This course is designed for online investigators, government agencies, human rights activists, PI’s and law enforcement personnel’s, lawyers, HR for background checks and verifications, investigative journalists Etc. The course teaches several approaches on finding information pages and data about persons, relations, businesses, assets and events for investigative purposes. The student of this course will learn through illustrations and hands-on simulations, how to develop “deep search queries” in complex web search? – Various methods, tools and software’s used in Online Information Forensics will be introduced. A student will learn techniques in verification of legit and authentic profiles, websites and how to separate fake news and fake videos. If you are tracking corporate ownership and corruption, web page activity, or mapping political influence, this guide is for you.
Course Outline
This book consists of four (5) Modules, providing you with the latest job-ready skills and techniques.
Social Media Information Sourcing & Verification
IMPORTANCE OF SOCIAL MEDIA AS INFORMATIVE SOURCE
- Social Media Facts to Reckon With
- Social Media Business Statistics
SOCIAL MEDIA DATA AS A PREDICTIVE TOOL FOR REAL-WORLD OUTCOMES
- Social Media Benefits for Researchers
- Social Media Trends
- Social Trends in Sociology
- Social Trends in Marketing
- Social Media Lifestyle Trend
- Socio-Cultural Trends
- Social Media Data Collection Methods
SOCIAL NETWORK DATA COLLECTION SOURCE
- Facebook Data
- Facebook “Trending”
- Social News Feeds are a Tailored Trend
- Social Data for you is Personalized
- Trending News from Social Media Vs Breaking News
- Facebook “News Feed”
- Facebook “Insight”
- Facebook “IQ”
- People Insight
- Vertical Insights
- Demographics overview
- Find out what people like
- Learn about lifestyles
- Facebook “Live”
- Linkedin Data
- What people are talking about now
- Suggested Stories in Your Feed
SOCIAL MEDIA CHECKS
- Issues with Social Media
- Identify the False Positives and Negatives of Information
- Violations of Terms and Conditions
- Discrimination
- Protected Activity
- Image Management
- Irrelevance
SOCIAL MEDIA FAKE INFORMATION DETECTION & VERIFICATION
- Detecting Fake Accounts in “Facebook”
- The Importance of Facebook “Likes”
- Buying “Fake Accounts” and Fake “Likes”
- How are Fake Facebook Accounts Created?
STEPS TAKEN BY FACEBOOK TO OVERCOME FAKE ACCOUNTS AND NEWS
- Accounts Operating Pattern Identification
- Mix of Third-Party Tools and Manual Flagging
- Video Content “Motion Scoring” Algorithms
- Still Images with Video Click Buttons
- Detecting and Diffusing “Engagement Bait”
- Detecting Fake Account through Facial Recognition
FACEBOOK TIPS TO SPOT FAKE NEWS [FAKE ACCOUNTS]
- Types of Fake Facebook Accounts
- Spam-bots
- Like-bots
- Stalkers
- Pseudonym Accounts
SHARED PAGE MANAGEMENT ACCOUNTS & AD BUYING ACCOUNTS
- Trolls
- Kid’s Accounts
- Anonymous Social Activists
- Impersonators
DETECTING FAKE – ILLUSTRATION OF A FACEBOOK PROFILES CREATED BY MARKETERS
- QUICK CHECK-LIST - “FAKE” SOCIAL MEDIA ACCOUNTS [EXAMPLE: FACEBOOK]
- Account Established Date
- Profile Details & Updates
- Profile Pictures
- Photo Album
- Timeline Details
- Comments
- Shares
- Likes
- Views
- Followings
- Groups & Community
- Friends and Connections
- Privacy Settings
- Upload Consistency
- Personal Wall
- Greetings & Compliments Frequency
- Enticing Videos or Photos
SOCIAL MEDIA SEARCH – TOOLS, UTILITIES & SEARCH QUERIES
- Querying in Linkedin Search Box
- Using Specialized Search Operators within LinkedIn Search Box
- LinkedIn Supported Search Operators
- Using Quotes ““, Booleans NOT, OR, AND, Parenthesis ( ) in LinkedIn
- Using Hashtags (#) on LinkedIn Search Box
- LinkedIn Search Tool
- LinkedIn Boolean Search Tool
- Internet Search (OSINT) Resource: LinkedIn Search Tool
- LinkedIn People Search Tools
- Google Advanced Search Queries for Searching Linkedin
GOOGLE SEARCH QUERIES FOR FACEBOOK & LINKEDIN
- When you know the name of a person
- When you know the first name and cannot remember the last name or middle name
