Investigator First Digital

Investigators drive investigations.

Practical digital guidance for investigators — and for the people around investigations who need to understand what digital issues mean, what to do next, and how to use specialists properly.

Not to turn you into a technician. Not to replace DFUs, analysts or digital specialists. The point is to make sure you understand enough to ask better questions, identify sensible lines of enquiry early, and stay in control of the case.

No generic awareness material. No vendor fluff. No technical theatre.

Main intro video

Replace this box with your recorded front-page explainer video.

Start here

Real questions investigators need answered

This is built around the questions people actually ask in live work — not abstract cyber jargon and not exam-syllabus nonsense.

Why can it be difficult to attribute internet activity to a single device or person? CGNAT, shared connections, multiple devices, multiple users, bad assumptions.
What can subscriber data actually tell me — and what can’t it? What it narrows down, what it does not, and what should happen next.
When is a VPN or proxy explanation plausible, and when is it just noise? Understanding concealment properly rather than being impressed by it.
What should I be asking a DFU, analyst or specialist to do in this case? How to direct support properly without handing away control of the investigation.
What digital evidence might exist here, and what lines of enquiry should that create? Moving from technical artefacts to sensible investigative action.
When am I looking at something meaningful — and when am I not? What digital evidence can support, what it cannot, and where people overclaim.
Investigator first

Good specialist support starts with good investigative thinking

Investigators run investigations.

DFUs, technicians, analysts and digital specialists are essential. This is not anti-specialist. Quite the opposite. The point is to use them properly, ask better questions earlier, and understand what you are actually asking them to do.

Without enough understanding, investigators risk missing opportunities, wasting resources, asking the wrong questions, or misunderstanding what digital evidence really shows.

Investigator First Digital exists to stop that happening.

Why it matters

What better understanding actually gives you

  • Better decisions early in the investigation
  • Earlier identification of sensible lines of enquiry
  • Better use of DFUs, analysts and digital specialists
  • Fewer wasted enquiries based on poor assumptions
  • More proportionate use of time and resources
  • A clearer understanding of what digital evidence can and cannot prove
How it works

Every topic is built in layers

So you can get to the point quickly, then go deeper only where it actually helps.

Layer 01

What this means

What you are looking at, why it matters, what it can and cannot support, and where people commonly get it wrong.

Layer 02

What to do

What this means in an investigation. Sensible lines of enquiry, what to ask, where to focus, and what should happen next.

Layer 03

How it works

The technical explanation where it genuinely helps — how systems behave, what likely happened underneath, and where evidence may sit.

Examples

What this looks like in practice

Not abstract topic lists. Real investigative questions, real uncertainty, and practical next steps.

Example 01 · Internet attribution

Sam is investigating a fraud and a suspect login resolves to a residential IP address.

The point is not to leap from “IP address” to “person”. The point is to understand what that address actually narrows down, what it does not, and what lines of enquiry flow from it.

What this means

  • A public IP does not automatically identify one device or one person
  • The connection may be shared across multiple devices or users
  • Timing, account activity and surrounding evidence matter

What to do

  • Look for device information, session information and corroborating account activity
  • Ask what subscriber data actually provides here
  • Use specialist support in a directed way rather than just asking for “a look”
Example 02 · Account misuse

Dodgy Dave wants his boss’s login so he can come back later and change records without drawing attention.

He uses a credential-capture method such as a keylogger or similar compromise technique. The investigative question is not whether Dave is clever. It is what had to happen, what traces that could leave, and what that should make you look for.

What this means

  • Captured credentials do not prove legitimate access
  • Apparent user activity may actually be compromise or misuse
  • You may be looking at a trusted account used in an untrusted way

What to do

  • Look for signs of credential theft, unauthorised persistence or suspicious access patterns
  • Ask what artefacts may exist locally, in logs, or in account activity
  • Frame specialist tasks around the compromise question, not just the account itself
Who this helps

Built primarily for investigators — useful well beyond them

The centre of gravity is the investigator. But the same material is useful to the people around investigations who need grounded digital understanding to support real casework.

Investigators and enquiry leads

People directing lines of enquiry, deciding what to prioritise, and working out what digital issues actually mean in a case.

Supervisors, prosecutors and local authority roles

People who need to understand what digital issues mean, what they support, what they do not support, and what a sensible response looks like.

Early access
£2,995 per year · up to 15 named users · single organisation

A limited early adopter offer is available for a small number of organisations that want early access and are willing to help shape the library through practical feedback.

The users do not all need to sit in one department. The licence can cover relevant colleagues across the same organisation where that makes practical sense.

View early adopter access

Get access

Practical digital guidance for real investigative work

If that sounds useful, the early adopter offer is the place to start.

Investigator First Digital