HUMINT OSINT AND SOCMINT INVESTIGATOR AND ANALYSTS COURSE
Central Sydney, Australia
POLICE/MILITARY/GOV ONLY
21st -23rd April 2025
$995 AUD PER PERSON - EARLY BIRD OFFER
$1295 AUD AFTER 1ST FEB 2025
DISCOUNTS FOR MULTIPLES OF 3+ BOOKINGS MADE AT SAME TIME
The price includes course delivery, coffee and tea on breaks, lunch for 3 days, certificates, software, handouts, and access to over 2000+ free tools and software.
Rooms and travel are at the expense of the delegate. There are a number of hotels nearby that provide government rates. Car parking is available locally at the delegates expense. Central Sydney.
Key areas covered
o ◦ Online profile interrogation and building.
o ◦ Social network data harvesting.
o Online entity - tracking and tracing those in control of websites and accounts
o ◦ Device tracking and tracing
o ◦ Searching for data in the deep web
o ◦ OSINT tool use and practical’s
o ◦ Live tracking and monitoring
o ◦ Best practice in intelligence and evidence gathering
o ◦ Search techniques and awareness.
o ◦ Proactive and innovative techniques
o ◦ Understanding social engineering and using it against targets.
Who Should Attend and benefit from this course:
Military, government, and police investigators with the following job titles:
-
Counterintelligence Investigators
-
Cybercrime Intelligence Officers
-
Digital Media Examination and Device Investigators
-
Intelligence Analysts
-
Intelligence Collection Managers
-
Law Enforcement Investigators
-
Military Intelligence Officer
-
Police investigators
-
Those involved in CSAM and CT investigations
COURSE DESCRIPTION
A unique 3 day HUMINT, OSINT and SOCMINT course to empower and up-skill the ability of the online law enforcement Analyst by an experienced law enforcement investigator.
The understanding of human and social media intelligence is paramount in today's intelligence-led cyber investigations. With increasing hurdles like encryption, apps and hidden chatrooms, the gathering and developing of how someone uses the internet is becoming essential, in identifying targets.
This course looks at both the digital footprint left by a target, but also , more importantly, the digital shadow they leave which they have no control over. We also look at network footprints , where to find them, and how to get them.
There is no pre requisite knowledge or skills required to attend and successfully complete this course, other than the ability to use search engines on a PC. Delegates will be expected to bring a laptop with them to use. Attendees will download free and have included software during the course which they can take away with them and use post- course, in the fight to combat online criminality.
Analysts and Digital investigators involved in the digital profiling of targets will especially benefit from this course.
The course has an emphasis on practicals throughout online, and offline, where the student can practice and be proficient in the practice of open source researcher. Every session during the three days will have practical exercises throughout.
Delegates will also be provided with a USB at the end of the course with 1000 tools, documents, and course notes which they will be able to keep as an aide memoir. Exclusive access to tutorials online and a library of 200+ tools, to practice and continue the methods taught on the course, when back in the workplace.
Certificates will be awarded at the conclusion of the course for all delegates, which will enhance their career development and career goals for the future.
HIGHLIGHTS
-
An investigator with 40 years experience talking and training investigators on their level
-
Numerous practicals throughout to track suspects and build up analysis of digital footprint
-
Hands on live tracking and deep web searching
-
Best professional practice re digital hygiene and evidence gathering
-
Best practice and trade craft in handling and analysing data from the internet.
-
FREE Exclusive access to online data base of 200+ OSINT tools
-
FREE Exclusive access to online practical advice, and tutorials
-
FREE included OSINT software for you to take away and keep
-
FREE USB with 1000+ OSINT tools links, glossaries, and OSINT manuals
-
FREE Email support and advice post course.
-
Certificates issued to further personal development
KEY AREAS COVERED
OSINT , SOCMINT gathering and analysis.
HUMINT evaluation, risk asessment and identifying actionable intelligence.
Network Footprints and digital shadow
Server identification where subject inadvertently and accidentally leave footprints that they cannot control
Historic and Deleted Data
When a target deletes data, where can we find copies and shadows. deep and dark web searches.
Image analysis and track&trace.
Data Analysis
The biggest problem for the investigator. We may identify the device , but can we associate that with an individual. This course shows you best practice to achieve this.
Movement and Lifestyle.
This module looks at movement and lifestyle associated with the device footprint in order to identify commute routes, places frequented, times dates, speed direction, etc. The handset footprint can tells what this persons lifestyle is. This module will have workshops so you can identify the user, and real life examples of when this has been used.
Analysis
Matching data to existing data sets and charts . Blending data together effortlessly to identify the life of your target.
Alternative Sources.
OSINT and obscure overlooked data sets value and inclusion in the analysis charts.
Tools
Provision and access to over 1200 OSINT tools on my dedicated investigator training site which is a library of tools collected over the last 20 years in LEA. These cover everything. Delegates will be given access forever. Historic and specific searching.
Website Analysis
Deep searching of links and connections into a website; common or accessed sites sharing the same server space. Identifying IP and owners of sites and upload location. Possible server vulnerabilities and exploits.
Attribution
A headache for most prosecutors and investigators. We can put a device at a location but how do we show who was there with the device. What other clues are there to prove ownership and use? Let us look at them all.
Human Anthropology
How we live, move and react with the real world is reflected in the digit footprint we leave in the virtual world. This session will look at where to look for clues in the data and footprint, to profile and help identify the person leaving it
Social Engineering
This session gives the delegate an understanding of the origins, impact, and harm that the modern criminal social engineer plays in crime and intelligence security in the modern-day internet. It covers both attack and defense. Can we identify, exploit and copy their tactics?
Intelligence report writing
Presenting the intelligence gathered in a constructive manner, for either intelligence , warrants or evidence.
COURSE STRUCTURE
The course is designed to take the student through the full spectrum of topics necessary to be an effective Cyber Internet investigator. Whether it’s chasing cryptocurrencies, tracking pedophiles through keywords or images, or simply finding deep buried and historic data on your target, on the Darknet or the open web, this is the course for you. From network exploration and how we all leave digital footprints, to device tracking and bitcoin analysis, The course focuses on all online offenders and organized criminal gangs from financial criminal behavior to offenders against children.
The course also covers in detail, tracking and tracing images, Exif and meta-data, and live internet searches. The foray into the Darknet includes everything you need to know about anonymous networks their use, finding targets and tracing data on hidden networks. What cryptocurrency is and how it facilitates crime on the Darknet and how law enforcement can trace and analyse transactions.
Emphasis is placed upon the analysis of the data captured, in order to digitally profile the target.
WORKSHOPS
This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online. Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential.The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.
Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.
STUDENTS WILL RECEIVE
Students will each receive a course USB drive with associated software and resource material. Included on the USB drive are the software tools used during the course, tutorials, and over 1000 OSINT tool links to ensure they continue to have the tools they need, post-course. Certificates will also be issued.
The price includes course delivery, coffee and tea breaks, lunch for 3 days, certificates, software, handouts, and a USB with free tools.
Rooms and travel are at the expense of the delegate. There are a number of hotels nearby that provide government rates.