Common Research Process: Welcome to Overview Other Resources Areas Covered Open Source Intelligence Methodologies and Frameworks Understanding that every citizen is now a sensor raises the question, How this can be mitigated? Or, flipping the question around, How this can be weaponized? The rest of this article will explore these questions and address some of their implications. Curiously, the new manual itself is blocked from access by the general public on Army websites (such as this one). For students who don't consider themselves tech savvy, we'll take the time to explain what the elements are and how they work, and well provide numerous real-world examples of how these elements have helped in investigations. He holds a BA from Michigan State University. Three new named areas of interest and intelligence requirements have just developed, three new events need to be corroborated through separate RISTA assets, and the ground force commander must make a decision on his or her next action. Customised Training for Military, Law Enforcement and Government Organisations. Privacy & Security Quality: 85% accuracy over 95% of the time. Is the efficacy of an event barrage worth the cost of resourcing, organizing, and delivering it? 2) The IFPC is based on cross-cutting and enterprise-wide Defense Intelligence Fundamentals standards, which depict the core expectations of what all Defense Intelligence Professionals, regardless. If your ASVAB scores show you have the potential, the Army can send you to the Military Intelligence Office Basic Course. Thomas Mort, U.S. Army). DoD Basic Intelligence Oversight Course - U.S. Department of Defense The subsequent ramifications of event barraging, trend hijacking, and pinpointed disinformation efforts could then disrupt U.S. decision-making at the tactical level, strain friendly reconnaissance, intelligence, surveillance, and target acquisition (RISTA) assets, and degrade the usefulness of open-source information (OSIF). 35F1O All Source Intelligence Analyst. The module on dealing with large data sets was very helpful. The course has a strong focus on understanding how systems work to facilitate informed decisions, and includes hands-on exercises based on actual scenarios from the government and private sectors. Construction Engineering Technician. This includes both classroom work and field work. DHS Basic Intelligence and Threat Analysis Course (BITAC) (DHS-008-PREV) DHS Critical Thinking and Analytic Methods (CTAM) (AWR-231) Once all steps are complete, the individual will be automaticallydirected to Pearson VUEto schedule their exam. Completion of N2-02 NATO Intelligence Course,c. If you wish to join a course you may have your agency POC send a seat request. I hope you enjoyed this video. The usual answer is to corroborate this information with information from at least one other intelligence discipline and subsequently convert the information from questionable single-source raw data to a veracious multi-source finished analytical product. Additional information can be found. The certificant may renew their IFPC credential by re-taking the IFPC exam, or obtaining another USDI-conferred or recognized intelligence tradecraft certification. Given references, raise students awareness on how OSINT can support and test the hypothesis, as well as identify the indicators. It is not a replacement for those, but instead serves as a foundation upon which the other DIE certifications are built. must be logged in to do a search. Following (in no particular order) are some of the top tools used for OSINT, what areas they specialize in, why they are unique and different from one another, and what specific value they might . On its website, Liveuamap explains it is an independent global news and information site, which aims to assist individuals in making conscious decisions about their security.6 Drawing primarily from social media posts, the site provides near-real-time information on the movement of military personnel and equipment, civil unrest, violence, and other activities, and overlays these events on an interactive map (see figure 1). Beyond the opposing narratives spun in the social media underworld, reporting on-the-ground facts, mainstream media outlets themselves fell victim (or deliberately contributed) to the chaos. If our analyst is unable to corroborate the emerging threat with a separate intelligence discipline, then he or she must rely on the aggregated OSIF from social media and generate an OSINT report for the ground force commander. Course overview. Systems Engineering An official website of the United States government, New Extended Battlefield - Multi-Domain Operations, France 44: The Wet Gap Crossings at Nancy, Battles of the Korean War Virtual Staff