The complete open source intelligence (osint) training course

This is a foundational course in open-source intelligence (OSINT) gathering that will move quickly through many areas of the field. While the course is an entry point for people wanting to learn about OSINT, the concepts and tools taught are far from basic. The goal is to provide the foundational knowledge for students to be successful in their fields, whether they are cyber defenders, threat intelligence analysts, private investigators, insurance fraud investigators, intelligence analysts, law enforcement personnel, or people who are curious about OSINT.

Many people think that using their favorite Internet search engine is enough to find the data they need to do their work, without realizing that most of the Internet is not indexed by search engines. SEC487 teaches students effective methods to find the unlinked data. You will learn real-world skills and techniques to scour the massive amounts of data found on the Internet. Once you have this information, SEC487 will show you how to ensure that it is corroborated, how to analyze what you gathered, and how to make sure it is useful to your customers.

With over 25 real-world exercises using the live Internet and dark web to reinforce the course material, and with quizzes and other activities to test knowledge, the SEC487 course does not just provide you materials but also helps you learn them. The course teaches students how to use specific tools and techniques to accomplish their investigative goals, focusing on processes through flow charts that map out procedures for most of the course techniques.

This Course Will Prepare You To:

  • Create an OSINT process
  • Conduct OSINT investigations in support of a wide range of customers
  • Understand the data collection life cycle
  • Create a secure platform for data collection
  • Analyze customer collection requirements
  • Capture and record data
  • Create sock puppet accounts
  • Harvest web data
  • Perform searches for people
  • Access social media data
  • Assess a remote location using online cameras and maps
  • Examine geolocated social media
  • Research businesses
  • Collect data from the dark web

What You Will Receive with This Course:

  • A Digital Download Package with a custom Linux virtual machine. Labs will be run from this platform.
  • An electronic workbook (inside the virtual machine) containing interactive labs.

A brand new eLearning course on our free Basel LEARN platform introduces the rich possibilities of open-source intelligence for investigations.

The course starts with the seizure of the fishing boat FV Malaga, suspected of involvement in illegal fishing and marine species trafficking. It’s your job to seek information and evidence to build the case – using only open sources available on websites and open databases, social media and online forums. On the way, you’ll also take a trip into the so-called dark web and the Bitcoin blockchain.

How can open sources help you you find out who is behind the secretive organisation “Mossaman Commodities”? Are there databases and trackers that can show you where the fishing boat has been sailing? What can you learn by analysing Instagram images – and how do you go back in time on the internet?

Unlock the possibilities of OSINT – safely

The self-paced course reveals how vital OSINT is to investigations into corruption, money laundering and other serious crimes.

By exploiting all possible sources on the regular web, deep web and dark web, it is possible to gather a huge amount of information and evidence with only a laptop, a well-organised collection plan and some smart thinking.

You’ll learn practical ways to search for information without blowing your cover. This includes recommended browsers and search engine settings, plus apps and add-ons to increase your privacy and efficiency.

At the end of the course, you’ll prepare your OSINT report on the illegal fishing case. Hit send, and you can download your personal certificate of completion issued by our International Centre for Asset Recovery (ICAR).

Who is the course for?

The online OSINT course is aimed at any investigators, prosecutors, analysts or professionals seeking to exploit the full possibilities of open-source information. It is self-paced, so you can start, stop and repeat at any time – easy to fit around a busy work schedule.

As with our other eLearning courses, law enforcement agencies may wish to make the course a standard element in their officers’ onboarding or professional development. Wildlife management agencies may find the focus on investigating illegal fishing and marine species trafficking particularly useful.

The new OSINT course was developed by our eLearning team in collaboration with subject matter experts from ICAR and our Green Corruption programme, with primary funding from PMI Impact.

We are grateful to the Governments of Jersey, Liechtenstein, Norway, Switzerland and the UK for funding Basel LEARN with its growing suite of eLearning courses as part of their ongoing support to ICAR.

Sign up for free and build your skills in OSINT investigation!

