top of page

OPEN SOURCE INTELLIGENCE (OSINT)

OPEN SOURCE INTELLIGENCE (OSINT) SOLUTIONS
Our team is a small group of Quiet Professionals providing Special Services but not limited to Education, Training, Intelligence, and Consulting. Our Quiet Professionals have decades of real world experiences in combat arms, law enforcement, information technology, maritime operations, intelligence operations and numerous global deployments.

 

OSINT has been formally defined this way: Open Source Intelligence (OSINT) is intelligence collected from publicly available sources. In the Intelligence Community (IC), the term “Open” refers to “Overt”, publicly available sources

(as opposed to covert or clandestine sources); it is not related to Open Source Software or Public Intelligence.

      (hidden) (unauthorized) (secret) (obvious)

OPEN SOURCE INTELLIGENCE (OSINT) (EDUCATION, TRAINING, CONSULTING SERVICES)
It’s important to have a plan and know where you're going to look before you begin mining for OSINT. 
Knowing what information you are trying to find makes it easier to determine which websites, forums, directories,

public information resources and online avenues to use, both free and paid-for to capture it. Participants will be

shown how to “DIG” into the Internet for the personal information, about any target. 

ADVANCED OPEN SOURCE INTELLIGENCE (OSINT) (TOOLS, TECHNIQUES, PROCEDURES)
You’ll be amazed at how much information you can find online. You just need to know where to LOOK?
OSINT Preparation:  OPSEC, VM, Developer Accounts, Bitcoin, Reverse Image, Smart Device Emulation,
Erased Data, Wardriving, Geospatial, MetaData, API, Dark Net, Deep Web, TOR, Ubuntu, Linux, Python.

OSINT TRAINING TOPICS FOR DISCOVERY

 

  • Introduction to “Open Source Intelligence” (OSINT)

  • Officer Investigator Awareness (OPSEC) (While Performing Online Investigations, What everyone 

  • Knows about you from online, Social Networks and digital footprints (Except you the Investigator)

  • Erased Data, Archived and Cached) (Capture available Data and Images, Presumed to be deleted)

  • Introduction to Linux Distributions (OS) (Powerful Open-Source OS, Several Options, Solid Server)

  • Building RSS Feeds for Investigations (Really Simple Syndication, Technology delivers news feeds)

  • Constructing Virtual Machines (VM) (Build and Run OS within your personal computer, Linux OS)

  • Application Program Interface (API) (Interface used, create call requests for specific information)

  • Python for Law Enforcement (Simple command line codes that yield information about a subject)

  • TOR / Installation and Trolling (Conceals User’s IP Address, usage and challenges, “anonymity”)

  • Geospatial Intelligence (GEOINT) (Various platforms, collect specific material about a location)

  • Search Engines (Methods to extract information and identification on various platforms)

  • Smart Phone / Device Emulation (Allows Officers to monitor traffic through APPS)

  • Metadata / Open Source Platform (Discovering the information within an image)

  • People Search Engine (Multiple Methods and Techniques used for Discovery)

  • Open Documents (Available content and how it can aide in an Investigation)

  • Bitcoin Analytics (Analytics behind Bitcoin Transactions and Investigations)

  • Online Predators / Bullying / Terrorist (Networks through Social Media)

  • Wardriving (What this means to LEO’s, how it helps in an Investigation)

  • Dark Net (How to Navigate, Troll and Identify Underground Users)

  • Reverse Image (Recognize digital signatures or Fingerprints)

  • Social Networks (Communication Platforms for Networking)

bottom of page