IP-based attribution prevention
Sock puppets and persona management with advanced anti-detection techniques
Browsers and advanced fingerprinting protection.
Comparmentalization systems.
Data and network level security.
Advanced evasion techniques.
Scrubbing your digital signature and OPSEC management tools.
This six-hour comprehensive course dives deep into the issues of propaganda and disinformation, which are increasingly pervasive in today's world. Analysts will gain insights into the history and evolution of these communication forms, the nuanced differences between them, and the role AI plays in amplifying their effects. Analysts will also learn practical techniques and methods to trace disinformation and propaganda back to their sources and analyze collected data. In addition, the course will equip analysts with knowledge needed to keep personal biases in check and expand their understanding of the information environment beyond just news articles and social media posts.
In this 90 minute training, we will cover front companies, how they use social media, the red flags to look for with front companies, how to tie some of these businesses back to countries like China, Russia, and Iran etc., and how to go from one front company to a much more extensive network of connected front companies. The training video will be delivered via email 24 hours after purchase.
Join our workshop focused on creating clear, concise, and impactful OSINT reports for your clients. This course will guide you through the essentials of translating complex intelligence into reports that make sense and drive action. Learn directly from seasoned intelligence professionals who will share invaluable insights and best practices. Key topics include: Crafting reports that effectively communicate findings and recommendations. Developing and utilizing templates to ensure consistency and clarity. Identifying and emphasizing the most critical information for your clients.
Reach out to us directly for full details on the Investigating the Dark Web course.
Learn the fundamentals of blockchain technology and its significance in the digital world.
Discover valuable open-source data sets that enable you to track and analyze cryptocurrency transactions.
Identify the cryptocurrencies commonly used by bad actors to fund their illicit activities.
Learn techniques to obfuscate your activities on the dark web, manage a persona, and enhance your investigations to uncover more bad actors.
Explore the various ways people scam with cryptocurrencies, NFTs, and other Web3 properties.
Learn to spot the warning signs of companies or websites potentially involved in fraudulent activities. Gain a deeper understanding of how scammers use LLMs like ChatGPT, Gemini, or other AI-generated content systems for fraudulent purposes.
Learn how to research SEC records, the USPTO and trademarks, property and land records, court cases, and business registries to identify fraud indicators. Research the dark web to understand how stolen identities and illicit goods are sold.
Learn how to identify phishing scams and the tactics, techniques, and procedures (TTPs) bad actors use in these cases. Learn how to insulate yourself against fraud with better operational security (OPSEC) practices.
Understand how to verify identities and conduct due diligence to prevent fraud. Investigate online dating frauds and identify scam patterns.
We discuss OSINT, operational security, and virtual machines. This Module is the foundation you need to start your OSINT journey.
This Module focuses on social media research on Facebook, LinkedIn, Twitter, YouTube, and Instagram. You will learn how to use each platform, some intermediate tricks and tips to pull unique data, and how to analyze profiles and social media activity.
In this Module, we will go over Google Dorking. You will learn how to pull unique information from multiple different search engines. We will discuss gathering documents from websites with specific queries, cached data, and more.
This Module focuses on geolocation and reverse image searching. In this Module, you will learn the basics of geolocation and how to use mapping platforms to enhance your OSINT analysis and investigations.
This Module focuses on news media and OSINT. We will go over how to pull unique data from news sources and find information that is a little harder to access.
In this Module, you will learn how to analyze a domain for information and why it matters for your OSINT research and investigations.
In this Module, you will discover how to utilize PAI resources to support your OSINT research/investigations.
In this Module, we will go over how to research a business online, its founders, and its executive team.
This Module will briefly cover illicit activity online and crime. We will discuss using OSINT to find more information on the data points we discover during our research.
This Module will go over critical thinking and report writing and how to create a report and assessment that a client would understand and feel informed by.