- When you don’t know the exact name, alias, abbreviations used in the email address
- Sample Queries that can work to find Email Addresses
- Email Address Search Applications and Information Portals
- Email Search Software – For Leads Collections
- Personal Information & Background Check Software’s
SOCIAL MEDIA SEARCH ENGINES AND SOCIAL MEDIA INFORMATION RESOURCE
- List of Social Media Search Engines and Social Media Information Resources
Email Tracking & Verification
EMAIL TECHNOLOGY & READING EMAIL HEADERS
- Email Source Verification
- Email Technology – A Quick Overview
- Email Technology – How Emails are Sent and Received?
- Identification of various Email Messaging Components revealed inside “Email Header”.
- Identifying Legit Email Messaging Servers.
EMAIL TRAFFIC IN INTERNET CLOUD
- DNS resolution (Domain Names Resolution) and transfer process
- Basic Email Messaging Components in Email Header
- A Message Enclosed in an Envelope
- Message Header Fields
- The Date Field
- The Subject: Field
- The Return-Path
- The Received field
- The Reply-To field
- The IP Address
- Public IP Address
- Private IP Address
- IP Address Ranges of Private IP’s
- Dkim-Signature & Domainkey-Signature
- Message-id
- Mime-Version
- Content-Type
- SPF (Sender Policy Framework)
- X-Spam-Status or Spam Class
- Illustration of “Spam Detection Software” with [X] Values
- Partial Headers Vs Full-headers
- Partial Headers
- Full Headers
- Illustration [Full-Header] IP Detection and Identification of Private & Public IP’s
- Full Header Example [GMAIL HEADER]
- From (Senders Envelope) and from: (with a colon)
- The “From” and “From:” address match example:
- Sender
- Comment
- Illustration when Other Mailers Insert their Own Authentication Information in the Headers
- Illustration [Full-Header] Masked or Alias Email Address in Gmail
- Finding Full-Email Headers in Email Clients
- Webmail
- Microsoft Outlook 2010/2013/2016
- Mac Mail:
- Mozilla Thunderbird:
- Windows Live Mail, Windows Mail or Outlook Express:
- Gmail
- Yahoo
EMAIL SPAMS, PHISHING, SPOOFING, AND SCAMS
- Spam
- Phishing
- Types of Phishing
- Spear-phishing
- Phishing
- Spoofing
- Scams
- Affinity Fraud
- Binary Options
- Boiler Room Scams
- Emergency Scam / Grandparent Scam
- Employment Scams / Secret Shopper Scam
- Exempt Securities Scam / Accredited Investor Scam
- Foreign Exchange (FOREX)
- Gift Card Scams
- Identity Fraud
- Identity Theft
- Mortgage Fraud
- Offshore Investment
- Oil and Gas or Natural Resources
- Pension Scam
EMAIL ORIGIN VERIFICATION METHODS AND EXAMINING TOOLS
- Email Origin - Verification Tools
- Email Header Sorter and Organizer Tool
- Examining a Phishing Email – Example 1 [Fictitious Lotto Scheme]
- Email Header MTA Servers “Email Hops/Path Analysis Tool”
- Sender’s MTA Server Physical Location Trace with IP
- Email Servers Reputation Intelligence Tool
- Spamming Reputation Authority Check
- Spammers Reputation Database Checks
- Tool to Check DNS Mapping with IP via “Reverse DNS Lookup” or DNS Authentication
- The Random Email Address and Temporary Email Addresses for Spamming
- Temporary Random Email Address
BUILDING EMAIL SEARCH QUERIES
- When you know the name of a person
- When you know the first name and cannot remember the last name or middle name
- When you don’t know the exact name, alias, abbreviations used in the email address
- Sample Queries that can work to find Email Addresses
- Email Address Search Applications and Information Portals
- Email Search Software – For Leads Collections
- Personal Information & Background Check Software’s
Fake News Content Verification - Methods, Tools & Techniques
NEWS INFORMATION SOURCE
The content researched from digital news and newspaper archives is being used by a large cross-section of researchers. These include academics, students, scholars, historians, journalists, content writers, professionals like lawyers, investigators, banks, financial institutions, insurance companies, actuaries, economists and analysts. It is important for the students to learn about various types of news reports and its source.
