Courses

/Courses
Return to Courses

Securing Your Identity

Be Invisible and Take Privacy to the Extreme in the Interest of Officer Safety

Course Overview

Privacy isn’t about hiding something. It’s about being able to control how we present ourselves to the world. It is the right to keep things to yourself. It’s about personal dignity. The protection of our personal information, online and in the physical world, has never been more important. Law enforcement professionals, military personnel, whistleblowers, and every citizen needs to understand the threats to their safety due to the relentless collection of personal data. There are many ways to take control of what information is available about you, how it is shared, and to remove data that may compromise your safety or identity. This course explains a collection of resources and tactics to help us overcome issues affecting our privacy, strengthen our digital security, and to control what the Internet knows about us.

First Responders and their families are at a substantial risk of being targeted by criminals and hackers. This unique and highly specialized training identifies publicly available vulnerabilities that expose your sensitive information. The instructor will share first hand knowledge about the tools, trade-craft, and techniques used to mitigate and eliminate the threats posed to your digital safety.

These same tactics, taught to covert law enforcement officers, military operatives, and the clandestine community, are explained in a way that anyone can benefit from. Operational Security is no longer a passive process and needs to be managed aggressively due to public and non-public data that puts you and your family at risk. This curricula is like no other in the world, and can help you reclaim and maintain a high level of personal OpSec. Online resources will be provided to all attendees which have been thoroughly vetted and are real-world applicable.

Who Should Attend
This class is designed for any investigator or detective. No technical background is required. Previous students have included investigators, detectives, supervisors, officers, and support staff.

Material Requirements
Students should bring a laptop with Internet capabilities. 

Agenda
Day One

  1. Conduct advanced self-background checks 
  2. Locate and remove personally identifiable information found online 
  3.  Identify and eliminate exposed personal information online and offline 
  4. Secure your digital devices
  5. Make anonymous purchases and secure transactions 
  6. Use an VPN to harden internet activity against attacks and snooping 


Day Two

  1. Protect yourself, and your family from doxing attacks 
  2. Create encrypted email and compartmentalized options 
  3. Protect your credit profile from hackers and more
  4. Customize your operating systems, browsers, an digital media for optimal security 
  5. Learn the best practices for using an alias
  6. Become a digital ninja and operate privately and safely in the world

 

 

Upcoming Classes

View Training Schedule
Online Seminar
Online Seminar,
May 13, 2024 (2 days)
Kyle Bowen
Register Now