Online Training Registration
Law Enforcement Training Courses and Schedule
PATC Links
Law Enforcement Training Institute
PATC Internal Affairs Institute
PATC Internal Association of Hostage Negotiators
PATC Class Materials
Contact Us      Aboout PATC      PATC Publishing/Bookstore      Training Partners      Newsletter, Training Brochures, RSS, Facebook, Twitter, LinkedIN


Register for this Seminar | Return to Schedule |

Seminar Title:  
Social Media and OSINT Investigative Techniques

DATES:  4/24/2023 through 4/25/2023

INSTRUCTOR(S):  Melissa Maranville

LOCATION:  Cobb County Public Safety Police Academy - 2435 East-West Connector, Austell, GA  30106

HOTEL:  Holiday Inn Express  - Austell, GA  
$112 single/double
Identify with Cobb County Police Academy - MUST CALL

COURSE REGISTRATION FEE:  $350.00 Includes all training materials, and a Certificate of Completion.

Instructor Bio


Melissa is the Founder/CEO of DeVille and Associates, LLC, located in Knoxville, Tennessee, USA. DeVille offers Forensic Consulting and Training to law enforcement and other criminal justice professionals. DeVille consults, develops content, and trains on complex topics such as cryptocurrency, surface/dark webs, bots, AI, social media, cybercrime, predator behavior, OSINT, and linkage analysis. Melissa has partnered with many linkage analysis and OSINT companies offering trainees insight and access.


Melissa began her criminal justice career as a booking and intake officer at Knox County Sheriff’s Department in Knoxville, TN, and a student of Dr. Bass of the“Body Farm,” Forensic Anthropological Research Facility, and since has dedicated her career to researching and developing content for criminal justice education and training for over 30 years. In addition, she provides education and training to social media and gaming moderators investigating cyber predators, CSAM, and violent content for blue chip companies. Lastly, Melissa is also a forensic consultant for human trafficking divisions within law firms.


Melissa's education includes bachelor's and master's degrees from the University of Tennessee in Knoxville, TN, and a Ph.D. (candidate) Grand Canyon University in Phoenix, Arizona. Her dissertation topic is "A Case Study of Ineffective Legislation: Moral Panic and the Sex Offender Registry." When she concludes her Ph.D., she hopes to influence new sex offender legislation in tracking and tracing registered and non-registered sex offenders.

Pre-Payment is not required to register or attend IN-PERSON seminars. Pre-payment is required for WEBINARS and ONLINE COURSES.


Course Objectives

The criminal mind never sleeps and is constantly advancing with technology. This introductory course will review the use of cyber technology, discussing web platforms, AI, and bot technology, linkage analysis, and social networking sites such as Facebook, Instagram, Tumblr, Twitter, Google+, Telegram, Omegle, Discord, Twitch, Spotify, and many others to understand cybercrime. Social networking sites and cell phones have expanded cybercrimes and created new channels for sharing information that could also be utilized by law enforcement to investigate crimes and identify suspects. With using OSINT, there are many techniques that can be used to gather intelligence across the internet and social media platforms. Examples of OSINT include tracing usernames, emails, text hide software, phone number searches, OSINT dashboards, reverse images, websites, screen catch, trace and track linkage analysis, and so much more.


This course includes many OSINT tools and how to create a sock puppet for cyber investigations. This course primarily focuses on Open-source Intelligence(OSINT) and social media, chat, and gaming platforms; however, those are also available on cell phones. We will touch on OSINT that can be used for cellphones and we will review networking, routers and how to conduct a router interrogation, step-by-step. This course also includes information on warrant templates for over 500 social media and gaming platforms discussing some of the most common and what each one collects regarding IP addresses, URLs, voice, pictures, videos, financial data, and much more. We will also be discussing current case studies using linkage analysis, OSINT, and technological combinations used for success. We will close the training by discussing the importance of 3-D digital evidence and courtroom testimony. Most case studies include sextortion and other sex crimes as examples.    


*Course will not be taught in necessarily the same order as listed below and in outline. Bring tools for taking notes. Computer not required but encouraged. (2-day event)


Upon Completion:


Participants will be able to:

  1. Common crimes committed on social networking sites.

    1. The use of “bots.”

    2. Artificial intelligence in gathering data.

  1. Understand the basic steps for preserving a profile.

    1. Identifying its creator.

    2. Setup undercover profiles (steps in creating a sock puppet)

    3. Gather profile information.

    4. Importance of email addresses and usernames in linkage analysis.

  1. Review social networking sites.

    1. Obtain evidence from servers and OSINT.

  1. How to create and use a sock puppet for undercover investigations.

  1. Review step-by-step router interrogations.

    1. Analyze routers at the scene.

  1. Digital evidence and courtroom testimony.

  2. Understand and define the basic terms related to investigating cybercrimes.

  1. Understand and explain cyber data.

    1. Including dark web and virtual private networks (VPNs)

    2. Capture IP addresses, URLs, Metadata, and more. 

  2. Describe the links between social networking sites and the acceleration of crimes.

    1. Telegram, Omegle, Chat investigations, gaming platforms, and more platforms.

  1. Understand the role of sextortion and online gaming platforms using social networking sites and cell phones.

  1. Employ specific techniques and evolving tactics for successful cyber investigations.

  1. Learn how to intercept digital evidence.

    1. Learn the importance of securing metadata when intercepting evidence.

    2. Sites that do not collect metadata, and why.


Register for this Seminar | Return to Schedule |




View Legal Article Archive



Click Here to See Our FAQ!



Legal Updates
Internal Affairs

Click below to sign up for
emails and brochures!

PATC Mailing List

Public Agency Training Council - 2230 Stafford Road STE 115 PMB 379 - Plainfield, IN 46168 - 800.365.0119

About PATC | PATC Publishing/Bookstore | Training Partners | E-Newsletter | Contact Us | Home | Site Terms of Use Policy