A biased news media effects the perception of truth. It sways public opinion that influences research results. Therefore, the outcome of a biased media is manipulation. It encourages ignorance and emotion over understanding and considered action. Because a biased media could be the factor that influences any number of outcomes it is important that a researcher understands types of bias, and learn to filter out biased news from a non-biased.
Topics Covered
- WHAT IS NEWS CONTENT?
- Advantages of News as Information Source
- Types of News Sources
- News Reports
- On-the-record
- Off-the-record
- Attribution vs Non-Attribution
- Anonymous Source
- Expert Opinion
- Leaks, Media Scandals Etc.
WHO USES NEWS FOR RESEARCH INFORMATION?
- Types of News Content
- Breaking News
- Developing News Story
- News Story
- News Article
- Open Source Journalism
- Freelance Journalist and Content Writers
- Citizen Journalism and Social Media
- Other Online Contributors of News
- News Types Classified According to their Reporting Characteristics
- Online News Dissipaters
- Digital News Aggregators
- News Agencies and News Syndicates
- News Agencies
- List of International News Agencies of Different Countries
- News Syndicate
- The Broadcast Media
- Online News Publishers
- Alternative News
- Corporate News
- Media Criticism and Resources
- World News
- Online Newspapers-United States
- European Online Newspapers
- Social Media News Sites
- Biased News and Fake News - Differences
- Biased News Motivators
- Government Interests and Agendas
- Political Agendas
- Workers in Profession
- Media Bias Groups
- Activists and Activism
- Motivated Lobbyists
- Other Interest Groups
TYPES OF BIAS IN NEWS STORIES
- Bias by commission
- Bias by selection of sources
- Bias by headline
- Bias by photos, captions, and camera angles
- Bias through placement
- Bias through the use of names and titles
- Bias through statistics and crowd counts
- Bias by source control
- Bias by Way of Media Framing
- Bias by Choice of Words
- Identifying a Researcher’s Bias in News Story
- Signs of Confirmation Bias in News Story
- News Exhibiting Cultural Bias
- Self “Blind Spot” Bias of Researchers
- Typical News Sources
PRIMARY AND SECONDARY NEWS SOURCE
- Written Reports
- On-the-record
- Off-the-record
- Attribution and Non-attribution
- Tip-offs from Anonymous Source
- Expert Opinions
- Leaked documents
- Media Scandal
- Questionable Sources
- Conspiracy Theorists
FAKE NEWS DETECTION & NEWS VERIFICATION METHODS
Fake news has been one of the most debilitating problems of our time that has infiltrated the Internet and plagued the integrity of digitized information pages. Those websites which deliberately published hoaxes and misleading information are often shared on social media to increase their reach. As a result, people became skeptical of the information that they read online, with over a quarter reader in the USA (according to the survey conducted by Statistical) stating that they rarely trusted the news that they read on social media. The trouble is, most people don't check the source of the material that they view online before they share it, which can lead to fake news spreading quickly or even "going viral." At the same time, it's become harder to identify the source of news stories, particularly on the internet, which can make it difficult to assess their accuracy for research. In this unit, we will discuss methods of verifying and authenticating news source.
