Introduction to Open Source Intelligence for Maximum Results

When conducting open source intelligence targeting and collection, we must ensure our efforts support stakeholder’s intent, the impact the collection will have on the business, and any potential business and technology shifts the results may produce.

One of the main benefits of open source collection is the ability to share our findings with internal and external partners. We can benefit greatly from information exchanges that foster a common view of the operating environment while building trust through sharing.

This course takes you through standard definitions, why and how OSINT will benefit your organization, the framework for collecting information and the application of OSINT to live situations. This course gives you the skills necessary to orderly plan and collection open source data and information. We focus on:

  • Understanding search engine indexing and ranking protocols.
  • Surface and Deep Web advanced searching strategies and tools.
  • Hiding web documents from search engines and recovering pages that have been removed from Web servers.
  • Researching forums, discussion boards, newsgroups and mailing lists.
  • Introduction to multi-media search, weblogs, searching the blogsphere, social networks, wiki databases.
  • Online privacy and anonymity.
  • OSINT counterintelligence techniques used by the criminal element.
  • Web site mapping and archiving techniques and tools.
  • Introduction to Open Source Intelligence and the Intelligence Analysis process.
  • Effectively planning online OSINT projects.
  • How to search in foreign sites.
  • Where to find you threat actors.
  • Methods of forum enrolment.
  • Using the Threat Intelligence Platform to ‘jump-off’ from.
  • Collection planning overview and management.
  • Managing your collection for tracking and data provenance.
  • Tools for collating and organizing Internet

The course prepares the collection manager with the following non-inclusively:

Additional OSINT web resources Documentation application/Hunchly Metadata
Addresses, phone numbers, user names, emails Effective Research Habits Methods of collection – Tools
Advance search methods for blogs and social networks Email, Phone Address, People Methods of secure communication
Advanced Search Techniques Email, Phone, Address, People Methods of Social Media Research
Advanced search techniques Engaging your target Methods that may reveal what OSINT is doing to a target
Analyze the text Establish links to performance metrics Mobile OSINT
Analyzing data Evaluate OSINT for Collection platform Monitoring for change
Analyzing, organizing, and preparing of written reports Explain the SWOT of OSINT Networking and VPNs
Approaches to Searching Extensive OSINT lists News Media Content
Apps & Utilities Forums, discussion boards, newsgroups Note-taking applications
Archiving methodologies and extraction tools Fundamentals of OSINT On line database systems
Assess OSINT’s role Gathering data Online privacy / anonymity tools
Backlinks Gathering requirements Open Source Data
Basic Internet Geolocation methods Opinion Community
Basic Search Techniques Geolocation tools OPSEC
Benefits Geospatial Analysis Optimizing transfer of large files
Best ways to use screen shot capabilities Glossary and Taxonomy Organize, Analyze, Summarize & Report – Report Your Results Easily in a Formal Report
Blogs and wikis Goals of OSINT Collection OSINT Collection and Production.
Business Sites Google Custom Search Engine, Alerts, Scholar, News OSINT Collection Planning – Cyber Operations Order
Buzz campaign Google dorks and Google Hacking database OSINT Communities
Cast a wide net Google Guide OSINT Methodology
Chat Windows Google Hangouts OSINT Subtypes
Cloud server Government – Media Other Open Sources
Collection, Process, Exploitation, Production Gray Literature Password management
Content Analysis How to document Pay Databases – Best systems to utilize, Cost Efficient Approaches, Pros and Cons
Counterintelligence techniques used by the criminal elements Identifying fraudulent opinions People search
Creating an inviting environment Image recognition technology Planning and direction
Creating and manipulating the buzz Instant Messaging Planning for OSINT Collection & Analysis
Creating output for customer Intelligence integration Privacy and Proxies – Protect Yourself First
Cyber Criminals International Search Engines and Tools Privacy and Security Settings
Cyber HUMINT – Social Media Lecture on Intelligence and Cyber Intelligence Publication Access
Data Provenance - Hunch.ly Link Analysis Query Input
Deep Web Part 1 – People Searches Maltego, Spiderfoot, Paliscope, Shodan, ORYON, OSINT Browser, Buscador Quick Reference
Deep Web Part 2 – Public Records Managing social media communities Real Time News
Deep Web Part 3 – Social Networks, Blogs, Forums and Social Media Search Tips Measure what matters Review and use of open source tools
Determining Your Threat Profile Media – Image, Video, & Documents Sanitizing your platform
Discussion Forums Media Image, Video & Document Screenshots

Lecture, Hands-on, Apprenticeship, in class exercises, student presentations, templates, course material—24 CPEs 3-days

Contact Treadstone 71 Today for all your Cyber Intelligence needs.

CONTACT US TODAY