We focus on identifying illicit activity on social media. This Module includes everything from trafficking controlled substances to supply chain risks, fraud, import bans, potential sanctions violations, and the Tactics, Techniques, and Procedures (TTPs) used by bad actors and criminals on social media. Further details on this Module are only available in the full course syllabus for enrolled students.
This Module focuses on identifying the people behind online aliases involved in threats, disinformation, or harassment. We will leverage PAI, tools, and methodology to identify social media profiles behind aliases.
In this Module, we will review PAI sources such as data brokers, lawsuits, county records, patents, and more. We will explain how to use these resources to build a more complete picture of a person of interest, group, or entity.
This Module focuses on geolocation and reverse image searching. In this Module, you will learn to geolocate people in obscure locations and use several different mapping tools. Further, you will learn how to create a map using these tools. In addition, you will learn how to perform an effective research image search on a person to identify where they are. This Module will also include less-known tools and an intricate, non-technical methodology to break down a location.
In this Module, we will cover front organizations/companies. Front organizations use nonprofits to hide their illicit activities. We will look at multiple use cases for this Module, including national security concerns and threats. You will learn the patterns of behavior of front organizations and how to better identify and monitor them. Further details on this Module are only available in the full course syllabus for enrolled students.
With this Module, we will cover disinformation, the patterns that bad actors use to push it, and how to identify a disinformation network. Further details on this Module are only available in the full course syllabus for enrolled students.
This Module will discuss how to analyze domains and websites for red flags. Red flags include hosting companies with ties to countries with hostile intent, signs of fraud for a website, security of a website and why it matters, and techniques/tactics we can use to get more information about a specific domain. Further details on this Module are only available in the full course syllabus for enrolled students.
This Module focuses on due diligence for businesses in the U.S., outside the United States, and with offshore interests. You will learn methods/techniques to research foreign businesses. You will learn how to thoroughly deep-dive into a company and identify risk factors for a business. We will go through several databases and websites to obtain information on a business and methodology to unearth unique data. Further details on this Module are only available in the full course syllabus for enrolled students.
This course's first module focuses on use cases of nation-states influencing countries outside of their borders. Further details on this Module are only available in the full course syllabus for enrolled students.
This Module focuses on countries with large economies and how they exert their influence abroad. Further details on this module are only available in the full course syllabus for enrolled students.
In this Module, we will use OSINT to find political influence from nation-states. Further details on this module are only available in the full course syllabus for enrolled students.
This Module focuses on using OSINT to identify economic influence from nation-states beyond their borders. Further details on this module are only available in the full course syllabus for enrolled students.
In this Module, we will cover using OSINT to identify technological influence from nation-states. Further details on this module are only available in the full course syllabus for enrolled students.
With this Module, we will cover OSINT, nation-states and foreign nationals. Further details on this module are only available in the full course syllabus for enrolled students.
This Module will discuss using OSINT to connect people and businesses to nation-states. Further details in this module are only available in the full course syllabus for enrolled students.
This Module covers how nation-states try to influence key events and conflicts. Further course details for this module are only available in the full course syllabus.
With the Practitioner Membership, you can attend any of these three OSINT classes throughout the year on the scheduled dates. Each course is updated every four months to ensure you receive the most current and relevant training.
The Advantage Membership offers additional courses such as Global Intelligence Discovery, a Dark Web class, a Cryptocurrency class, and Advanced OPSEC training. In addition, you can attend quarterly webinars with subject matter experts, which will be recorded and sent to you if you can't make it. The bimonthly OSINT Tip Sheet will provide you with five unique OSINT tips every two weeks. Training is accessible on the scheduled dates.
The Executive Access Membership is our premier training package. In addition to the Advantage Membership courses, you will gain access to specialized Report Writing and Fraud courses, enhancing your capabilities in these critical areas. Furthermore, enjoy a one-hour customized course on a topic of your choice within our expertise, prerecorded and delivered directly to your inbox. This membership ensures access to the highest level of expertise we have at Unchartered. Training is accessible on the scheduled dates.