Topics Covered
- News Verification and Reliability Checklist
- Social Media News
- Social media news communities
- Social Media News “fans” Community
- News Media Community and Journalists on Social Media
- Community of Citizen Journalists
- Authenticating Social Media News Source
- Verifying News Source Social Media Profile Account
- News from Social Media and its Circulation
- Distinguishing “Fake News” from certain types of news stories
- Clickbait
- Satire
- Misleading Headings
- Biased News
- Editorial with Opinions and Commentaries
- Certain Developing Story
- News Media and Social Media Platform Facts Reported by Pew Research
- Example of Speed at Which the “Fake News” Travels in Social Media
- Google Chrome News Search for Latest News Stories
- Regional News Stories Search Options
- Geo-Location of Browsing with Different Languages
- News Story Date and Time Stamp
- Conventions for writing “Dates, Months, Years, Days of the Week” in the search query
- Establishing “Dateline”
- The “Time” Convention
- The Key Elements of Time-Date Stamp in Internet Publications
- Month, date, year and time
- Importance of Location and Time-Date Stamp in Electronic Media
- Time Stamp in the same News Story found inside the NYT article with a known Publishing Date
- Online Published Posts and News Story Articles Date-time Stamp
- Web Page Indexing date
- Web Page Cache Date
- Illustration of finding news article date using “Cache”
- Illustration of finding news article date using “Cached Web Pages Archive”
- Search by building News Search Queries with Google Operators
- Search within title, URL and description
- Search a specific site or publication
- Search by country or region
- List of Useful Links for Fact Checking and News Verification Websites and Online Tools
Online Videos & Images Verification
ONLINE VIDEOS AUTHENTICATION & EVIDENCE MANAGEMENT
Videos can serve as an important part of investigations, information collections and knowledge source. An online researcher can use videos for varied purposes, but most important utilization for research and investigation can be attributed to its type and source.
An online researcher (can be, investigator, journalist, attorney etc.) must understand that any video clips and images collected from the web as evidence must have some knowledge of “Digital Evidence Law” and understand “Authentication, Techniques and Procedures”.
In this course, we will cover both the “Videos Authentication Techniques” and “Digital Evidence” collection requirements for Investigations and Investigative Journalism.
AUTHENTICATING ONLINE VIDEOS & IMAGES
- Online Video Market – Size & Background
- Online Video Information Dissipation in Social Media
- Types of Online Video Content
ONLINE VIDEOS REQUIRING AUTHENTICATION FOR RESEARCH AND INVESTIGATIONS
- News Story Videos
- Social Media Video Clips
- Marketing Videos Masked as Education and Information Videos
- Video Evidence in Legal Proceeding
- Political Views & Campaigns Video
- User-Generated Video
TYPES OF INFORMATIONAL VIDEOS FOR RESEARCH
- Video Types Used in Evidencing
- Example of Video Evidence Use by International Justice System
VIDEO AND PHOTO EVIDENCE – LEGAL REQUIREMENTS
- Foundation of Digital Evidence and Evidence Admissibility in Law
- Relevance of Evidence
- Evidence Authenticity and Reliability
- Digital Evidence Cannot be “Hearsay”
- Best Evidence or Corroborative Evidence
- Corroboration based on traditional investigative techniques
- Corroborating other electronic evidence
- Probative Value Must Outweigh Any Prejudicial Effect
- Accessibility/Cost Shifting
- Proving Evidence from Outside North America (US & Canada)
- Digital Evidence Admissibility – Courts Suggested Approach
- Social Media Evidence
- Information of Meta Data
- Evidence Preservation
- Chain of Custody
- Digital Chain of Custody Criteria for Verification
