1 - 2 December 2022 - Training Course: Open Source Intelligence Security Exploitation

Published on 3rd October, 2022



Information gathered from public sources is a great resource for security and intelligence operators, and can be used to support immediate tactical-operational decision, or the creation of long-term strategies for a variety of security goals.

Protective Intelligence Network instructors will provide two days customised basic training on Open Source Intelligence & Social Media Intelligence Exploitation.

The course is open to the public, and it is especially adressed to police, law enforcement agencies, security practitioner, journalists, and whoever has interest in OSINT activities.

It will be organised (09.00am - 05.00pm) in a 5-star hotel located in Singapore city center. Coffee breaks and lunches are included.

No technical knowledge is required, and no programming skills are considered in this course. (More Info at POC@networkpi.net)

1 - 2 December 2022 - Training Course: Open Source Intelligence Security Exploitation

This learning experience aims to provide the participants with the basic practical knowledge of lawful online investigation techniques in order to make full use of and derive benefit from different open-source platforms, in the frame of criminal and security investigations.

A realistic online investigation exercise will be run during the training course.

Upon completion of the course, the participants are expected to be able to explore the information available in various open-source platforms and web services and to enhance the use of general OSINT techniques suitable for the collection of data, information and intelligence.

Image
Image
Image

An organization that invests in open source today is akin to an individual who invested in Google in its first year. OSINT has always been an integral component in intelligence … An organization with an appreciation for OSINT’s value and potential will be the most effective in the future. (US Central Intelligence Agency CIA website)

1 - 2 December 2022 - Training Course: Open Source Intelligence Security Exploitation

Brief overview of the topics discussed during the course:

- The Use of INTERNET by criminal, terrorists, and possible use by security actors General presentation offering an overview of the way criminals and terrorist make use of the web, and possible security implications. This lecture was also presented at the MSc course on Intelligence and National Security of NTU-Singapore, and the Terrorism Analyst Training Course (TATC) at the International Centre for Political Violence and Terrorism Research (ICPVTR - RSIS) in Singapore.

- INTERNET Searches ‘Warming up’ Class exercise. Simple exercise that consents to establish participants' level of proficiency in online searching activities.

- Fantastic 5! An Overview This module will consider the most important social media platforms to be used in order to gather information in the frame of social media intelligence analysis. (SOCMINT)

- OSINT & Google Operators What is OSINT, Google algorithms and Search Operators

- What is SOCMINT Answering Questions : Is it ethical? Is it reliable? Case Study: Boston Bombing

- OSINT – Online Investigative Strategy and Research Plan Search strategies - The importance of developing a good research plan - Semantic Association Technique

- Exercise: Retrieving information Three brief exercises to be completed online. Photographic details, Twitter handle investigation, Photographic detail elaboration.

- Fantastic 5! Continuation This module will consider the most important social media platforms to be used in order to gather information in the frame of social media intelligence analysis. (SOCMINT)

- The Intelligence Cycle OSINT and SOCMINT within the Intelligence Disciplines context.

- Travel Intelligence Assessments Use of PAI, OSINT and SOCMINT in the frame of travel security evaluations

- Realistic Application “A Direct-Action Threat against your Organisation” This online exercise simulates the application of OSINT/SOCMINT activities in order to enhance the overall security in place in relation to determinate events and threat levels. Trainees will look to tangible ongoing threats, identify new and old threats, and identify real person/s of interest (POI) or antagonist group behind the actual threats.

- Online Investigation Investigate connections and sort out the person of interest implicated in a major robbery.

Image
Image

Request more info at POC@networkpi.net today.