Contact Us

Before emailing us, consider the following resources:

IntelTechniques Forum: All queries in reference to technical support, investigation techniques, online tools, and any other related issues should be posted there.

Live Training Schedule: Most live training sessions are held privately for a specific organization. If something does contain open enrollment, which is rare, it will be listed there.

Email Contact: Please use the following list to contact the appropriate personnel.

Live Event Booking (Speaking Agency):
Online Training Orders (Office Staff):
Bulk Book Orders (Publishing Staff):
Consultation Fees & Scheduling (Office Staff):
Investigation Fees & Scheduling (Office Staff):

About Us

We are a small group of online investigations enthusiasts with a strong interest in privacy and digital security. We believe our balance of innovative OSINT (internet search) techniques and our desire to prevent exposure through these methods provides a unique training opportunity for both government and private sector groups. Please use the links above to get in contact with our office or review the biographies below to learn more about our backgrounds.

Michael Bazzell

Michael Bazzell has been investigating computer crimes on behalf of the government for over 20 years. During the majority of that time, he was assigned to the FBI’s Cyber Crimes Task Force where he focused on various online investigations and open source intelligence (OSINT) collection. As an active investigator, he has been involved in numerous major criminal investigations including online child solicitation, child abduction, kidnapping, cold-case homicide, terrorist threats, and computer intrusions. He has trained thousands of individuals in the use of his investigative techniques. He also served as the technical advisor for the first season of the television show "Mr. Robot". His books "Open Source Intelligence Techniques" and "Hiding from the Internet" have been best sellers in both the United States and Europe. He now focuses on helping people become invisible.

Jon Engstrom

Jon Engstrom is a 20-year veteran with a major U.S. metropolitan police department where he serves as the technical lead for the agency’s Criminal Intelligence and Cyber-Crime Sections. He founded and continues to support the organization’s Technical Investigations and Open-Source Intelligence Units, and is the operations lead in charge of threat assessment and incident response for the region’s Real-Time Crime Center. Jon instructs internal department teams as well as outside organizations in the areas of Operational Security for Covert Operations, Countering Electronic Surveillance, Cyber-Crime Investigations, and Open-Source Intelligence. Prior to his current assignments, Jon worked as a Federal Task-Force Officer, running under-cover and electronic surveillance operations for long-term organized crime investigations. With a certification in ethical hacking, he focuses on incorporating an attacker’s perspective into investigations and operational security.

M. A. Drew

M.A. Drew is a Detective in one of our Nation's largest cities assigned to high profile cases that often require covert investigative skills. He investigates crimes involving narcotics, gangs, adult & child sex crimes, human trafficking, and Internet crimes against children (ICAC Task Force). As an open source intelligence analyst and computer forensics and cyber-security specialist, he utilizes these skills to assist in criminal and private investigations of all types. He is a veteran investigator at his agency, and forever a proud United States Marine with overseas deployment experience. First and foremost, he is a privacy and security advocate with a passion for teaching digital operational security and identity management solutions. His classes are available Nationwide to law enforcement, military organizations, and select groups in the private sector.

Glenn Devitt

Glenn Devitt is a veteran with 11 years experience in the United States Army with a background in Human Intelligence (HUMINT) and Counterintelligence (CI). During his military career he was deployed to both Iraq and Afghanistan and was assigned to multiple Joint Task Forces. He has also had the privilege of being an instructor at the Operator Advance Course (OAC), Source Operations Course, Special Operation Forces Physical Surveillance Course, and the Program Manager for the Cyber Operator Greyhat Course. After his military career he joined the H.E.R.O. (Human Exploitation Rescue Operative) Program. This program is designed to allow special operations veterans the chance to become accredited Homeland Security Investigations Computer Forensic Analysts to help combat child exploitation and human trafficking. Glenn then left to start his own company and has spent the last year supporting governments around the world in targeting human trafficking networks through undercover operations and training agents on how to conduct cyber enabled operations.

Photo Policy

Due to the sensitive nature of the instructors' current and previous work, as well as the sensitivity of these training sessions, we do not allow photography or video recording at live training events. Because the instructors do not publish any personal details online, we ask attendees to refrain from posting any class details to social media websites during the training events.

Free Newsletter

to subscribe to our free monthly newsletter:


Our Twitter feed always announces our latest updates, projects, and upcoming public events. Link: