OSINT 3 day workshop     15-17 Feb 21

DARKWEB  2 day wshop   18-19 Feb 21

Deerfoot Inn and Casino
Calgary, AB T2Z 3W4, Canada
Deerfoot
OSINT 3 Day CAD$750 pp
DARKWEB 2 Day CAD$450pp
Both courses booked together CAD$1050
10% discount for bookings of 3 or more persons
Lunch and refreshments included. Accommodation and travel are delegates own responsibility.  

OSINT COURSE DESCRIPTION

A unique 3 day HUMINT, OSINT and SOCMINT course to empower and up-skill the ability of the online law enforcement Analyst by an experienced law enforcement investigator. 

The understanding of human and social media intelligence is paramount in todays intelligence led cyber investigations. With increasing hurdles like encryption , apps and hidden chatrooms, the gathering and developing of how someone uses the internet is becoming essential, in identifying targets.  

This course looks at both the digital footprint left by a target, but also , more importantly, the digital shadow they leave which they have no control over. We also look at network footprints , where to find them, and how to get them. 

There is no pre requisite knowledge or skills required to attend and successfully complete this course, other than the ability to use search engines on a PC. Delegates will be expected to bring a laptop with them to use. Attendees will download free and have included software during the course which they can take away with them and use post- course, in the fight to combat online criminality. 

 

i2 analysts and Digital investigators involved in the digital profiling of targets will especially benefit from this course. 

The course has an emphasis on practicals throughout online, and off line,  where the student can practice and be proficient in the practice of open source researcher.  Every session during the three days will have practical exercises throughout.  

Delegates will Also be provided with a USB at the end of the course with 1000 tools, documents and course notes which they will be able to keep as an aide memoire. Exclusive access to tutorials online and a library of 200+ tools, to practice and continue the methods taught on the course, when back in the workplace.  

Certificates will be awarded at the conclusion of the course for all delegates, which will enhance their career development and career goals for the future. 

 

 

HIGHLIGHTS

  • An investigator with 38 years  experience talking and training investigators on their level
     

  • Numerous practicals throughout to track suspects and build up analysis of digital footprint
     

  • Hands on live tracking and deep web searching 
     

  • Best professional practice re digital hygiene and evidence gathering
     

  • Using data sets to incorporate in i2 software and charts
     

  • FREE Exclusive access to online data base of  200+ OSINT tools
     

  • FREE Exclusive access to online practical advice, and tutorials
     

  • FREE included OSINT software for you to take away and keep
     

  • FREE USB with 1000+ OSINT tools links, glossaries, and OSINT manuals
     

  • FREE Email support and advice post course.

  • Coffee, tea, refreshments and lunch included

 

  • Certificates issued to further personal development  


KEY AREAS COVERED

Network Footprints 

Server identification where subject inadvertently and accidentally leave footprints that they cannot control

Historic and Deleted Data

When a target deletes data, where can we find copies and shadows. deep and dark web searches.

Data Analysis

The biggest problem for the investigator. We may identify the device , but can we associate that with an individual. This course shows you best practice to achieve this. 

Movement and Lifestyle.

This module looks at movement and lifestyle associated with the device footprint in order to identify commute routes, places frequented, times dates, speed direction, etc. The handset footprint can tells what this persons lifestyle is. This module will have workshops so you can identify the user, and real life examples of when this has been used. 

Analysis 

Matching data to i2 data sets and charts . Blending data together effortlessly to identify the life of your target.

Alternative Sources. 

OSINT and obscure overlooked data sets value and inclusion in the analysis charts. 

Tools

Provision and access to over 1200 OSINT tools on my dedicated investigator training site which is a library of tools collected over the last 20 years in LEA. These cover everything. Delegates will be given access forever. Historic and specific searching. 

Website Analysis

Deep searching of links and connections into a website; common or accessed sites sharing the same server space. Identifying IP and owners of sites and upload location. Possible server vulnerabilities and exploits.

Attribution

A headache for most prosecutors and investigators. We can put a device at a location but how do we show who was there with the device. What other clues are there to prove ownership and use? Let us look at them all. 

Human Anthropology

How we live, move and react with the real world is reflected in the digit footprint we leave in the virtual world. This session will look at where to look for clues in the data and footprint, to profile and help identify the person leaving it 

Social Engineering

This session gives the delegate an understanding of the origins, impact and harm that the modern criminal social engineer plays in crime and intelligence security in the modern day internet. It covers both attack and defence. Can we identify, exploit and copy their tactics? 


COURSE STRUCTURE

The course is designed to take the student through the full spectrum of topics necessary to be an effective Cyber Internet investigator. Whether it’s chasing cryptocurrencies, tracking pedophiles through keywords or images, or simply finding deep buried and historic data on your target, on the Darknet or the open web, this is the course for you. From network exploration and how we all leave digital footprints, to device tracking and bitcoin analysis, The course focusses on all online offenders and organised criminal gangs from financial criminal behaviour to offenders against children.

The course also covers in detail, tracking and tracing images, Exif and meta-data, and live internet searches. The foray into the Darknet includes everything you need to know about anonymous networks their use, finding targets and tracing data on hidden networks. What cryptocurrency is and how it facilitates crime on the Darknet and how law enforcement can trace and analyse transactions.

Emphasis is placed upon the analysis of the data captured, in order to digitally profile the target. 

WORKSHOPS

This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online. Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential.The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.

Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

STUDENTS WILL RECEIVE

Students will each receive a course USB drive with associated software and resource material. Included on the USB drive are the software tools used during the course, tutorials and over 1000 OSINT tool links to ensure they continue to have the tools they need, post course. Certificates will also be issued. 

DARKWEB COURSE DESCRIPTION

 A 2 day course centering on Darkweb interaction and monitoring, with associated OSINT tools to perform the operations efficiently. 

 

 Mission Statement

The 2 Day workshop and masterclass covers the very best and up to date methods and tradecraft. It will equip today cyber investigator with the latest cutting edge tools and proactive investigation methodology. The content of this unique course is not offered anywhere else. 

This is not a general lecture course and is for experienced investigators to learn advanced topics. The course material:

  1. Supported by real world examples and incidents. 

  2. Provides the student with the understanding of how to apply effective OSINT investigative techniques to real world cases. 

  3. Demonstrates the threat the Darknet poses and the  investigative techniques to expose criminals in this space. 

  4. Allow investigators increase their skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet. 

  5. The instructional material and course exercises are presented from an investigators point of view. 

  6. Those attending with a limited technical background will benefit from the step by step material and guides used in the course. 

  7. This course contains new and innovative law enforcement specific methodologies and techniques. 

 

Course structure

The course is designed to take the student through the full spectrum of topics necessary to be an effective Cyber/Internet investigator. Whether it’s chasing cryptocurrencies through the blockchain, tracking pedophiles through keywords or images, or simply finding buried historical data on your target, on the Darknet or the open web, this is the course for you. From network exploration and how we all leave digital footprints, to device tracking and bitcoin address analysis, the course focuses on all online offenders and organized criminal gangs from financial criminal behavior to offenders against children

​The course covers in detail many investigative topics including: 

  1. Tracking and tracing images.

  2. Understanding Exif and meta-data.

  3. Live internet searches.

  4. The review of webpage source code (both Clearnet and Darknet websites). 

  5. Using the Darknet.

  6. Everything an investigator needs to know about encrypted anonymous networks. The investigator will clearly understand their use.

  7. How darknet targets can be found.

  8. Tracing data on hidden networks. 

  9. Understanding the purpose and history of cryptocurrency.

  10. How cryptocurrency facilitates modern crime on the Darknet.

  11. Understanding the basics of how law enforcement can trace and analyze cryptocurrency transactions.

  12. How OSINT supports the investigation of Darknet cases.

  13. Building your own Darknet site.

  14. Social Networks and their tie to Darknet investigations.

  15. Legend Building

  16. And much, much more…

Workshops

This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online.  Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential. The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.

Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Students will receive

Students will each receive an electronic copy of the course material, Step-by-step instructions for all exercise, handouts and cheat-sheets for quick reference to detailed information sources and a course USB drive with associated software and resource material. Included on the USB drive are the software tools used during the course, tutorials and over 1000 OSINT tool links to ensure they continue to have the tools they need, post course.

