Open Source Intelligence (OSINT)
Open Source Intelligence Course (OSINT) – in English
Introduction
It is hard to deny the booming popularity of social networking sites, the type of sites that facilitate a high degree of user personalization, and user intercommunication. These site are huge, Facebook has more than 2.45 billion monthly active users. Twitter has more than 1 billion users posting more than 200 million tweets a day. There’s a huge amount of information about users personal life’s being posted every day. People frequently post information about the more mundane aspects of their lives that they would probably not share with someone during verbal conversation. Additionally, users may share their status, news stories, notes, photos, videos, and allow their friends or friends of friends to comment on them. This information can be very valuable to forensic investigations.
It is unavoidable that this platform may also provide incentives for criminals to carry out illegal activates such as drug, sex trading and many others. Also the ever-growing popularity of social networking websites has created a vast security issues such as corporate espionage, social network site aggregators, phishing, theft, bullying, face recognition vulnerabilities, data collection, spam, etc.
The increase in public’s use of social networking services, such as Facebook, Twitter and LinkedIn significantly impacts general counsel’s approach to litigation, investigations, and fraud prevention by providing a new avenue to search for potentially relevant information and evidence.
Learning Objective
During this tree days hands-on course, participants will learn how to determine the nature of online criminal activity and conducting a background check like character, habits, activities, financial information.
It also helps to understand how criminal organizations use online social network to interact, identify victims and conceal their identity. Through facilitated sharing, exercises, group discussions and case studies, you will acquire insights on it helps to identify all of persons involved in the online criminal activities and obtain evidence of the crime from social networking sites and identify potential problems. A workflow of the general techniques used will also be presented using case studies and fraud investigation and execution to minimize collateral damages to individuals and company.
This tree days hands-on course is designed for private professionals, government and police officers, to understand where and how to start information gathering & Darknet investigations . Participants will learn how to safely and legally conduct Dark Web criminal investigations, engage in covert operations, and locate, track and apprehend criminals blending yesterday’s, today’s and tomorrow’s technology. Participants will conduct live exercises and apply unconventional investigative techniques and approaches to Dark Web investigations.
COURSE OUTLINE
Introduction
-
- Introduction to OSINT and data collection
- Modern investigation
- Understanding URLs and Domain Names
- Tracing Domains and IP Addresses
- Social networks in digital form
- Anatomy of online social network
- Privacy issues
- Misuse of social network sites
- Overview of legal issues for law enforcement
- Advanced collection frameworks – requirements and strategic
- Target selection, research and background info
- Effective web searching
- Finding target and user profiling
Social Engineering Mapping
-
- Social Engineering and phishing
- Identity theft
- Real time chat rooms
- Profile cloning
- Cyberstalking
- Hacking accounts
- Mining unprotected info
- Social network analysis
- Contribution of network analysis to online communication
- Exploratory data analysis and link analysis
Information Gathering and Mapping
-
- Trace route, WHOIS tools
- Advance information gathering and techniques
- Browser usage, Foreign Language Searchand Translation
- Finding Hidden and Removed Web Pages/Profiles/Blogs
- Advanced search engine usage and techniques
- Determine the identity of a profile’s creator
- Public and private profile investigation
- Setup an undercover profile
- How to use an undercover profile for information gathering
- History recovery
- Status update
- Chat
- GPS
Social Networking Mapping
-
- Social network analysis
- Contribution of network analysis to online communities
- Exploratory data analysis and link analysis
Social Engineering
-
- Trust and the art of social engineering
- Types of social engineering
- Social Engineering Framework
- Phishing, Vishing, Impersonating attack
- The Social-Engineer Toolkit (SET)
- Build a Scam Workshop Dark Web Covert Operations
Introduction to Dark Web and Deep Web
-
- Introduction to deep web and hidden databases
- Tor and routing protocols and security features
- Access the Dark Web anonymously
- Navigate within the many layers of the Dark Web
- Dark Web search engines
- Dark Web covert operations
- Finding leaked information
Cryptocurrency
-
- Understand blockchain and transaction technologies
- Set up and run cryptocurrency accounts
- Build information about specific addresses
- Access raw data on blockchain ledgers
- Identify users of cryptocurrencies
- Extracting cryptocurrencies data from live and imaged computers
Dark Web Monitoring
-
- Actionable intelligence
- Detection of phishing kits
- Botnet depository identification
- Identification of compromised accounts
- Stolen financial data-credit cards, databases, healthcare records and login accounts
- Personal identifiable information
Maltego in Deep
-
- Managing and discovering transforms
- Build a case
- People, Names, Email Addresses, Aliases, Organizations information gathering
- Generate reports
Instructor: Ali Fazeli
The instructor has been involved in the information technology filed since his younger days. He later pursed his higher studies in the field of internet security and management from Curtin University, Australia. He is a highly interactive and innovative trainer, whose work in mainly based on research and applied knowledge from extensive experiences in Computer security and Data recovery. He has extensive experience in digital forensic investigation, Anti-forensic and cyber war.
During his 18 years career, he has assisted and trained numerous information technology security professional in Asia. He is accredited as a specialist in the successful investigation and prosecution of fraudsters and other scum from the dark and under world of internet. He is also the one of the most versatile IT security professional and expert, with skills ranging from advisory expert to guidance consultant.
Today, he spent a substantial amount of his time in advising and trains IT security professionals. He has also contributed extensively in helping numerous governments and private organizations to face the information technology risk and security.
For more information, please contact :
Phone: 0811-805434 Email: ask@heilandsolutions.com
Phone: Anton 0813-83326388 Email: antonsim@heilandsolutions.com