- Authentication Criteria for Digital Evidence
- General Criteria
- Witness with Knowledge
- Evidence About a Process or System
- Evidence About Public Records
- Voice Identification
- Video and Images Authentication
- Expert Witness Testimony
- Source Based Criteria
- Forensically Collected
- Raw Footages by Citizen or User-generated Videos
- News Story Coverage by Journalists
- Anonymous Sources
VIDEO AUTHENTICATION - APPROACH
- Important Contributors in Video Files Verification
- Metadata in Camera (Videos and Photos)
- Importance of Verifying and Iddings the Video Recorder
- Types of Video Metadata
- Date-Timestamp
- Direct Evidence Downloads from the Camera
VIDEO TECHNOLOGY - INTRODUCTION
- Video File
- Understanding Terms Used in Video Production and Video Play
- Frame size
- Aspect Ratio
- Frame rate
- Bitrate
- Video File Formats Vs Image Files
IDENTIFYING VIDEO EDITS, TAMPERING & MANIPULATIONS
- Videos Tampering
- Complete Authentication:
- Content Authentication:
- Types of Videos Tampering
- Spatial Tampering and Copy-Move Tampering
- Object Pixel Level Modifications
- Foreground Objects
- Background Objects
- Object Removal Attack
- Object Addition Attack
- Object Modification Attack
- Temporal Tampering
- Levels of Temporal Attacks
- Scene Level
- Shot Level
- Frame Level
- Frame Addition Attack
- Frame Removal Attack
- Frame Shuffling Attack
- Spatiotemporal Tampering
FAKE VIDEO & VOICE PRODUCTION SOFTWARE’S & TOOLS
- Image Translation AI
- Audio-Track Changes Matching Facial Expressions & Lip Movements
- Face to Face Facial Expressions Mimic
- Photorealistic Video-Editing Tools
- Photoshop for Audio
- VoCo Audio Alteration Tool
- Manipulating Faces from Afar in Realtime
- Video Image-to-Image Translation Tool
- Photos from Real Paintings converted to photos in CycleGAN
- Voice Manipulation and Mimicking Anyone’s Voice
VIDEO CLIPS CAPTURES FROM SOCIAL MEDIA TO DO FACT CHECKING
- Issues and Difficulty of Identifying Fake Videos
- Identification of Fake Video Channels on Social Media [YouTube]
Fake Websites & Web Content Pages Verification
FAKE WEBSITES & WEBSITE CONTENT VERIFICATION
There are two types of fake websites, those that contain false information with an intent to defraud or mislead users to scam (also called Phishing or Spoofing Sites) and the other sites that showcase false information to sell products and services. However, there are some websites that are built on a temporary basis using hidden IP addresses and concealed domain ownership. In this course, we will be discussing the topics shown below.
- Identifying Most Likely Fake Websites and Scams Sites and How to Identify these Sites?
- Verifying Fake or Unreliable Information on Website Content Pages, Website Layout or Design and Multimedia Files includes Images
- Website Authentication of Claims, Offers, Products and Services
IDENTIFYING FAKES IN WEBSITE CONTENT PAGE
A website is made up of web pages with easy navigations via hyperlinks. The content of the web page is what defines and identifies content credibility and falsehood. The information on these pages is identified by the navigation button title and subheadings. In this course, we will learn various methods to verify the information pages under their titles (E.g. “Home-page, About Us, Product & Services, Registrations, Contact Us Etc.)
HOW TO SPOT FAKE CONTENT ON WEBSITES?
A website is made up of web pages with easy navigations via hyperlinks. The content of the web page is what defines and identifies content credibility and falsehood. The information on these pages is identified by the navigation button title and subheadings. In this course, we will learn various methods to verify the information pages under their titles (E.g. “Home-page, About Us, Product & Services, Registrations, Contact Us Etc.)
- Website Content Pages Authentication
- What to Check on Homepage of Website?
- Content Verification of Navigation Pages (About, Product & Services, Contact Pages and Online Forms)
- Check Plagiarism in Policy and Terms of Use
- Corporate and Business Background Checks
- Verification of Owners, Directors, Management Team
- Verifying Images and Profile Photos
- Third Party Verifications (Business Affiliates, Partners, Sponsors, Authorized Re-sellers)
- Trust Mark Logos – Associations, Organizations, Accreditation Bodies & Business Verification Bureaus
- Verification of “Contact” information (Emails and Address)
- Performing Background Checks and Social Media Accounts
- Checking of Consumer Bureau Reports
- Checking Customer Reviews and Testimonies
UNDERSTANDING WEBSITE LAYOUT, PAGE LINKS AND DOMAINS
- Checking the Website Layouts, Textual Content and Multimedia Files
- How to Verify Links/URL’s inside the Website
- Checking Domain Names Registrations and Ownerships
Online Background Checks & Assets Verification
PUBLIC INFORMATION AND PRIVATE INFORMATION – BACKGROUND IN PERSPECTIVE
- Public Records and Public Information
- What’s in Your Public Record?
- Private Information
- Information Excluded from the Public Record
- Criminal Investigations Are Not Public Records
- Certain Government Records Are Considered Confidential or Private
- Social Welfare Information
- Social Security Numbers (SSN)
- Income Tax ID Number (ITIN) or TIN’s (Tax ID Numbers)
- Tax Information
- School Records
- Medical Records and Health Information
- Unauthorized Credit Check
- The Public Records on the Internet
TYPES OF ONLINE INVESTIGATIVE SEARCH
- Background Check
- Hidden Asset Search
- Bank Account Search Reports
- Real Property Records
- Nationwide Bank & Brokerage Search
- Due Diligence
INVESTIGATING SOCIAL MEDIA PROFILE
- Facts collections
- Evidence Collection (e-Discovery)
SOCIAL MEDIA EVIDENCE COLLECTION RECOMMENDATIONS
- Webpage Screen Capturing
- Obtain Knowledge of all the Data Areas where Information may be Hidden
- Collect Key Data from Meta-Data in e-Discovery
- Capture “Source Code” of the Web Pages
- Record Web page “Elements” and “Console” Link
- Forensic Investigation in Social Media Evidence
- Capturing Location of User’s Social Media Account
- Methods of IP Tracking
- Listening to the Social Media Mummers
- Tracking through Vendor Supplied GPS Options
- IP Logging Information Checker Software’s and Emails
- Importance of Finding User Location in Social Media Investigations
- Capturing Location Data from Mobile Devices
- While visiting stores with WIFI
- Mobile phone towers
- Mobile Phones GPS tracking chips
- Information Embedded in Images and Profile Pictures
- Who has access to your location information?
HOW RESEARCHED SOCIAL MEDIA DATA IS USED BY INTEREST GROUPS?
-
- Private Investigators and Law Enforcement Agents
- Social Scientists and Psychologists
- Lawyers and Legal Professionals
- What happens when Social Media account information is deleted or altered?
- Ways to recover web pages no longer available online
- Use your browsers cached pages
- Check Googles Cached pages
- Use the Wayback Machine web archive
- Reasons for Hiring a Social Media Investigator
- Investigative Research - “Red-Flag” Indicators
- Investigating Person’s Information
- Investigating Finances and Financial Trails
- Investigating Profession or Professional Concerns for Third Parties
- Investigating Legal Issues Concerning Person or their Businesses
- Investigating Criminal Involvement
SAMPLES OF ONLINE SEARCH REPORTS
- Comprehensive Background Checks – Sample Report
- Bank Account Search Reports
- Sample Nationwide Bank & Brokerage Account Search Report
- Current Employment Search
- Pre-Employment Search
- Current Employment
IDENTIFY EMPLOYER IDENTIFICATION NUMBER
- Social Security No
- Skip-Trace Search
- Bankruptcy Records Search
- Civil Court Records Search
- Marriage and Family Court Records
- Credit Bureau Reports (or Consumer Credit Reports)
-
- Information Contained in Credit Reports
- How Can Investigative Researcher Access Someone’s Credit Reports?