Elements and modules

The following course content is not offered anywhere else. The session descriptions below are specifically short so as not to specifically publish specific techniques and methods. This course will fully explore each area during the individual sessions. Use of any of these new and innovative methods and techniques explained during the sessions will be up to the individual and the agencies to implement based on their ability and any legal constraints applied by their jurisdiction.

 

The Darknet/Dark Web, what it is and what it is not

The technology behind the Darknet is not a single program or location. This session will explore what the Darknet is and how it differs from the Deepweb providing the investigator with the understanding of this new environment.

 Tor and its use in an investigation

Attendees will set up and access The Onion Router (Tor). They will learn how the network hides its users and makes investigating users a challenge. This session will look at the Tor network  works and methods for using it successfully during an investigation.

 Cryptocurrency as misused by criminals

This session will provide investigators with the ability to understand and deal with cryptocurrencies during investigations. Attendees will have a clear understanding of how the use of Bitcoins are effecting  investigations. They will learn to how to track the funds through various cryptocurrencies.  Attendees will understand how wallets work, where evidence in the cryptocurrency system resides, how the blockchain works and investigators can track transactions through the system.

 Going Undercover on the Darknet

Darknet investigations require the use of a persona like any other investigation. It also requires that you understand the equipment you are using and practice online officer safety techniques specialized for online/Darknet investigations. This session will look at the requirements and investigator has equipment and persona background specializing in Darknet investigations.

 

Technology and techniques to locate a suspect on the Darknet

Anonymous networks are intentionally designed to hide users. Are there legally available methods which we can implement to identify anonymous users on the Internet? The answer is definitely yes.  The attendees will learn techniques to locate targets online through the use of various code. The attendees will actually build tools to assist in an investigation. The potential legal issues when implementing these techniques will also be discussed.

 Meta data use on the Internet in Images and documents

This block exposes the investigator to the use of Meta Data in files. How tracking duplicates, the sources uploading, revealing Exif data in images and other identifiers used to establish device location, source and tracking.  How Hashing and searching can identify additional actionable intelligence or investigative leads. 

Tools 

Provision and access to over 1200 OSINT tools on Bentac’s dedicated investigator training site. This library of tools has been collected over the last 35 years in LEA. The investigative tools cover a wide spectrum of OSINT investigation and give the investigator access to Historic and specific searching tool and the latest available information on social media. Course attendees will be given access to the site forever. 

​Website analysis 

Attendees will learn the “Deep” searching of links and connections into a website; common or accessed sites sharing the same server space. Identifying IP and owners of sites and upload location. Possible server vulnerabilities and exploits  

​Target Attribution 

Our technology can often let us track a device to a physical location. However, placing a target actually behind the keyboard of a computer or cell device is a challenge for most prosecutors and investigators. This block will provide attendees with the investigative clues there may be to prove ownership and use of a computer or device.​

​Social engineering tricks and exploits 

This session gives the delegate an understanding of the origins, impact and harm that the modern criminal social engineer plays in crime and intelligence security in the modern day internet. It covers both attack and defence. Can we identify, exploit and copy their tactics? 

​Legislation 

Covers all aspects of relevant legislation in respect of paint research - pitfalls and considerations regarding Intercept and AP.   Also cover the transition to evidence from intel online , Business data without applying for it, and identifying company interests and ownership which were not available or known. 

Darkweb market Networking 

Identifying which sites are used by the target quickly , then interrogation of the sites by searching the data not by using the site. Links between targets on the same and different SN sites. Direct and historic chats between multiple profiles to prove association and analysis. Analysis online of a subjects location when uploading / tweeting/ blogging AND the identity and location of the people in their online group.

​Tradecraft 

Covert (non attrib) and non identifying search methods. Deep searching and analysis. Alternative tool and site searching. footprint reduction and incognito browsing. Non identifying profile creation using virtual mobiles and emails to allow registration. 

OSINT legend building 

Non attributable SN profile and legend building, tradecraft and good digital hygiene around this area. 

© 2018 Proudly created by Juliet Sidney - Bamboo