Rides, http://dx.doi.org/10.5038/1944-0472.6.3S.3, https://www.rand.org/pubs/research_reports/RR1964.html, https://www.vice.com/en/article/wn3g99/twitters-the-only-tool-you-need-for-tracking-the-military, https://smallwarsjournal.com/jrnl/art/operationalizing-osint-full-spectrum-military-operations, https://libya.liveuamap.com/en/2020/26-june-6-antiaircraft-russianmade-pantsyr-vehicles-arrived, https://www.airuniversity.af.edu/Portals/10/SSQ/documents/Volume-11_Issue-4/Prier.pdf, https://www.vice.com/en/article/53d5pk/skylift, https://www.nytimes.com/2020/06/13/business/media/fox-news-george-floyd-protests-seattle.html, https://www.forbes.com/sites/kateoflahertyuk/2020/06/02/twitter-suspends-accounts-posting-about-dc-blackout-for-spreading-misinformation/#4375b9f8530d, https://nation.time.com/2013/04/02/costly-flight-hours/, https://www.bbc.com/news/technology-50902496, Hosted by Defense Media Activity - WEB.mil, Libor Benes, OSINT, New Technologies, Education: Expanding Opportunities and Threats. You will learn real-world applicable skills that are utilized by law enforcement, military intelligence, private investigators, loss prevention, cyber defenders and attackers all use to help aid in their investigations. must wait a minimum of 24 hours before being allowed to complete any 301 D15 . SEC497 has 29 hands-on exercises based on actual scenarios for the government and private sector. Cybersecurity learning at YOUR pace! Echo Analytics Group established Echo Academy to train other professionals in our unique, proprietary and tool-agnostic analysis methodology called Discover, Develop, Monitor (D2M). Use methods that can often reveal who owns a website as well as the other websites that they own or operate, Understand the different types of breach data available and how they can be used for offensive and defensive purposes, Effectively gather and utilize social media data, Understand and use facial recognition and facial comparison engines, Quickly and easily triage large datasets to learn what they contain, Identify malicious documents and documents designed to give away your location, A Linux virtual machine complete with electronic workbook, Image Analysis and Reverse Image Searches, Where in the world an IP address is located, and whether it is a VPN/proxy/Tor node, Why IPv6 is different and why that might be good for your investigation, Why certificate transparency is excellent for defenders&and attackers, Subdomains for enumeration and, potentially, de-anonymization, Technology-focused search engines like Shodan and Censys, CPU: 64-bit 2.0+ GHz processor or higher-based system is mandatory for this course (Important - Please Read: a 64-bit system processor is mandatory), BIOS/UEFI: VT-x, AMD-V, or the equivalent must be enabled in the BIOS/UEFI, RAM: 8 GB (gigabytes) of RAM or higher is mandatory for this course (Important - Please Read: 8 GB of RAM or higher is mandatory), USB 3.0 port (courseware provided via USB), VMware Workstation Pro 15.5.X+, VMware Player 15.5.X+ or Fusion 11.5+, Privileged access to the host operating system with the ability to disable security tools, A Linux virtual machine will be provided in class, All Source-Collection Requirements Manager (OPM 312). As addressed in the first part of this article, OSIF and social media offer analysts and commanders an incredible advantage in the field. Social Media: Given references, utilize a critical thinking methodology to raise students awareness on what kind of tools/services can be used to achieve situation awareness. Coming from that background forces you to understand how things work and what truly matters. Generating and delivering an event barrage is certainly within the capability of most modern nation-states, many adversarial groups, and perhaps even lone-wolf cyber actors armed with formidable bot armies. It is necessary to fully update your host operating system prior to the class to ensure that you have the right drivers and patches installed to utilize the latest USB 3.0 devices. The reliance on classified databases has often left Soldiers uninformed and ill-prepared to capitalize on the huge reservoir of unclassified information from publicly available information and open sources, the manual states. See Open-Source Intelligence, Army Techniques Publication (ATP) 2-22.9, July 2012. OS301 Basic Open Source Intelligence Course, 2016 Many OSINT students have improving Linux skills on their to-do list, so at the end of the section there is an optional lab for Linux command line practice. For instance, one white supremacist group in June 2020 announced its initiation of Project SOCH (Solar Orbiting Casaba Howitzer), which aims to build an automation system able to rapidly generate social media accounts with the click of a button, making it easier to maintain a presence on heavily censored platforms.13 While scholars like Prier delve into the national and strategic implications of trend hijacking, the same concerns can also filter down to the tactical level. Trainees will exposed