On This Page

Advanced Open Source Intelligence (OSINT) Techniques

Michael Bazzell | August 1-2 & 3-4



Overview

This interactive training identifies and demonstrates over 100 free online resources that can aid anyone searching the internet with breaking through the traditional roadblocks. Participants will be shown how to "dig" into the internet for personal information about any target. While popular sites such as Twitter, Instagram, and Facebook are covered in detail (including techniques that legally access some "hidden" content), the presentation goes much deeper into the vast resources available online for researching personal information. Additionally, instructions for new real-time monitoring will be presented in great detail. Aside from web sites, other technologies such as document meta-data, reverse cellular caller ID, and Application Programming Interfaces (APIs) will be explained. These sources can also be used to conduct thorough background checks on potential employees or locate client vulnerabilities. All resources can be applied to domestic and international investigations. Many custom tools will be shared with the audience for free lifetime use.

Among many other techniques, the attendees will learn how to conduct the following queries:
  • Conduct advanced search queries on dozens of search engines
  • Identify users of private cellular telephone numbers
  • Access restricted information through cached results
  • Monitor live content and communication on all social networks
  • Conduct thorough searches of all social networks
  • Access content believed to be private on social networks
  • Locate a target's long forgotten Facebook activity
  • Search Geo Location data within Twitter, Flickr, and Instagram streams
  • Reverse search photographs for additional copies and details
  • Search historical deleted versions of websites
  • Locate documents related to target subject
  • Search online forums for communication
  • View multiple satellite imagery and street views of any location
  • Identify cropped and manipulated photographs
  • Retrieve Caller ID information from any landline or cellular telephone number
  • Identify all social networks in use by target username

The software session will demonstrate over 40 free software tools that will aid an internet searcher during any type of investigation. A custom portable web browser will be given to each participant that includes configured plugins that add new search features. These include reverse image location, automatic media download, instant screen capture, proxies, and many more. Additionally, the browser is configured to block website analytics that can divulge sensitive information about the searcher. Other software includes tools that clone websites, locate twitter data, recover deleted files, display historical versions of satellite mapping data, change an IP address, extract still images from videos, Track GPS devices, locate additional social networks, and identify metadata within online documents. Attendees will have full access to the entire collection of software demonstrated during the session.

The audience will also be shown how to use advanced technologies to assist with any type of research. Topics include identifying compromised email addresses, "spoofing" caller ID and email addresses, anonymous forwarding email addresses, anonymous forwarding phone numbers, identifying shortened links, monitoring online digital radio frequencies, locating stolen data phones, identifying rental vehicle information, discovering anyone's IP address, and more. All procedures will be explained from start to finish and links will be available to all participants.

Who Should Take this Course

  • Online Investigators
  • Penetration Testers
  • Risk Management Professionals
  • Military Personnel
  • Spooks

Student Requirements

A very basic understanding of internet searches and the presence of social networks.

What Students Should Bring

Nothing is required. Students are allowed to bring computer devices, but this is not mandatory for the course.

What Students Will Be Provided With

  • Complete updated list of all OSINT links
  • Custom online search tool that automates many search processes
  • Pre-configured portable browser with investigation extensions
  • Software pack of 42 custom applications that aid in online investigation
  • Custom API search utilities that provide extended data about targets
  • Over 25 unconventional online resources for digital investigations
  • All current powerpoints for all training sessions

Trainers

Michael Bazzell spent 18 years as a law enforcement officer with a rank of Detective. During the majority of that time, he was assigned to the FBI's Cyber Crimes Task Force where he focused on "Hackers" and various computer crime investigations. As an active investigator for multiple organizations, he has been involved in numerous high-tech criminal investigations including online child solicitation, child abduction, kidnapping, cold-case homicide, terrorist threats, and high level computer intrusions. He has trained thousands of individuals employed by state and federal agencies, as well as the private sector, in the use of his investigative techniques. He has also taught several college courses including Ethical Hacking, Computer Forensics, and Computer Crime Investigation. His previous books, "Open Source Intelligence Techniques" and "Hiding from the Internet", have been top sellers in both the United States and Europe. They are used by several government agencies as training manuals for intelligence gathering and securing personal information.