Autoplay
Autocomplete
Previous Lesson
Complete and Continue
OSINT Tradecraft
Welcome and the Basics of OSINT
Introduction to me and the course (2:48)
Course Guide
Foundations of OSINT (7:51)
Internet Intelligence & Investigation (III) (12:04)
Investigative Process Flowcharts (5:00)
Types of OSINT Workflows (13:19)
Open-Source Policy (16:12)
Generating and Handling Open-Source Intelligence
Documentation: Preserving Publicly Available Information in Court Admissible Reports (10:28)
Developing an Open-Source Intelligence Collection Plan (39:52)
Selecting the Right Intelligence Product (7:59)
Techniques for Collecting Information (16:24)
Grading, Storage, Sharing, and Disclosing OSINT and Evidence (23:54)
Drafting a Witness Statement for OSINT (9:50)
Case Note Taking (6:05)
Legal and Ethical Guidance (UK Legistlation)
Introduction to Legal and Ethical Guidance (3:59)
Introduction to Legistlation (2:04)
Human Rights Act 1998 / European Convention on Human Rights (4:32)
Regulation of Investigatory Powers Act 2000 (10:05)
Police Act 1997 (2:25)
Computer Misuse Act 1990 (2:40)
Data Protection Act 1998 (3:31)
Government Data Protection Regulation 2018 (2:04)
Covert Surveillance and Property Interference Code of Practice (1:30)
Appropriate Activity Guidance
NPCC Investigative Levels (8:30)
False Personas (14:59)
Technical Requirements (1:32)
Intelligence Collection and Activity Recording (1:30)
Ethical Considerations (1:03)
Your Set-Up
Your Set-Up Handout
Your Hardware (5:55)
VPN's (3:40)
Virtual Machines (3:25)
Virtual Machines - Installing a Hypervisor (4:32)
Virtual Machines - Installing the Trace Labs VM (11:27)
Browsers for OSINT/ III (4:35)
Setting up your browser for optimal security (3:06)
Activity Recording (6:39)
OPSEC: Maintaining Security and Protecting Privacy during OSINT Investigations
Managing Covert Accounts (34:19)
People and Business OSINT Investigations
Key OSINT Sources for People and Business Investigations (10:28)
Email Address and Phone Number OSINT Tools (17:42)
OSINT Techniques for Investigating Businesses (38:12)
Developing Subject Profiles (10:46)
Developing Business Profiles (5:02)
Situational Awareness (Geospatial OSINT Investigations)
Geospatial Tools (36:26)
Mapping Options (2:26)
OSINT Tools
OSINT Tools Handout
A quick briefing on OSINT tools (1:56)
eMail tools (4:54)
Messaging App Security (2:56)
Data Breaches and Passwords (2:24)
Caches (2:20)
Web Domains (8:45)
Image-Based OSINT Investigations
Photos and Maps Handout
Reverse Image Searching (5:00)
AI Image and Facial Recognition (13:32)
Metadata (1:28)
Asset Tracing with OSINT
Introduction to Asset Tracing (2:13)
OSINT Techniques for Vehicles (US and UK) (33:39)
OSINT Techniques for Land and Property (Houses and Apartments) (US and UK) (23:14)
NFT OSINT Investigations (8:03)
OSINT Techniques for Owned Businesses and Professional Licenses (US and UK) (8:29)
OSINT Techniques for Planes, Drones, and Ham Radio Licences (US) (4:14)
Advanced Searching
Advanced Searching Handout
Advanced Search Operators (5:05)
Searching by date posted on Google (3:06)
Online Marketplaces (7:16)
OSINT Techniques for Social Media
Social Media Handout
Facebook - Creating an Account (3:25)
Facebook - Finding a User ID (6:43)
Facebook - Searching by email address (3:21)
Facebook - Finding Mutual Friends (3:04)
Facebook - Groups (8:20)
Facebook - Marketplace (11:29)
Facebook - Searching on a Profile (3:26)
Twitter (5:09)
LinkedIn - Searching by email address (7:00)
LinkedIn - Searching by current and previous employers (1:56)
LinkedIn - Identifying the name of an anonymous "LinkedIn Member" account (1:10)
LinkedIn - Searching without an account (1:51)
LinkedIn - Recent Activity (3:41)
Instagram - Downloading a full-size Profile Picture (4:05)
Instagram - Searching by date posted (5:06)
TikTok (4:14)
Snapchat - Maps and Downloading Stories (3:27)
Activity Tracking Apps (2:34)
Honeypots
Honeypots Handout
Canary Tokens and the alternatives (3:57)
Housekeeping
Certification (2:13)
Cancelling an Annual Subscription (1:34)
Course Feedback
Teach online with
Setting up your browser for optimal security
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock