top of page
BUDA.png

              

 

HUMINT OSINT AND SOCMINT ANALYSTS COURSE

BUDAPEST

25TH - 29TH NOVEMBER 2024

 

CONTAINS NEW CONTENT ON PREVIOUS COURSES. ONE STOP COURSE THAT COVERS EVERYTHING

Cost per delegate: 400K HUF/ EURO 995 / £850


 

The price includes course delivery, coffee and tea breaks, lunch for 5 days, certificates, software, handouts, and a USB with free tools. 

Rooms and travel are at the expense of the delegate. There are a number of hotels nearby that provide government rates. Car parking is available locally at the delegates expense. 

Courses ideally suited for:

Who Should Attend (public sector):

Military, government, and police investigators with the following job titles:

  • Counterintelligence Investigators

  • Cybercrime Intelligence Officers

  • Digital Media Examination and Device Investigators

  • Intelligence Analysts

  • Intelligence Collection Managers

  • Law Enforcement Investigators

  • Military Intelligence Officer

 

Who Should Attend (Private sector):

  • Investigative journalists

  • Private investigators

  • Counter corruption investigators.

  • Corporate intelligence analysts, for due diligence and organisational security

  • Security Researchers

  • Vetting officers

Learning expectations, outcomes, and objectives.

  • MASTER understanding the internet and exploits.

  • CAPTURE data relating to all internet transactions and analysis.

  • EQUIP yourself with the latest and updated methods and tradecraft to proactive investigation.

  • ADOPT the latest cutting-edge tools in relation to the modern investigator.

  • STEP UP investigative skills to meet the new challenges offered by online tools and techniques.

  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations when deployed.

  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.

 

COURSE DESCRIPTION

A unique 5 day HUMINT, OSINT and SOCMINT and DARKWEB course to empower and up-skill the ability of the online law enforcement Analyst by an experienced law enforcement investigator. 

The understanding of human and social media intelligence is paramount in today's intelligence-led cyber investigations. With increasing hurdles like encryption, apps and hidden chatrooms, the gathering and developing of how someone uses the internet is becoming essential, in identifying targets.  

This course looks at both the digital footprint left by a target, but also , more importantly, the digital shadow they leave which they have no control over. We also look at network footprints , where to find them, and how to get them. 

There is no pre requisite knowledge or skills required to attend and successfully complete this course, other than the ability to use search engines on a PC. Delegates will be expected to bring a laptop with them to use. Attendees will download free and have included software during the course which they can take away with them and use post- course, in the fight to combat online criminality. 

 

Analysts and Digital investigators involved in the digital profiling of targets will especially benefit from this course. 

The course has an emphasis on practicals throughout online, and offline,  where the student can practice and be proficient in the practice of open source researcher.  Every session during the three days will have practical exercises throughout.  

Delegates will also be provided with a USB at the end of the course with 1000 tools, documents, and course notes which they will be able to keep as an aide memoir. Exclusive access to tutorials online and a library of 200+ tools, to practice and continue the methods taught on the course, when back in the workplace.  

Certificates will be awarded at the conclusion of the course for all delegates, which will enhance their career development and career goals for the future. 

 

 

HIGHLIGHTS

  • An investigator with 38 years  experience talking and training investigators on their level
     

  • Numerous practicals throughout to track suspects and build up analysis of digital footprint
     

  • Hands on live tracking and deep web searching 
     

  • Best professional practice re digital hygiene and evidence gathering
     

  • Best practice and trade craft in handling and analysing data from the internet. 
     

  • FREE Exclusive access to online data base of  200+ OSINT tools
     

  • FREE Exclusive access to online practical advice, and tutorials
     

  • FREE included OSINT software for you to take away and keep
     

  • FREE USB with 1000+ OSINT tools links, glossaries, and OSINT manuals
     

  • FREE Email support and advice post course.

 

  • Certificates issued to further personal development  


KEY AREAS COVERED

OSINT , SOCMINT gathering and analysis.

HUMINT evaluation, risk asessment and identifying actionable intelligence. 

Modules

The session descriptions below are specifically short so as not to specifically publish specific techniques and methods. This course will fully explore each area during the individual sessions. Use of any of these new and innovative methods and techniques explained during the sessions will be up to the individual and the agencies to implement based on their ability and any legal constraints applied by their jurisdiction.  

  • Tradecraft - Covert (non-attribution) and non-identifying search methods.

Deep searching and analysis. Alternative tool and site searching. footprint reduction and incognito browsing. Non identifying profile creation using virtual mobiles and emails to allow registration.  OSINT legend building 

  • Historic and deleted data search methods.

Nothing is entirely deleted. This module takes us deep into the shadows of the internet and identifies data, websites and social media accounts that have long been deleted.

  • Non attributable passive SN profile and legend building,

Non attributable and covert tradecraft and good digital hygiene around this area.  Terrorist chat rooms and interaction monitoring, Human trafficking awareness, tracking and OCG disruption Trafficking awareness, chat rooms, organised criminal group identification and methodology.

  • Images, Exif and meta tabs

Tracking duplicates, sources uploading, meta data and exif data interrogation and identifiers to establish device, location, source, and tracking. Hashing and searching for sharing and uploading significant images. Providing sufficient data and intel to support dissemination to active teams and support warrants and DSA. 

  • Tools Provision

Access to over 1200 OSINT tools on my dedicated investigator training site which is a library of tools collected over the last 20 years in LEA. These cover everything. Delegates will be given access forever. Historic and specific searching.  Also, another 1000 tools on a USB

  • Website analysis and meta data scraping

Covert Deep searching of links and connections into a website; common or accessed sites sharing the same server space. Identifying IP and owners of sites and upload location. Possible server vulnerabilities and exploits. Identifying those in control, where they are and how the access the sites.

  • Attribution 

A headache for most prosecutors and investigators. We can put a device at a location but how do we show who was there with the device. What other clues are there to prove ownership and use? Let us look at them all. 

  • Data analysis and understanding

Analysing and understanding data sets and integrating them in other software such as I2

  • Human anthropology Versus digital foot printing

How we live, move, and react with the real world is reflected in the digit footprint we leave in the virtual world. This session will look at where to look for clues in the data and footprint, to profile and help identify the person leaving it. 

  • Social engineering tricks and exploits

This session gives the delegate an understanding of the origins, impact, and harm that the modern criminal social engineer plays in crime and intelligence security in the modern-day internet. It covers both attack and defence. Can we identify, exploit, and copy their tactics? Can we use fake news as a weapon to combat crime? Geo location 

  • Tracking and identifying devices on the internet and their speed direction and use by the target.

Includes vehicle telematics, association, speed, data sources and non-visual surveillance. Identifying buildings/ locations (public and private) that the device uses and frequents.  Geolocation and advanced digital surveillance if required.

  • lifestyle analysis 

Identifying targets by their device movement and location. Identifying public Wi-Fi spots used and interrogation.  Remote device interrogation and harvesting.

  • Legislation and legal action awareness

Covers all aspects of relevant legislation in respect of paint research - pitfalls and considerations regarding Intercept and AP. Also cover the transition to evidence from intel online, Business data without applying for it, and identifying company interests and ownership which were not available or known. Impact of GDPR and DPA. Use of MLAT and ILOR. (DPA, GDPR, EUDRD, ECHR, RIPA, IPA 2016, CHIS bill)

  • Social Networking 

Identifying which sites are used by the target quickly, then interrogation of the sites by searching the data not by using the site. Links between targets on the same and different SN sites. Direct and historic chats between multiple profiles to prove association and analysis.

  • Analysis online of a subject’s location

when uploading / tweeting/ blogging AND the identity and location of the people in their online group. 

  • Data communications awareness, applications, and best practice

Awareness around what can be asked for, how to ask and where to get it.

  • Other identifiers of value 

Mac IMSI and IMEI, SSID and BSSID identifiers that will be of significant value to the investigation. Their anomalies, values, and potential. Port scanning and network analysis 

 

Darkweb

The foray into the Darknet includes everything you need to know about anonymous networks their use, finding targets and tracing data on hidden networks. What cryptocurrency is and how it facilitates crime on the Darknet and how law enforcement can trace and analyse transactions. The modules of the course can be adapted to the needs of the unit and their operational area.

(Either as a light touch inclusion in the 5-day course, or a standalone 3-day intensive course following the OSINT course. The 8 days total is recommended as the learning objectives and practical workshops are greater, due to the additional time to do them.)

  • The Darknet/Dark Web

What it is and what it is not Understanding what the Darknet really is can be a challenge. The technology behind the Darknet is not a single program or location. This session will explore what the Darknet is and how it differs from the Deep web.

  • Tor network analysis

Understanding how a subject connects; what exploits we have available, how we can identify the user and what they are downloading. Understanding entry and exit nodes, interrogating them and gathering data to identify the user.

  • Dark web familiarisation and covert monitoring

Setting up and using Tor may be easy, but finding what you want on the Tor network can be a challenge. This session will look at the Tor network how it works and methods for using it during an investigation.  

  • Cryptocurrency and its use in the Darknet

New to investigations involving bitcoin? Need to understand how to track the funds through various cryptocurrencies? How do wallets work and is there any evidence I can use when I find one? This session will provide you with the ability to understand and deal with Bitcoin and other cryptocurrencies during your investigations.  

Crypto Key takeaways:

  • Crypto currency structure and networks

  • How it all works and what is visible

  • Awareness around different coins

  • Setting up systems to monitor and track.

  • Covert and hidden investigators tradecraft and methodology.

  • Understanding the blockchain, pools and exchanges

  • Tools awareness to assist and track coin transactions.

  • Exploits and weaknesses

  • Email support and advice post course.

  • Course certificate to enhance career development.

 

  • Going Undercover on the Darknet

Darknet investigations require the use of a persona like any other investigation. It also requires that you understand the equipment you are using and practice online officer safety techniques specialized for online/ Darknet investigations. This session will look at the requirements and investigator have equipment and persona background specializing in Darknet investigations.   Using web bugs and other technology to locate a suspect How can we locate targets online using various code. How can it be done and what skills does the investigator need? What are the potential legal issues?   

  • Advanced Darknet/Dark Web Investigations,

Identifying the anonymous user Are there legally available methods which we can implement to identify anonymous users on the Internet? The answer is definitely yes. This session will discuss the techniques available to the investigator to identify users of anonymization on the Internet. Email extraction from Public and private encryption keys.


COURSE STRUCTURE

The course is designed to take the student through the full spectrum of topics necessary to be an effective Cyber Internet investigator. Whether it’s chasing cryptocurrencies, tracking pedophiles through keywords or images, or simply finding deep buried and historic data on your target, on the Darknet or the open web, this is the course for you. From network exploration and how we all leave digital footprints, to device tracking and bitcoin analysis, The course focuses on all online offenders and organized criminal gangs from financial criminal behavior to offenders against children.

The course also covers in detail, tracking and tracing images, Exif and meta-data, and live internet searches. The foray into the Darknet includes everything you need to know about anonymous networks their use, finding targets and tracing data on hidden networks. What cryptocurrency is and how it facilitates crime on the Darknet and how law enforcement can trace and analyse transactions.

Emphasis is placed upon the analysis of the data captured, in order to digitally profile the target. 

WORKSHOPS

This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online. Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential.The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.

Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

STUDENTS WILL RECEIVE

Students will each receive a course USB drive with associated software and resource material. Included on the USB drive are the software tools used during the course, tutorials, and over 1000 OSINT tool links to ensure they continue to have the tools they need, post-course. Certificates will also be issued. 

Cost per delegate: 400K HUF/ EURO 995 / £850

The price includes course delivery, coffee and tea breaks, lunch for 5 days, certificates, software, handouts, and a USB with free tools. 

Rooms and travel are at the expense of the delegate. There are a number of hotels nearby that provide government rates. 

 

bottom of page