Live Cybercrime Keynotes

Our presenters have delivered over 500 live keynotes over the past decade for companies of all sizes. We present a unique perspective on cybercrime from our government careers. Our sessions involve actual live demonstrations in real-time instead of constant PowerPoint. In 2021, we revamped our sessions, which can be found below.

Battling Cyber-Crime in 2022

This session focuses on recent trends of online fraud, computer intrusion, and ways that suspects steal valuable data from your company. The presentation includes the details of how hackers commit their crimes and what every employee must do to protect company assets. The audience will learn immediately how password hacking, email phishing, telephone attacks, and social engineering are emerging threats against every business. Live examples of ‘hacking’ into real information will surprise the audience, while detailed solutions will be displayed on how to stop the threats. Your employees will easily modify a few key online habits which will help protect your organization from the next attack.

An Insider’s View of Ransomware

Have you been targeted by ransomware criminals? If so, there is much more to the attack than demands for payment. We explain everything, including initial infection, identification of variants, free public remedies, damage to your network, public exposure of data, customer infiltration, imposter demands, negotiations with the criminals, ransom payments, virtual currencies, data backups, server rebuilding, employee training, notification requirements, data retrieval, repeat infections, and overall damage to your reputation. This session is designed as a high-level review for executives and managers.

Securing Your Digital Life

This session focuses on the numerous ways that suspects steal your personal information and explains how they benefit from the data obtained. The presentation includes live demonstrations of how you and your family are likely to be attacked and the easy steps which anyone can take to prevent becoming a victim. The audience will learn immediately how to properly create and store passwords, secure their home computers from online threats, and apply better overall defensive behavior in regard to technology in the home. Attendees will learn how most hackers can access personal online accounts with only one attempt. More importantly, they will learn how to stop the intrusion.

This session focuses on recent trends of online fraud, computer intrusion, and ways that suspects steal valuable data from your company. The presentation includes the details of how hackers commit their crimes and what every employee must do to protect company assets. The audience will learn immediately how password hacking, email phishing, telephone attacks, and social engineering are emerging threats against every business. Live examples of ‘hacking’ into real information will surprise the audience, while detailed solutions will be displayed on how to stop the threats. Your employees will easily modify a few key online habits which will help protect your organization from the next attack.Have you been targeted by ransomware criminals? If so, there is much more to the attack than demands for payment. We explain everything, including initial infection, identification of variants, free public remedies, damage to your network, public exposure of data, customer infiltration, imposter demands, negotiations with the criminals, ransom payments, virtual currencies, data backups, server rebuilding, employee training, notification requirements, data retrieval, repeat infections, and overall damage to your reputation. This session is designed as a high-level review for executives and managers.This session focuses on the numerous ways that suspects steal your personal information and explains how they benefit from the data obtained. The presentation includes live demonstrations of how you and your family are likely to be attacked and the easy steps which anyone can take to prevent becoming a victim. The audience will learn immediately how to properly create and store passwords, secure their home computers from online threats, and apply better overall defensive behavior in regard to technology in the home. Attendees will learn how most hackers can access personal online accounts with only one attempt. More importantly, they will learn how to stop the intrusion. Schedule a Live Keynote

This is an introductory course in Open-Source Intelligence (OSINT) information research, collection, exploitation, and analysis. OSINT is becoming increasingly important across investigations of all types, especially for law enforcement and government agencies. This course will teach the student how to protect themselves and their organization by providing defensive techniques in the operating environment, including misattribution and creation and usage of sock puppets. Common legal challenges in the collection and usage of OSINT will be discussed. The student will then learn basic OSINT research skills, manual OSINT collection methodologies, and explore automation options within OSINT collection environment. There will be a brief introduction to the dark web and cryptocurrencies. Various use cases will be explored, ranging from OSINT in support of long-term research, to utilizing OSINT to support live operations. Students will learn how to conduct an OSINT needs analysis for their own organization, enabling safe, legal, and effective implementation of OSINT methodologies in their respective workplaces.

