Jane’s OSINT Methods & Techniques Training - Nov 7-9th

alt text

Tuesday, Nov 07, 2017

    • Day 1: Planning and Collection
    • 9:30 amWelcome and Introduction
      • An Introduction to the course tutor and explanation of the course program. The tutor will begin by discussing the Intelligence Cycle and how it applies specifically to OSINT and to the workshop modules. This opening session gives participants an understanding of how the methods and techniques they learn on the course fit within the overall process of producing open source intelligence
    • 10:00 amBLOCK ONE - Planning
      • Requirement Analysis: This module teaches attendees to systematically analyze the question or information problem at hand before launching into information collection. The tutor will describe a detailed process of analyzing and breaking down requirements into a series of sub-questions, while identifying components or searchable concepts that help analysts translate the requirement into a collection plan. The result will be a series of answerable questions and a clear understanding of when to stop searching. The participants will take away from this session a practical checklist that can be applied to their daily work to identify the components of problem deconstruction
      • Collection Planning: This session will involve a discussion and presentation on a systematic approach to collecting information using a collection plan. By applying a structured plan to searching for information an analyst can ensure that they have considered a comprehensive range of information sources. Navigating the huge quantity and variety of available open source information in search of the most relevant and reliable information, within typical time constraints is a key OSINT skill. A collection plan acts as a map to ensure that OSINT practitioners remain on course to answer the questions posed in their requirements. Participants will have an opportunity in this session to practice systematically planning an information search, building on the scenario used in the first session on requirement analysis
      • Online Security: Carrying out research on the Internet is subject to many potential security threats that can be mitigated by better understanding of the risks and application of basic security measures. In this session, the tutors will discuss potential pitfalls and vulnerabilities and the basic precautions that should be applied when conducting online research. Trainees will be introduced to a series of simple approaches to minimising their online footprint and online shadow, and the ability of web administrators or hostile actors to gather information on their activities. This will include some simple, good-practice guidance on browser optimisation and tips on how to move between social media platforms and web sites whilst minimising the risk of compromise
    • 12:30 pmLunch Break
    • 1:30 pmBLOCK TWO - Collection
      • Information search: In this session, attendees will be urged to change their existing habits and mindsets and to adopt a more systematic way of searching for information and recording their search results. Maintaining a ‘search trail’ can give researchers and analysts much better results by changing queries to narrow or broaden search results to achieve a balance of relevance and breadth. This session will focus on getting the most out of the search tools used most regularly for information discovery and will also address a few additional tools that may prove beneficial for OSINT researchers and analysts to incorporate in their information collection workflows
      • Verifying OSINF: Open source information has increased exponentially in quantity in recent years, but a large part of that is information that is of poor quality, either duplicating content already published online or presenting unreliable information as fact. The aim of this session is to provide attendees with a solid understanding of how information sources are structured and presented, and how and why the motivations, affiliations (political and economic) and operating environments of these outlets can and will affect the reliability of reporting on certain issues. This session will include exercises on verifying information about current events from multiple sources, comparing the content, and assessing the reliability of the sources and their content. The trainer will also present a simple checklist that can be used to systematically record and analyse sources

Wednesday, Nov 08, 2017

    • Day 2: Analysis and Production
    • 9:30 amBLOCK ONE - Analysis
      • Social Media Search: This module provides trainees with the basic knowledge and skills necessary to conduct safe and efficient searches for content on popular social media platforms such as Twitter, Facebook and YouTube. Using a practical exercises, trainees will explore how to search these platforms and exploit the publicly available information on them for situational awareness or investigative purposes
      • OSINF Monitoring: An important part of information collection is routine monitoring of familiar thematic or regional topics. There are several tools and techniques that can be used to facilitate online information collection, particularly in relation to news articles. In this session, the tutor will demonstrate several of the most useful tools and discuss additional solutions to media monitoring, including accessing reputable content curators
      • Challenges in intelligence analysis: Turning open source information into intelligence requires the application of analysis to connect disparate pieces of information, to assess the logical strength of the connections, to derive meaning, and to form conclusions. The process of analysis is something analysts perform intuitively, but as with any skill, there are methods and techniques we can learn that will improve how we analyse the information we collect. The better our analysis, the more useful the end product we provide to our customers. In this session, the trainer will discuss the analysis process and provide the trainees with simple frameworks to aid their formation of intelligence
    • 12:30 pmLunch
    • 1:30 pmBLOCK TWO – Analysis and Production
      • Structured thinking: This module will provide a brief overview of several types of Structured Analysis techniques and examine how these techniques can be used to diagnose environments; question assumptions; expand the range of alternatives being considered; and ultimately ensure that the conclusions that are presented in intelligence products have been rigorously examined and tested. This module will focus on the practice of using structured analysis techniques to help analysts understand and break down complex problems and to make sense of the large quantities of information they may have collected
      • Preparing and Presenting Intelligence Findings: Presenting intelligence successfully involves understanding how analysis is received by our customers. This can guide us in how best to construct the presentation of intelligence and, in particular, how to cope with the inevitable ambiguities in OSINT product. In this session, participants will be briefed on issues that need to be considered when presenting open source intelligence products

Thursday, Nov 09, 2017

    • Day 3: Capstone Exercise
    • 9:30 amBLOCK ONE – Exercise: Practical Application
      • Exercise: Practical Application: This live, instructor-led, exercise provides the participants with an opportunity to apply the structured OSINT methods taught in the workshop to a practical example, where they are tasked to create an intelligence report and / or briefing. The exercise will add a level of complexity to the practical sessions used on Day 1 and Day 2 and will enable the participants to test the techniques covered in the workshop
      • Wrap-up and Review: The final session will provide the participants with a summary of the main points taught on the course, along with the concluding remarks of the course tutor
    • 12:30 pmWorkshop Ends
Filter Sort