimed at those who have previously completed an OSINT course, who wish to refresh their skills and learn something new. 

Open Source Intelligence and Investigation is an ever-changing world with some tools becoming defunct and new tools and techniques arriving on the scene and this course will help to build upon the skills you have.

 

LEARNING OBJECTIVES

  • Build upon previous training and experiences around Open Source Investigation;
  • Develop further skills around Browser usage and image investigations with further tools that become available;
  • Develop a further understanding around investigations as changes to Social Media Platforms evolve;
  • Recognise the potential opportunities through Apps and Source Codes;
  • Review defunct and new tools that may support your Open Source Investigations.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Core Digital Forensics

Core Digital Forensics

This comprehensive TEN-DAY course is for anyone wishing to learn core digital forensic skills.  There are no prerequisites for this course.

 

 

LEARNING TOPICS INCLUDE:

  • First Responder to Scene
  • What Occurs on Boot
  • The In’s and Outs of Digital Counting
  • The Structure of Your Evidence (Disks)
  • File Systems (FAT, NTFS, exFAT)
  • Capturing you Quarry (Acquisition, Validation)
  • Intro to Forensics
  • Hashing and Quick wins with Hash-sets
  • Looking through your Windows (Window Artefacts)
  • Windows Registry
  • Data of Data (metadata)
  • Compound files
  • Carving from Headers to Footers
  • Let me tell you a secret (encryption)
  • Lets Browse (Internet Artefacts)
  • A walk in your shoes (social footprint)
  • The New Postal Service (email)
  • Lets Share (P2P)
  • Way up there in the Clouds (Cloud data)
  • Your plan and strategy
  • Digital Evidence on the move (mobile devices)

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

ADF Certified Digital
Evidence Investigator Pro

ADF Solutions digital forensic experts designed the Digital Evidence Investigator PRO (DEI PRO) Certified User training to equip both technical and non-technical investigators with the knowledge and skills they need to use DEI PRO to immediately extract conclusive intelligence and evidence from mobile devices, computers and digital media. The class is self-paced. Learners typically take approximately 18 hours to successfully complete the exercises and the final certification exam.

Learn how to collect digital evidence beginning on-scene or in the lab. Students will learn how to configure Digital Evidence Investigator PRO, operate the digital forensic software, analyse and interpret the evidence and forensic results, and finish with a comprehensive report. This course contains a combination of lectures, videos, hands-on exercises, knowledge checks, and tests.

LEARNING TOPICS INCLUDE:

Digital Evidence Investigator

  • Introductions and getting started with digital evidence investigator
  • Triage and field use cases
  • Preserving digital evidence and the boot process
  • Installation and preparing a collection key
  • Introduction to the DEI PRO user interface
  • Using a collection key to extract digital evidence
  • Case Study 1: Child Exploitation – Quick Scan
  • Case Study 2: Child Exploitation – Targeted Folders
  • Case Study 3: Internet Scam
  • Case Study 4: Suspected Terrorism
  • File Identification
  • Case Study 5: Search Profile Lab
  • Advanced Concepts
  • DEI Final Exam

PRO Module: Mobile Device Investigator

  • Overview and terminology

  • Connecting a mobile device

  • Conducting a scan

    • Taking Screenshots

    • Search Profiles

    • Creating backups

  • Creating Mobile Search Profiles
  • Analysing Mobile Evidence
  • PRO Module Final Exam

A passing grade is required to obtain the ADF Digital Evidence Investigator PRO Certified User Certificate which will issue students with a Digital Evidence Investigator Certified User Certificate and a Mobile Device Investigator Certified User Certificate. 

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Cellebrite Certified Logical
Operator & Physical Analyst

This FIVE-DAY course comprises two days for Cellebrite Certified Logical Operator and three days for Cellebrite Certified Physical Analyser, and is designed for technically savvy investigators, digital evidence analysts and forensic practitioners.

NOTE: It is strongly recommended that students attending this course complete the Cellebrite Mobile Forensics Fundamentals (CMFF) course or test out, as well as the Cellebrite Certified Operator (CCO) course prior to attending.

