Live OSINT Training Sessions

During our 3-day Open Source Intelligence course, We demonstrate new investigation techniques that are vital to any Investigator's arsenal of tools. This is a very full three days of instruction intended on teaching a unique response to online investigation with unconventional free resources. Participants receive access to the entire Investigations Resources area of the site which includes the following:

A complete updated list of all OSINT resources
20 custom Web tools that locate "hidden" info on all popular social networks
A custom online search tool that automates many search processes
A custom Linux OSINT Virtual Machine ready for immediate use
A pre-configured portable browser with investigation extensions
Updated online materials for all training sessions

Contact us to book this training!


Day One:

Open Source Intelligence Techniques Part I

This session identifies and demonstrates numerous free online resources that can aid internet researchers in solving both technical and non-technical investigations. Participants will be shown how to "dig" into the internet for personal information about any target. While popular sites such as Twitter, Instagram, and Facebook are covered in detail (including techniques that legally access some "hidden" content), the presentation goes much deeper into the vast resources available online for researching personal information. Additionally, instructions for identifying local events in real time will be presented in great detail. This first day focuses on the most popular social networks and proper retrieval of located information. These sources can also be used to conduct thorough background checks on potential employees. All resources can be applied to domestic and international investigations.

Among many other techniques, the attendees will learn how to conduct the following queries.

Conduct advanced search queries on dozens of search engines simultaneously
Access restricted information through cached results
Use online translation tools to automate search and translate foreign text
Obtain extended information from personal Facebook profiles
Obtain extended information from Facebook business profiles
Identify personal and business associations on Facebook
Locate and analyze live Facebook video streams
Locate and analyze live Periscope video streams
Identify social networks related to cellular telephone numbers
Locate deleted content from Twitter accounts
Monitor live content and communication on Twitter
Locate posts from private Instagram accounts
Conduct thorough searches of all social networks
Access content believed to be hidden on social networks

Day Two:

Open Source Intelligence Techniques Part II

This session identifies and demonstrates several additional free online resources that can aid internet investigators with any type of internet research. This second day focuses on retrieving relevant information about your investigation outside of standard social network resources.

Among many other techniques, the attendees will learn how to conduct the following queries.

Reverse search photographs for additional copies and details
Locate online videos related to subject of investigation
Reverse search videos for additional copies and details
Break through common pitfalls with YouTube restrictions
Break through common pitfalls with LinkedIn searching
Identify users of private cellular telephone numbers
Search historical deleted versions of Websites
Locate documents related to target subject
View multiple satellite image collections of any location
Locate personal addresses of practically anyone
Retrieve Caller ID information from any landline or cellular telephone number
Identify all social networks in use by target username
Search public file storage services for target data

Day Three:

Intel Analysis Software

This session will provide instruction on the use of Buscador, which is a Linux Virtual Machine that is pre-configured for online investigators. This includes the following pre-built applications.

Custom Firefox Install and Add-Ons
Custom Chrome Install and Extensions
Tor Browser
Custom Video Manipulation Utilities
Custom Video Download Utility
Recon-NG
Maltego
Creepy
Metagoofil
MediaInfo
ExifTool
TheHarvester
Wayback Exporter
HTTrack Cloner
Web Snapper
Knock Pages
SubBrute
Twitter Exporter
Tinfoleak
BleachBit
VeraCrypt
KeePass


Virtual Android Devices

Many new social networks and communication methods only exist as applications on smart devices. There are no options to search much of this data within standard Websites. This session will explain from start to finish the procedure of setting up a virtual smart device on your computer. The computer program will have the appearance and function of a smart phone. This application will allow you to replicate every mobile app and anonymously search user information. GPS spoofing will allow you to create the appearance of being at any location of interest and geo-based apps will allow you to monitor individuals at the location. An investigative virtual Android device will be created live in the class and can be replicated by each attendee. All apps will also be installed and configured during this session.



Optional Day: Hiding from the Internet

Investigators and their families are constantly at risk of being targeted by criminal suspects. This optional one-day session identifies publicly available vulnerabilities that expose sensitive information about Investigators. Resources for eliminating this public and private data are explained as Well as expected results. Attendees will learn how to eliminate their personal information, including address and contact information, from both public and private databases. Online resources for eliminating personal information will be provided to all recipients. Techniques will be explained that will allow attendees to create completely anonymous email addresses, phone numbers, cellular plans, credit cards, and even home addresses.

Optional Purchase: OSINT Textbooks

All attendees receive access to the digital resources and software demonstrated during this course. We also offer Michael Bazzell's Open Source Intelligence Techniques as an optional purchase. Our bulk rate is passed on to you in order to provide a complete detailed textbook for the entire course. Please contact us for details and pricing.

Live Training Login

PLEASE NOTE!
The Live Training portal is no longer being updated and the current tools are now public:

Online Tools
Android Tools
Software Tools

PREVIOUS CLASS LOGIN:
Enter the credentials supplied at your live training event here:

Last Name: Password:

CyberCrime Keynotes

Michael Bazzell is also available for conference keynotes, panels, and training sessions. More information can be found at his Website link below.

www.ComputerCrimeInfo.com

Privacy Crash Course

Our 2-day course on complete privacy & security is now available. Click the book below for information.






Suggested VPN


We currently recommend Private Internet Access (PIA) as our VPN of choice. While we are an affiliate of PIA, we also use it every day on all of our devices, and have for several years.