Throughout the week students will cover the following topics:

  • What is OSINT? More importantly, what ISN’T OSINT?
  • Legal/Privacy/Policy considerations
  • Defensive OSINT/Personal Privacy
  • Using Search Engines efficiently for OSINT
  • Reverse Image Searching
  • Geolocations and Maps (geolocated social media posts, co-locating existing subpoena records with social media posts; Ad-ID possible as a quick overview)
  • Blogs/Forums (Quora, Reddit, 4Chan, 8Kun)
  • Social media exploitation (break down by platform-focus on 4 big ones and youtube-address: phone apps and desktop for each)
  • Messaging platforms and Chat Apps (Encryption?)
  • Dating platforms and apps (location services, vetting persons)
  • Business records (registrations, taxes)
  • Public records (property, court, aggregation sites)
  • Financial Records (OFAC, political donor records, public employee records)
  • Dark Web/Thorough TOR
  • Cryptocurrency
  • Archives (wayback machine, cached websites)
  • Translation and Non-Native Language Searches
  • “Foreign” Apps (popular outside US)
  • Scripting and GitHub
  • SALE- Situational Awareness for Live Events (Tactical OSINT)
  • User Driven Block
  • Keeping up with trends/Staying Current in the OSINT Space
  • Tools/Commercial Providers
  • OSINT Needs Analysis (Starting an OSINT shop or team or mission)

WHEN:  April 24-28, 2023

COST: $2,495.00 US Dollars

EQUIPMENT:
Classroom laptops will be given to the students to take home and keep.

2023 REGISTRATION: 

Existing IACIS members: Log in with your credentials and go to the Products page to purchase and register for the course.

Non-IACIS members: Membership fee is waived with the purchase of the training course; however, to register for the course you must complete a membership application at the time of purchase. Purchase training course HERE.

****Payment MUST BE RECEIVED at least 45 days prior to the first day of class. Any payment arrangements other than payment through the website or payment via invoice must be approved by the IACIS Treasurer prior to admittance into the course. Please contact the treasurer for questions and approval ([email protected])

Cancellations within 45 days from the start of class to 31 days from the start of class will be subject to a $150 cancellation fee. There will be no refunds within 30 days from the start of class.****

* On-Site Check-in Times (student pickup of equipment, ID card, IACIS info) are:

             Sunday, April 23, 2023: 1800 – 2100

             Monday, April 24, 2023: 0700 – 0800

* Please make arrangements to arrive in time to check-in so that you may be in class promptly the first day.

COURSE NOTES:

Please read the following notes regarding this class:

  1. Classes begin at 8:00 AM ET and conclude at 5:00 PM ET, each day, with a one-hour lunch break. Classes will end at 4:00 PM ET on the last day of class. Please do not arrange for departing flights prior to 7:00 PM ET to allow time for travel to the airport and any security clearances.
  2. The dress code for the conference is business casual (collared shirts and slacks). The wearing of shorts, flip flops, tank tops, etc. is not allowed in the classroom. Personal computers are not permitted in the classroom. Students are required to attend all classes to successfully complete the program. Students who fail to meet the attendance requirements will not be issued a certificate at the conclusion of the program.

HOTEL BOOKING: 

The course will be taught at the Caribe Royale Hotel, 8101 World Center Drive, Orlando, Florida 32821 (USA).  This hotel is 16 miles from the Orlando International Airport, it has a large pool, spacious workout facility and is close to Disney World and Universal Studios.

Book via the Caribe Royale Hotel site here.

Or book via phone by calling the following numbers:

Reservations Toll Free: 1-800-823-8300/1-888-258-7501 or our local number 407-238-8000.

CANCELLATION INFO:

If IACIS is unable to hold their 2023 Orlando training event, then all students who have registered and paid, will have the option of a full refund or a reserved seat at the 2024 training event.  IACIS is not responsible for any outside expenses (e.g. travel and accommodation) in the event of the training event being cancelled.  Anyone who paid for training will receive complimentary membership through the year that his/her training takes place.

Written by Jane