Live OSINT Training Sessions

During our 3-day Open Source Intelligence course, we demonstrate new investigation techniques that are vital to any Investigator's arsenal of tools. This is a very full three days of instruction intended on teaching a unique response to online investigation with unconventional free resources. Participants receive LIFETIME access to the Private Investigations Resources area of the site which includes the following:

A complete updated list of all OSINT resources
20 custom web tools that locate "hidden" info on all popular social networks
A custom online search tool that automates many search processes
A pre-configured portable browser with investigation extensions
A software pack of over 40 custom applications that aid in online investigations
Over 50 online resources for investigating like a "hacker"
Updated materials for all training sessions

Contact us to book this training!


Day One:

Open Source Intelligence Techniques Part I

This session identifies and demonstrates numerous free online resources that can aid internet researchers in solving both technical and non-technical investigations. Participants will be shown how to "dig" into the internet for personal information about any target. While popular sites such as Twitter, Instagram, and Facebook are covered in detail (including techniques that legally access some "hidden" content), the presentation goes much deeper into the vast resources available online for researching personal information. Additionally, instructions for identifying local events in real time will be presented in great detail. This first day focuses on the most popular social networks and proper retrieval of located information. These sources can also be used to conduct thorough background checks on potential employees. All resources can be applied to domestic and international investigations.

Among many other techniques, the attendees will learn how to conduct the following queries.

Conduct advanced search queries on dozens of search engines simultaneously
Access restricted information through cached results
Use online translation tools to automate search and translate foreign text
Obtain extended information from personal Facebook profiles
Obtain extended information from Facebook business profiles
Identify personal and business associations on Facebook
Locate and analyze live Facebook video streams
Locate and analyze live Periscope video streams
Identify social networks related to cellular telephone numbers
Locate deleted content from Twitter accounts
Monitor live content and communication on Twitter
Locate posts from private Instagram accounts
Conduct thorough searches of all social networks
Access content believed to be hidden on social networks

Day Two:

Open Source Intelligence Techniques Part II

This session identifies and demonstrates several additional free online resources that can aid internet investigators with any type of internet research. This second day focuses on retrieving relevant information about your investigation outside of standard social network resources.

Among many other techniques, the attendees will learn how to conduct the following queries.

Reverse search photographs for additional copies and details
Locate online videos related to subject of investigation
Reverse search videos for additional copies and details
Break through common pitfalls with YouTube restrictions
Break through common pitfalls with LinkedIn searching
Identify users of private cellular telephone numbers
Search historical deleted versions of websites
Locate documents related to target subject
View multiple satellite image collections of any location
Locate personal addresses of practically anyone
Retrieve Caller ID information from any landline or cellular telephone number
Identify all social networks in use by target username
Search public file storage services for target data

Day Three:

Intel Analysis Software

This session will demonstrate over 40 free software tools that will aid an investigator during any type of investigation. A custom portable web browser will be given to each participant that includes configured plugins that add new search features. These include reverse image location, automatic media download, instant screen capture, and more. Additionally, the browser is configured to block website analytics that can divulge sensitive information about the searcher. Other software includes tools that clone websites, locate twitter data, recover deleted files, display historical versions of satellite mapping data, change an IP address, extract still images from videos, Track GPS devices, locate additional social networks, and identify metadata within online documents. Attendees will have full permanent access to the entire collection of software demonstrated during the session.

Virtual Android Devices

Many new social networks and communication methods only exist as applications on smart devices. There are no options to search much of this data within standard websites. This session will explain from start to finish the procedure of setting up a virtual smart device on your computer. The computer program will have the appearance and function of a smart phone. This application will allow you to replicate every mobile app and anonymously search user information. GPS spoofing will allow you to create the appearance of being at any location of interest and geo-based apps will allow you to monitor individuals at the location. An investigative virtual Android device will be created live in the class and can be replicated by each attendee. All apps will also be installed and configured during this session.



Optional Day: Hiding from the Internet

Investigators and their families are constantly at risk of being targeted by criminal suspects. This optional one-day session identifies publicly available vulnerabilities that expose sensitive information about Investigators. Resources for eliminating this public and private data are explained as well as expected results. Attendees will learn how to eliminate their personal information, including address and contact information, from both public and private databases. Online resources for eliminating personal information will be provided to all recipients. Techniques will be explained that will allow attendees to create completely anonymous email addresses, phone numbers, cellular plans, credit cards, and even home addresses.

Optional Purchase: OSINT Textbooks

All attendees receive access to the digital resources and software demonstrated during this course. We also offer Michael Bazzell's Open Source Intelligence Techniques as an optional purchase. Our bulk rate is passed on to you in order to provide a complete detailed textbook for the entire course. Please contact us for details and pricing.

Live Training Login

Enter the credentials supplied at your live training event here:

Last Name: Password:

CyberCrime Keynotes

Michael Bazzell is also available for conference keynotes, panels, and training sessions. More information can be found at his website link below.

www.ComputerCrimeInfo.com

Privacy Crash Course

Our 2-day course on complete privacy & security is now available. Click the book below for information.






Private VPN

  Buy VPN