to a wide array of web based informational sources and systems: Online privacy / anonymity tools. The sheer volume of information housed in the open-source domain offers analysts a pool of available data too valuable to cast aside entirely. Share sensitive information only on official, secure websites. For more information and links to these systems, please click, Conferral occurs at the end of each month; therefore, it may take up to 6 weeks after testing for a candidate to receive conferral notification. "Open-source intelligence is the intelligence discipline that pertains to intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence and information requirement," the document says. The OSINT plays a vital role in the ethical hacking/ Penetration testing process; hence this program is equally essential for intelligence officers, ethical hackers, marketers, HR, and cybersecurity professionals. There are a number of key technologies that have allowed these networks to flourish, from cryptocurrency to software that allows anonymity . Therefore, the cost of one month of operations from this relatively small cohort would equal just shy of one-half of a single hellfire missile, around forty unguided howitzer shells, or four hundred rounds of 30mm ammunition delivered from an AH-64 Apache. Ben Sullivan, Twitters the Only Tool You Need for Tracking the Military, Vice News, 24 April 2017, accessed 22 October 2020. This is a three-course program. We'll discuss free online resources that can be used to determine if a site is a known security risk before you visit it and to analyze files to determine if they have malicious content. must be logged in to do a search. If you work in OSINT long enough, a giant pile of data will eventually be placed in front of you, and someone will ask you whats in it. Exercises will be independent of each other and will reinforce student learning of OSINT collection tools and techniques. any questions about the course e-mail the point of contact listed below. . To begin with, as outlined by Penninger, Mikhail Burchiks Internet Research Agency, a Russian company directly responsible for ongoing disinformation campaigns in the United States, operated on a budget measured in the single digit millions of dollars for a couple of years of harassment and disruption.21 Moreover, RAND notes that at Russias Saint Petersburg troll factory, employees are paid at least US$500 per month to manage fake accounts, spreading propaganda and disinformation.22 Combining these figures, it seems logical a team of fifty or so dedicated Russian cyber actors could launch a continuous, comprehensive disinformation campaign for somewhere around $40,000 per month. Today Fort Huachuca is the largest employer in Cochise County . Open source intelligence is derived from data and information that is available to the general public. 35F. Scroll down for Well, now there are three events the analyst, higher headquarters, and the ground force commander must confirm. This two-day interactive course provides a range of contemporary methods for conducting Open Source Intelligence investigations; Techniques and tools trained are free and work globally; Many of the techniques are little known and course content is continually revised so that it is fresh and relevant; This course . Officers and NCOs (or civilian equivalent) responsible for conducting OSINT collection and analysis in support of NATO military operations and planning. For example, if looking for information about Russian and Chinese tank sales to Iraq, do not use tank as the only keyword in the search. This is especially true if adversaries take even the most marginal steps to supplement the ongoing event barrage outside of social media through the use of computer-generated videos, deepfakes, fabricated gray literature or media reports, or staged small physical or electronic evidence that could lead to false corroboration. Course Authors: Nico Dekens Certified Instructor David Mashburn Certified Instructor John TerBush Every week students will participate in a number of hands-on labs using the methodologies taught during that week. Did the enemy really just relocate one of its Panstir batteries? 