- Information of Interest to Investigative Researcher in Credit Reports
- The "Investigative Consumer Reports"
SPECIALIZED CONSUMER REPORTS FROM BUREAUS
- Reports on Trust-worthiness and Risk Management Data of Businesses
- Better Business Bureau
- Maintains a Publicly Searchable Database of Businesses
- Dispute Resolution between B2B and B2C
- Rates (ranks) business credibility based on criteria
- BBB Information for Researchers
- Reports
- Statistical Data
- BBB Scam Tracker℠ Reports
- Complaint Reviews and Reporting in BBB Searchable Database
- Dun and Brad Street (D&B)
- Overall Business Performance Scale
- Financial Data is Provided
- Business Net-worth, Revenues, Cash-flows, Credits and Loans Taken
- Debt Payment Payments Information
- Credit Extended and Re-payments There-off
- Break-down of Credits Extended, Owed and Paid
- Information on Managers and Employees
- Judgements, Liens, Law Suits, UCC Liens Etc
- Other Specialized Reports
- Employment Screening Reports
- Tenant Screening Reports
- Check and Bank Screening Reports
- Personal Property Insurance Reports
- Medical Information Reports
- Information Contained in MIB Report
- Low-income and subprime
- Utilities Companies Data Exchange Reports
- Retail Business “Merchandise Return Analytics & Fraud Prevention Reports”
- Small Business Database and Reports
- Reports from SBA (Small Business Administration)
ONLINE DATABASE FOR INVESTIGATING FRAUDS, SCAMS AND OTHER CRIMES
- US Open Government Initiative DATASETS from FTC (Federal Trade Commission)
- Fraud Cases Reported Database (PDF Reports)
- Data Sets Reports
- Companies and People Banned from Debt Relief
- Reports of Banned Debt Collectors
DETECTING FRAUDULENT EDUCATION CREDENTIAL
- Forged or Altered Documents
- Fabricated (counterfeit) documents
- Inside jobs
- Creative translations
- Degree or Diploma Mill Products
WHAT IS AN AUTHENTIC ACADEMIC CREDENTIAL?
- How to Determine if Credentials are True Copies or Fakes?
- How to Determine if the Credentials are from Fake Universities?
- How can I determine if an accrediting organization may be a “mill”?
INTERNATIONAL MONEY LAUNDERING SCHEMES & FOREIGN ASSETS DETECTION
- What is money laundering?
- How is money laundered?
- Physical Shipment of Money Abroad
- Hawala System
- Laundering through Front Businesses and Trusts
- What are Shell Companies and Trusts?
- Shell Company Explained
- How Shell Companies Benefit’s Businesses
- Simple Illustration of Shell-company Formation and Assets Transfers
- Method 1 – Use of corporate vehicles and trusts both local and off-shore
- Method 2 – Use of third parties
- Method 3 – Use of professional facilitators
- Method 4 – Use of international funds transfers
- Trusts Explained
- The Offshore Trust: What Is It?
- The Offshore Trust: What Are the Benefits?
- The Offshore Trust: Who Needs One?
- Types of offshore trusts
LEAKS THAT ESTABLISH TRAILS OF TRUSTS ESTABLISHED OFFSHORE FOR LAUNDERING ILL-GOTTEN MONEY
- External Database - Leaks
- International Consortium of Investigative Journalists (ICIJ)
- How to use ICIJ database Suggested by ICIJ?
- Finding houses, cars, planes and other assets
- Following the family
- Piercing the corporate veil
Investigative Research Requires Access to Following Information to Pursue Hidden Assets Verifications
Annexure: USA - Frauds and Scams Reporting and Checking Database of Information – Agencies and Bureaus
INTERNATIONAL MONEY LAUNDERING SCHEMES
- What is money laundering?
- How is money laundered?
- Physical Shipment of Money Abroad
Hawala System
- Laundering through Front Businesses and Trusts
- What are Shell Companies and Trusts?
- Shell Company Explained
- How Shell Companies Benefit’s Businesses
- Simple Illustration of Shell-company Formation and Assets Transfers
- Method 1 – Use of corporate vehicles and trusts both local and off-shore
- Method 2 – Use of third parties
- Method 3 – Use of professional facilitators
- Method 4 – Use of international funds transfers
- Trusts Explained
- The Offshore Trust: What Is It?
