Module 1: We focus on identifying illicit activity on social media. This Module includes everything from trafficking controlled substances to supply chain risks, fraud, import bans, potential sanctions violations, and the Tactics, Techniques, and Procedures (TTPs) used by bad actors and criminals on social media. Further details on this Module are only available in the full course syllabus for enrolled students.
Module 2: This Module focuses on identifying the people behind online aliases involved in threats, disinformation, or harassment. We will leverage PAI, tools, and methodology to identify social media profiles behind aliases.
Module 3: In this Module, we will review PAI sources such as data brokers, lawsuits, county records, patents, and more. We will explain how to use these resources to build a more complete picture of a person of interest, group, or entity.
Module 4: This Module focuses on geolocation and reverse image searching. In this Module, you will learn to geolocate people in obscure locations and use several different mapping tools. Further, you will learn how to create a map using these tools. In addition, you will learn how to perform an effective research image search on a person to identify where they are. This Module will also include less-known tools and an intricate, non-technical methodology to break down a location.
Module 5: In this Module, we will cover front organizations/companies. Front organizations use nonprofits to hide their illicit activities. We will look at multiple use cases for this Module, including national security concerns and threats. You will learn the patterns of behavior of front organizations and how to better identify and monitor them. Further details on this Module are only available in the full course syllabus for enrolled students.
Module 6: With this Module, we will cover disinformation, the patterns that bad actors use to push it, and how to identify a disinformation network. Further details on this Module are only available in the full course syllabus for enrolled students.
Module 7: This Module will discuss how to analyze domains and websites for red flags. Red flags include hosting companies with ties to countries with hostile intent, signs of fraud for a website, security of a website and why it matters, and techniques/tactics we can use to get more information about a specific domain. Further details on this Module are only available in the full course syllabus for enrolled students.
Module 8: This Module focuses on due diligence for businesses in the U.S., outside the United States, and with offshore interests. You will learn methods/techniques to research foreign businesses. You will learn how to thoroughly deep-dive into a company and identify risk factors for a business. We will go through several databases and websites to obtain information on a business and methodology to unearth unique data. Further details on this Module are only available in the full course syllabus for enrolled students.
Module 1: We discuss OSINT, operational security, and virtual machines. This Module is the foundation you need to start your OSINT journey.
Module 2: This Module focuses on social media research on Facebook, LinkedIn, Twitter, YouTube, and Instagram. You will learn how to use each platform, some intermediate tricks and tips to pull unique data, and how to analyze profiles and social media activity.
Module 3: In this Module, we will go over Google Dorking. You will learn how to pull unique information from multiple different search engines. We will discuss gathering documents from websites with specific queries, cached data, and more.
Module 4: This Module focuses on geolocation and reverse image searching. In this Module, you will learn the basics of geolocation and how to use mapping platforms to enhance your OSINT analysis and investigations.
Module 5: This Module focuses on news media and OSINT. We will go over how to pull unique data from news sources and find information that is a little harder to access.
Module 6: In this Module, you will learn how to analyze a domain for information and why it matters for your OSINT research and investigations.
Module 7: In this Module, you will discover how to utilize PAI resources to support your OSINT research/investigations.
Module 8: In this Module, we will go over how to research a business online, its founders, and its executive team.
Module 9: This Module will briefly cover illicit activity online and crime. We will discuss using OSINT to find more information on the data points we discover during our research.
Module 10: This Module will go over critical thinking and report writing and how to create a report and assessment that a client would understand and feel informed by.
Copyright © 2023 Charters Intelligence - All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.