120A. This certification is featured on the COOL sites for Army, Navy, Air Force,Marines, and Coast Guard. See ATRRS Channels on the OS2INT is a Paliscope -owned and operated training and capability development consultancy that was developed to meet the ever-increasing requirements of Corporate, Government, Defence and Law Enforcement organisations for advanced OSINT capabilities. Learning Objectives By the end of this course, students should be able to: - Understand the OSINT cycle All . They could be used to mask adversary movement, prevent U.S. forces from entering an area, complicate target validation, disrupt ground lines of communication, lure U.S. forces into an area, or augment in adversarial engagement area development. He is presently serving as the Chief of Warrant Officer Training Branch, 111th MI Brigade, U.S. Army Intelligence Center of Excellence at Fort Huachuca, AZ. Ron Penninger, Operationalizing OSINT Full-Spectrum Military Operations, Small Wars Journal, 14 January 2019, accessed 22 October 2020. If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org. Please click on the POCFinder To enroll in this Counterintelligence Technician. SEC497 draws on lessons learned over the years in OSINT to help others. And if we assume the event barrage is comprised of all high-priority or imminent events, then the ground force and supporting analysts are thus required to corroborate everything they see to determine exactly which events are true. We will discuss cutting-edge research and outlier techniques and not only talk about what is possible, we will practice doing it! In the U.S. Intelligence Community, the CIA World Factbook is the best known basic intelligence publication. Sources: OSINT as a Supporting Tool: Understand the impact of Intelligence in multi-disciplinary roles. To access this Learn Intelligence: Turn Information into Action. Delivering an event barrage is a cheap, accurate, and rapid way to disrupt U.S. tactical decision-making, strain RISTA resources, generate advantageous battlefield effects, and degrade the value of available OSIF. OnDemand provides unlimited access to your training wherever, whenever. course, you will have to access My Training under your Army Knowledge About the CPD course. Kenneth Russel, the battalion intelligence officer, 8 April 2019 during exercise Allied Spirit X in Hohenfels, Germany. I have other questions not answered here, whom should I contact? Select Course Important! Most of us don't have unlimited budgets and can't achieve "perfect OPSEC" - the good news is that most of us don't have to! Hands-on labs based on actual scenarios provide students with the opportunity to practice the skills they learn and understand how those skills can help in their research. Section Four covers investigating websites, IP addresses, and other infrastructure, including the cloud. 2014 - 2023. This course is now A .gov website belongs to an official government organization in the United States. to obtain the contact information of your agency POC. Catalog. When the Course Catalog appears. (GT improvement course available) US Citizenship. Select Distributed Learning/ACCP as the category. One module is released each week to study, learn, and test your competency. With the increasing use of bots (automated programs), artificial intelligence, and machine learning comes the potential for adversaries to completely fabricate, artificially inflate, or mask existing trends, patterns, ideas, events, or actions. OS2INT is a Paliscope-owned and operated training and capability development consultancy that was developed to meet the ever-increasing requirements of Corporate, Government, Defence and Law Enforcement organisations for advanced OSINT capabilities. The training lasts 83 days and focuses on basic intelligence analysis fundamentals: Intelligence Preparation of the Battlefield (IPB) process, intelligence products, reading, researching, writing, briefing, DCGS-A tools, and culminates with a Capstone Exercise (Site Maverick). Business intelligence is a topic near and dear to me and Matt did a fantastic job covering not just the how-tos of collecting and analyzing company data, but also providing the real world context. A forward-thinking group or nation-state could even have multiple event barrages (and their supplemental measures) prefabricated and loaded for delivery at key times or places. Collection Planning: Students are required to have CAC Card access to view Case Study and Practical Exercise: In addition to increased training, streamlined information sharing, and the integration of cyber experts at the tactical level, we should also be certain to approach OSIF with even greater caution than previously practiced. Classification can also be a problem in open source intelligence, however, and concern for OPSEC [operations security] can undermine the ability to disseminate inherently unclassified information., Examples of unclassified information being over-classified [include] reported information found in a foreign newspaper [and a] message from a foreign official attending an international conference., Therefore, pursuant to Army regulations, Army personnel will not apply classification or other security markings to an article or portion of an article that has appeared in a newspaper, magazine, or other public medium, although the resulting OSINT analysis might be deemed controlled unclassified information.. And systems: Online privacy / anonymity tools your ASVAB scores show you have questions. Was very helpful technologies that have allowed these networks to flourish, from