- The Offshore Trust: What Are the Benefits?
- The Offshore Trust: Who Needs One?
- Types of offshore trusts
INTERNET BROWSING EXPLAINED - ILLUSTRATION
- The HTTP & HTTPS Protocol
- HTTP Protocol
- Domain Names Suffix
THE WEB PAGE COMPONENTS
- The Web Page Links (URL) in SERP’s (Search Engine Result Pages)
- Structure of Web Pages Directory
- Web Browser Vs
WEB BROWSER TECHNOLOGY
- Main Components of Browser Engine Technology
- Browser Software
- Other Working Components of a Browser
TRADITIONAL DATABASE STRUCTURE [RELATIONAL DATABASE]
- Textual Database Or Semantic Database [Search Engine Database System]
- A Domain Name
- Web Hosting Platform (Isp Services)
WEB CRAWLERS & WEB PAGE INDEXING
- The Process of Web Page Crawling - Illustration
- Meaning of Search Algorithms
- Content “Freshness
- The Content “Quality
- The Content “Reliability”
- The Content “Relevance”
- The “Links Popularity”
- The Spam and Malware Protection
- The “Dead Links” Filtering
- The Spell Checks and Synonyms Match
- Predictive Search
- Localized Search (Geographic Location)
- Search Engine Index vs
- Matching Search Query Terms with the Search Result Pages
- Deconstructing Search Result Snippets First
- Web Page Design, Structure & Layout Interpreted by Search Crawlers
WHAT IS A SEARCH ENGINE?
- Search Engines And Web Search Explained
- Autonomous Process
- Query Intent Recognition
- Definitive Query Response Process
WEB CRAWLERS & WEB PAGE INDEXING
- The Process of Web Page Crawling - Illustration
- Meaning of Search Algorithms
- Content “Freshness
- The Content “Quality
- The Content “Reliability”
- The Content “Relevance”
- The “Links Popularity”
- The Spam and Malware Protection
- The “Dead Links” Filtering
- The Spell Checks and Synonyms Match
- Predictive Search
- Localized Search (Geographic Location)
- Search Engine Index vs
- Matching Search Query Terms with the Search Result Pages
- Deconstructing Search Result Snippets First
- Web Page Design, Structure & Layout Interpreted by Search Crawlers
IMPORTANCE OF LEARNING ABOUT HTML TAGS FOR WEB SEARCH
WHAT WILL WE LEARN IN THIS LESSON?
- What are HTML Tags?
- Types of HTML Meta Tags
- HTML Codes of a Typical Web Page -Illustration
- Website Header’s “Head” Area
- Meta-Data
- Non-Meta (Title Tag)
- URL’s or Links (of web-page address)
- Text (Headings)
- Anchor Links
- Video Files
- Image Files and Image URL
- Article
- Section
- Emulation of Search Crawlers Reading Indexing Live-Site
- Crawling and Indexing – Simplified Process
- Simulation of Web Page Content
- Extraction by Search Crawler (Bots)
- Web Crawlers Data Extraction Stripped Tables Indexing
- The Meta tags Content Extraction
- Search Engine Crawlers Readable Text of Web Page
- Main Text Headings & Subheadings Stripped
- Keywords Grouped Counted and Get Analyzed
- Words Density Analyzed – Linked Words
- Words Density Analyzed – Non-Linked Words
- Content Text Words Counted for Authorized Crawling
- Links Extracted, Reviewed, Named and Organized
- Internal Links
- Summary of Internal Links Word Count
- External Links
- Sitemap Live Links Checked for Any New Pages and Dead links
NOTE: Student must complete the course attendance requirements and pass the necessary exams and complete assignments prescribed by the instructor. The course earns you a "Certification of Subject Proficiency Exam [COP]." after all the conditions of the qualifications are met per AIRS rules, terms and policies.