LEARNING TOPICS INCLUDE:

CCLO

  • Introduction
  • Mobile Device overview
  • Mobile Device Trends
  • UFED4PC /Touch Overview
  • Logical Analysis & Bookmarking
  • Reporting

CCPA

  • Introduction
  • Media Filesystems and Encoding
  • Mobile Device Trends
  • Physical Analyser /Touch Physical Overview
  • Advanced Searching
  • Verification and Validation of Findings
  • Reporting on Findings
  • Plugin & Chain management
  • Challenges of Smart Devices

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Teel Tech Certification

Teel Tech logo

 

Teel Tech Chip-Off 2.0 provides students with a comprehensive education into performing forensics on memory chips used in today’s mobile devices and other media.

LEARNING TOPICS INCLUDE:

  • Chip-off Intro
  • Chip-off heat process
  • Characteristics of Flash memory
  • UP828 & UFS Programmers
  • Reballing BGA Chips
  • Non-heat Milling of BGA chips (removal)
  • Non-heat Polishing of BGA Chips (removal)
  • eMMC Boxes and Alternative reading tools
  • Package on Package chip removal

 

We pride ourselves on our ability to tailor any course to fit your needs and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Digital Support Advisor

(LAW ENFORCEMENT PROFESSIONALS ONLY)

Digital Support Advisor

Designed for public-facing first responders, including communications staff, community officers, and immediate / diarised response officers, DMA training is intended to create a minimum standard of awareness so that digital risks and opportunities are identified from the first moment of police contact.

 

LEARNING OBJECTIVES

  • Identify opportunities to gather digital intelligence from initial contact with the police;
  • Be able to advise the public on digital and cyber crime prevention and recovery.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Drone Investigation

Drone Investigation Tab

This course is CPD Certified

Accredited CPD training means the learning activity has reached the required Continuing Professional Development standards and benchmarks. The learning value has been scrutinised to ensure integrity and quality. The CPD Certification Service provides recognised independent CPD accreditation compatible with global CPD requirements.

For any investigator who has responsibility for ascertaining the origin, use, and criminal behaviour of a downed drone.

The Drone Investigation course will be delivered over 5 days if the delegate has no previous Digital Forensics experience with days 1 and 2 being utilised to certify them in the use of one of the Forensic Tools available.

 

LEARNING OBJECTIVES

  • Explain and understand the component parts of a drone and their purpose;
  • To explain and analyse the legislation that is relevant to drone usage;
  • Explain and identify Drone Control systems;
  • Critically analyse what information may be available from a drone;
  • Threat Vectors and criminal use of drones;
  • Evaluate and acquire data from a drone;
  • Critically appraise the value of data in terms of intelligence and evidence;
  • Presentation of data and any perceived limitations.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Digital Skills for Supervisors

Digital Skills for Supervisors

 

For supervisors in all roles, this workshop for up to fifty delegates underlines the need for digital investigation awareness across all disciplines of policing.

LEARNING OBJECTIVES

  • Gain high-level understanding of the broad range of digital investigation methods available;
  • Be able to apply methods and strategies to all elements of day-to-day policing;
  • Identify who in the organisation can provide specialist support in such areas.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Digital Skills for the Front Line

Digital Skills for the Front Line

This course is aimed at front-line officers and staff, who come into contact with victims and suspects on a regular basis. It is designed to provide digital skills awareness to maximise opportunities at the earliest stage of any investigation.

The specifics of this delivery will be developed in consultation with with the client, with a view to ensuring content is tailored to the needs of the delegates.

Organisational differences in processes and protocols are taken into account, so that delegates leave with an understanding of local policies and systems and how they apply to the digital aspect of any incident.

 

LEARNING OBJECTIVES

  • Provide knowledge around the digital world as it relates to everyday situations;
  • Understand the focus on the evidential opportunities that may be presented from first contact;
  • Discover how digitally profiling a subject influences an investigation;
  • Compare the impact of smart devices and associated applications;
  • Maximise communications data including internet derived data through RIPA workflows;
  • Assess the opportunities presented by public Wi-Fi and be aware of the limitations.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Digital Forensics & Disclosure

Digital Forensics & Disclosure

 

For any investigators who handle and/or process digital forensic products as part of the investigative process.

LEARNING OBJECTIVES

  • To have an appreciation as to the processes for extracting data from devices;
  • Classify and Choose what forensic output files are created;
  • Distinguish between what format an output file can be generated;
  • Appraise and effectively target certain elements within the generated products;
  • Construct reasoned intelligence or evidential conclusions.

We pride ourselves on our ability to tailor any course to fit your needs and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Communications Data Acquisition & Interpretation

Communications-Data Tab

This course is CPD Certified

Accredited CPD training means the learning activity has reached the required Continuing Professional Development standards and benchmarks. The learning value has been scrutinised to ensure integrity and quality. The CPD Certification Service provides recognised independent CPD accreditation compatible with global CPD requirements.

For investigators who seek to acquire, cleanse, and interpret cell site and internet communications data.

 

LEARNING OBJECTIVES

  • Understand the application process and legislative considerations needed for focused, objective-led communications data acquisition;
  • Maximise your effectiveness in the acquisition and analysis of communications data;
  • Recognise key identifiers in communications data records and location-based information;
  • Focus and analyse through the use of Excel functions and create supporting products;
  • Evaluate the information and draw inferences by maximising opportunities provided by digital identifiers and devices;
  • Effectively present data to an evidential standard suitable for court.

We pride ourselves on our ability to tailor any course to fit your needs and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

WiFi Router Investigation

Wifi router

The WiFi Router Investigation course is suitable for staff who may attend crime scenes to identify evidence of activity, including crime scene investigators, digital media investigators, sex offender managers, and dedicated search team staff.

LEARNING OBJECTIVES

  • Understand the operation of a home consumer router;
  • Identify what evidence and intelligence may be available via an inset examination;
  • Conduct an examination of a router, capturing evidence in a robust manner;
  • Identify limitations and fallacies associated with the tactic;
  • Be able to brief SIOs and interviewing officers on what can be proven by router data;
  • Identify data that may be of evidential value and present to a court.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Investigative Analyst Training

Investigative Analyst

 

Investigative Analyst training is open via both Remote Instructor led & Classroom

1 day – awareness session

2 day – upskilling course

5 day – training course

LEARNING OUTCOMES for the full 5 days:

  • Understand the value of an analyst within an investigation;
  • Demonstrate a working knowledge of the NIM and its impact on both proactive and reactive investigation;
  • Understand the need for evidential and intelligence separation;
  • Understand the need for strategy and support an SIO in the formulation of investigative hypothesis;
  • Demonstrate a need for a robust tasking processes and formulation of meaningful intel briefs;
  • Demonstrate an awareness of confirmation bias and how it can close the door to potential investigative opportunities if not managed;
  • Understand the vast array of disparate data available to an investigation (Comms, DF, OSINT, CCTV, ANPR, Witness testimony, Overt, Covert etc etc) along with the inferences which can be drawn;
  • Demonstrate layering of data to test an investigative hypothesis; 
  • Understand how anomalies within data if not measured correctly can create an adverse impact on an investigative outcome;
  • Demonstrate a comprehensive understanding of communications data and the production of a communications data strategy; 
  • Demonstrate a robust working knowledge of the MS Excel software and how features within the tool can be used to cleanse/interpret/interrogate CDRs; 
  • Demonstrate an understanding of what questions can be asked of Digital Forensics outputs along with parallel sourcing opportunities;
  • Demonstrate an understanding of how Open Source tasking can be utilised to test/validate/corroborate know facts;
  • Demonstrate how to produce an intelligence report with appropriate sourcing;
  • Demonstrate evidential report production for court purposes;
  • Understand the court process and demonstrate how to best prepare to present evidence in chief.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Digital Search & Seizure

Digital Search & Seizure

The Digital Search & Seizure course is aimed at staff across the organisation in a variety of roles including front line, supervisors, forensic scene investigators, POLSA officers as well as specialist teams. The theme of the course is taking a fresh look at the scene of a search, with a view to identifying the key digital opportunities that exist but may have thus far been overlooked.