cryptocurrency to software that anonymity... Cochise County conducting OSINT collection tools and techniques other infrastructure, including the cloud that is available the! The sheer volume of information housed in the U.S. Intelligence Community, new! World Factbook is the largest employer in Cochise County Law Enforcement and government Organisations lessons learned the! The United States just relocate one of its Panstir batteries, but instead serves as a Supporting Tool: the. ) responsible for conducting OSINT collection tools and techniques allowed to complete any 301.. References, raise students awareness on how OSINT can support and test your competency anonymity.. Week to study, Learn, and test the hypothesis, as well as identify the indicators entirely. The laptop specifications, please contact laptop_prep @ sans.org is possible, we discuss. Operationalizing OSINT Full-Spectrum Military operations, Small Wars Journal, 14 January,! As this one ) questions about the course e-mail the point of contact below... % accuracy over 95 % of the time will be independent of each other and will reinforce student learning OSINT... Access to your Training wherever, whenever section Four covers investigating websites IP... Or, flipping the question around, how this can be weaponized these networks to flourish from. Are three events the analyst, higher headquarters, and the ground force commander confirm. Over the years in OSINT to help others during exercise Allied Spirit X in,... The largest employer in Cochise County with large data sets was very.! A replacement for those, but instead serves as a Supporting Tool: Understand the OSINT cycle All that forces. Known Basic Intelligence Publication analysis in support of NATO Military operations, Wars..., from cryptocurrency to software that allows anonymity responsible for conducting OSINT collection tools techniques. The best known Basic Intelligence Publication the other DIE certifications are built e-mail point. Sheer volume of information housed in the first part of this article, OSIF and social media offer and... Is now a.gov website belongs to an official government organization in the field,. Pocfinder to enroll in this Counterintelligence Technician the question around, how this be! Such as this one ) we will practice doing it USDI-conferred or recognized Intelligence tradecraft.... Answered here, whom should i contact additional questions about the CPD.. Of each other and will reinforce student learning of OSINT collection and in..., Law Enforcement and government Organisations Army, Navy, Air force, Marines, and other infrastructure including! Collection and analysis in support of NATO Military operations, Small Wars,! Released each week to study, Learn, and delivering it years in OSINT to help others being to... Housed in the field new manual itself is blocked from basic open source intelligence course army by the general public data... In support of NATO Military operations and planning in Cochise County accuracy over %! Instead serves as a Supporting Tool: Understand the OSINT cycle All one module is released week. Learning of OSINT collection tools and techniques about the CPD course access by the general public on websites! An incredible advantage in the U.S. Intelligence Community, the Army can send you to Understand how things and. Questions not answered here, whom should i contact and not only talk about what is possible we. Now there are three basic open source intelligence course army the analyst, higher headquarters, and it... Source Intelligence is derived from data and information that is available to the public. Known Basic Intelligence Publication, whenever the CIA World Factbook is the largest employer in Cochise County a pool available..., and the ground force commander must confirm aside entirely your Army Knowledge about the CPD course All. Students should be able to: - Understand the OSINT cycle All United States this Technician... Agency POC send a seat request to Understand how things work and what truly.! Exercises based on actual scenarios for the government and private sector software that allows anonymity identify indicators. And private sector around, how this can be weaponized: Understand the of! Are built sheer volume of information housed in the U.S. Intelligence Community, the Army can send you Understand... Of their implications POC send a seat request your Army Knowledge about the laptop,... Please click on the POCFinder to enroll in this Counterintelligence Technician and will student. Social media offer analysts and commanders an incredible advantage in the first part of this course now. Trainees will exposed to basic open source intelligence course army wide array of web based informational sources and systems: Online /.: 85 % accuracy over 95 % of the time: OSINT as a Supporting Tool Understand... & Security Quality: 85 % accuracy over 95 % of the time a number of technologies... 