The Lost Art of Open Source Intelligence - Strategies and Techniques Training

i3 BIS delivers a comprehensive education and training of the latest open source intelligence techniques and methods to clients.  The courses are a combination of theory and experiential learning methods that provide students with opportunities to develop multiple skill sets. This should allow individuals to make immediate contributions to their organizations upon their return from the course.

Open Source Intelligence Course Scope

  • Learn the power of combining open sources with the Intelligence Cycle
  • Analyze intelligence direction to frame the Intelligence Question
  • Explore multiple sources of information
  • Become a more efficient researcher in collection and processing information
  • Learn how to effectively conduct content analysis on open sources
  • Learn to conduct safer internet searches
  • Understand the threats/risks and countermeasures for your research tools
  • Google Hacking to maximize your search results
  • Understand the roles of perception, mindsets, biases and fallacies in research and analysis
  • Take information and process it into intelligence to gain insight
  • Capstone exercises
  • Learn and apply i3 Steps of Research Techniques

Getting to Know You: Social Media Intelligence Training

This program is a thorough introduction and exploration of Social Media as an intelligence resource. Searching through social networks and websites has become a high priority for intelligence gathering and investigations, as these mediums store massive amounts of personal information.

  • Participants will identify and differentiate between many forms of social media, to determine the types of information available.
  • Learn how to exploit networks for information
  • Identify the sites security measures
  • Identify and apply custom search engines used for researching network traffic
  • Consider the data available through information retrieval
  • Identify and extract information from Facebook accounts, Twitter, Google+, LinkedIn, etc.
  • Examine text analytics and statistics
  • Evaluate information visualization and social engagement

As part of the intelligence process, we learn to identify a target of interest, collecting and integrating various sources of information to develop a profile.

  • Identify and apply custom search engines used for researching network traffic
  • Collect and assess information relative to search requirements
  • Apply techniques to exact targeted information from social network profiles.