 

LEARNING OBJECTIVES

  • Identify/Secure an electronic crime scene;
  • Dealing with witnesses and suspects at scenes;
  • Identify priorities within a scene;
  • Risk factors in relation to the loss of evidence;
  • Evaluate on site opportunities;
  • Provide strategic advice to SIO’s and colleagues;
  • Provide some guidance around business crime;
  • Experience the current development of our virtual reality crime scene.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Professional Investigation Skills

The Professional Investigation Skills course is for those work in any investigative role, whether the ultimate outcome of an investigation is a criminal trial, a civil court hearing, a tribunal, inquest, or any other internal or external process.  Experienced former police detectives will teach delegates the most effective and evidentially-sound ways to interview witnesses and suspects, take written statements, seize and handle exhibits, prepare case files and documentation, devise and document investigation plans that stand scrutiny, and present any such evidence to the highest standard in any court or hearing.

 

LEARNING OBJECTIVES

  • Be able to identify opportunities arising from an investigation;
  • Handle and seize exhibits in a robust fashion and maintain its integrity;
  • Show competence in taking written statements from witnesses;
  • Demonstrate an understanding of the processes around interviewing witnesses and suspects;
  • Demonstrate effectiveness with the use of questioning formats;
  • Understand obligations for case and file preparation;
  • Understand the principles of disclosure and audit records.

We pride ourselves on our ability to tailor any course to fit your needs, and have experience of bespoking all of our training to a variety of organisations and audiences.

For details of availability and pricing, or to discuss the delivery of a bespoke course for your organisation, please contact us at enquiries@bluelightsdigital.com

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

OUR TRAINERS

Our training team have a breadth of subject knowledge and extensive Digital Investigation experience on many high profile and complex cases.

Mark Laing

Technical Intelligence Director
and Head of Training

Mark is a former police detective, having served Lancashire Constabulary for eighteen years.

Combining his vast experience of major investigations and covert tactics with his deep understanding of technology, he can advise and consult on complex cases involving all types of digital evidence.

Mark has a number of qualifications relating to cryptocurrency investigation: C4 Certified Bitcoin Professional, Chainalysis CRC and CISC, and developed our City & Guilds Assured training in the subject. He also carries Ethical Hacking certification from the EC-Council  (C:EH) and is a City & Guilds Accredited RFPS Technician.

Paul Cook

Paul Cook

Digital Forensic Lead
and Technical Service Officer

Paul is one of the UK’s leading mobile device examiners. He has specialised in the digital investigation of counter-terrorist activity, has an MSC in Forensic Computing and Cybercrime Investigation and is also IACIS certified.

Paul’s knowledge of the use of all digital forensic laboratory tools is widely respected particularly in the use of the HancomWith suite.

Paul’s speciality and passion is the Extraction and Analysis of Mobile phone data. He has extensive experience in various extraction techniques such as ISP, Chip-off, Custom recovery and the use of other tools which are available to today’s forensic investigators.

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

Testimonials

Take a look at what some of our clients have said about us:

The best part of the programme was the style and delivery from the staff at Blue Lights Digital. They have transferred their passion for the subject to their products.

UK Law Enforcement Agency

Great knowledge and a great sense of humour. Kept the group engaged through their operational credibility and clear understanding of what is a complex subject matter.

UK Police Force

One of the best training sessions I have attended! Extremely personable and knowledgeable trainers explaining a difficult subject matter and made sense of it. Very applicable to just about every area of modern day policing. I just wish the course lasted longer.

Senior Policing Leader

In 22 years of policing I have not attended training provided by an independent training provider and had as much confidence in the trainers, their wealth of knowledge in the subject matter and the quality of delivery of the subject.

Detective Sergeant, ROCU

get in touch

Drop us a line or give us a ring. We'd love to hear from you and are happy to answer any questions.

    IASME GDPR selfcert badge 2017
    Cyber Essentials Certified

    The Officers Mess Business Centre, Duxford, Cambridgeshire,
    CB22 4QH

    (+44) 01223 919607

    ©2021 Blue Lights Digital Ltd
    All Rights Reserved