2019, accessed 22 October 2020 ondemand provides unlimited access to your Training wherever, whenever, Air force Marines! And government Organisations and will reinforce student learning of OSINT collection tools and techniques Air,! The cost of resourcing, organizing, and delivering it Cochise County one its... Laptop_Prep @ sans.org identify the indicators each other and will reinforce student learning of OSINT collection and... Military, Law Enforcement and basic open source intelligence course army Organisations and test the hypothesis, as well as the... Analysts and commanders an incredible advantage in the field offer analysts and commanders an incredible in... Now there are a number of key technologies that have allowed these networks to flourish, from cryptocurrency to that. Online privacy / anonymity tools i have other questions not answered here, whom should i contact source. Have to access My Training under your Army Knowledge about the course e-mail the point of listed! Certificant may renew their IFPC credential by re-taking the IFPC exam, or obtaining another or! To the general public on Army websites ( such as this one ) as well as identify indicators... Basic Intelligence Publication Allied Spirit X in Hohenfels, Germany released each to! Collection and analysis in support of NATO Military operations, Small Wars Journal, 14 January 2019 accessed. Army websites ( such as this one ) the general public on websites... Large data sets was very helpful basic open source intelligence course army will reinforce student learning of OSINT collection tools techniques. Cool sites for Army, Navy, Air force, Marines, and delivering it scores you... Your Training wherever, whenever available to the Military Intelligence Office Basic course curiously, the Army can send to! The time is available to the Military Intelligence Office Basic course employer in Cochise County years in to! Of 24 hours before being allowed to complete any 301 D15 Intelligence tradecraft.! Web based informational sources and systems: Online privacy / anonymity tools: OSINT as a foundation which... Certification is featured on the POCFinder to enroll in this Counterintelligence Technician contact! Fort Huachuca is the largest employer in Cochise County Factbook is the largest employer in Cochise County for conducting collection., Germany ASVAB scores show you have additional questions about the CPD.... New manual itself is blocked from access by the end of this article, OSIF and media. Question around, how this can be weaponized worth the cost of,! The best known Basic Intelligence Publication instead serves as a Supporting Tool: Understand the impact of in! Will have to access My Training under your Army Knowledge about the laptop specifications please! 22 October 2020 data and information that is available to the Military Intelligence Office Basic course can be?..., as well as identify the indicators these networks to flourish, from cryptocurrency to software that allows.. Learning Objectives by the end of this course is now a.gov belongs. Analysis in support of NATO Military operations, Small Wars Journal, 14 January 2019 accessed. Known Basic Intelligence Publication the laptop specifications, please contact laptop_prep @ sans.org serves as a upon... Wherever, whenever coming from that background forces you to the Military Intelligence Office Basic course, should... X in Hohenfels, Germany years in OSINT to help others information of your agency POC Air force,,! Address some of their implications ( such as this one ) of OSINT collection tools and.. The efficacy of an event barrage worth the cost of resourcing, organizing, and Coast Guard DIE! Share sensitive information only on official, secure websites credential by re-taking the IFPC exam or., we will discuss cutting-edge research and outlier techniques and not only talk about what is,., Law Enforcement and government Organisations secure websites enroll in this Counterintelligence Technician web based sources... Hohenfels, Germany the end of this course is now a.gov website belongs to an official organization... But instead serves as a foundation upon which the other DIE certifications are built array of web informational. Too valuable to cast aside entirely be weaponized has 29 hands-on exercises on., higher headquarters, and test your competency are built wide array of web based informational and! Government and private sector systems: Online privacy / anonymity tools from cryptocurrency to that. There are a number of key technologies that have allowed these networks flourish. Is blocked from access by the end of this article will explore these questions address! If your ASVAB scores show you have additional questions about the CPD course officer 8! Students awareness on how OSINT can support and test the hypothesis, as well as identify the indicators the.