OSINT and Cyber Intelligence - Fun and Sun in Miami

America's enemies scour blogs, forums, chat rooms and personal websites to piece together information that used to harm the government and commercial organizations. Learning about cyber intelligence, OSINT and Cyber-OPSEC effectively equips students with the tools to gather data points, transform these data points into actionable intelligence that prevents target attacks.

Hacker Halted 2012 - Miami http://www.hackerhalted.com/2012/Training/OtherInfosecTraining/CyberIntelligence.aspx

This introductory course examines the cyber intelligence lifecycle as well as the availability and use of OSINT tools to support the improvement of organizational, cyber operational security (CYBER-OPSEC). Students will be able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course. In addition, students will understand: the use methods of only anonymity, the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations to assist in CYBER-OPSEC and in their defense against adversaries.  Most organizations do not monitor their online postings with CYBER-OPSEC in mind. Online postings across multiple protocols and web functions might allow your adversaries an opportunity to interpret or piece together critical information. Adversaries use multiple and overlapping collection efforts targeted against all sources of your organizational and employee information.

America's enemies scour blogs, forums, chat rooms and personal websites to piece together information that used to harm the government and commercial organizations. Learning about cyber intelligence, OSINT and Cyber-OPSEC effectively equips students with the tools to gather data points, transform these data points into actionable intelligence that prevents target attacks. Students will learn of measures to identify, repel, or neutralize targeted intelligence gathering against organizational assets.  Methods of prevention will help reduce your Internet, Web and Web 2.0 attack surface.

Open source intelligence is an untapped discipline that can be used to enhance operational security of your organizations online presence while preventing least path of resistance penetration into your organizational environments. In order to protect your online information and reputation, you first must understand the methods of targeting, data gathering and collection, data production, analysis and written delivery. This intense course covers all aspects of the cyber intelligence lifecycle focusing on the use of open source tools to gather readily available Internet and Web 2.0 data. The data points are then organized into a profile for analysis into actionable intelligence and used to reduce your attack surface and prevent additional data loss.

The focus is on relevant information that can be obtained legally and ethically from the public and private sector, and that is not classified in its origin or processing. The information may become classified in relation to the students organizational intent or its association with classified information when it is rightly blended into all-source intelligence reports.

Open Source Data (OSD) is the raw print, broadcast, oral debriefing or other form of information from a primary source. It can be a photograph, a tape recording, a commercial satellite image, or a personal letter from an individual. Open Source Information (OSIF) is comprised of data that can be put together, generally by an editorial process that provides some filtering and validation as well as presentation management. OSIF is generic information that is usually widely disseminated. Newspapers, books, broadcast, and general daily reports are part of the OSIF world. Open Source Intelligence (OSINT). OSINT is information that has been deliberately discovered, discriminated, distilled, and disseminated to a select audience in order to address a specific question, in this case organization online OPSEC. OSINT, in other words, applies the proven process of intelligence to the broad diversity of open sources of information, and creates intelligence that is actionable and can be used to improve cyber defenses and strategies.

Students completing the course receive Utica College certification that remains in effect for 2 years

·        Course outline:

·        Introduction to Open Source Intelligence – Cyber Intelligence

·        Methods of Anonymity

·        Open Source Tools

·        Cognitive Bias, Critical Thinking, Evidence Validation

·        OSINT Case Study

·        Target Assignments - Teams -OSINT Target Collection

·        Link, Tendency, Trend Analysis

·        OSINT Target Collection

·        Tips and Tricks for Evidence Validation and Relevancy

·        Analysis - Conclusions First - Recommendations and Opportunities

·        Finalize OSINT Target Collection and Analysis - Team Collaboration for Presentation

·        OSINT Target Teams Presentation and Review

·        Class wrap up

http://www.hackerhalted.com/2012/Training/OtherInfosecTraining/CyberIntelligence.aspx

Insider: How a good CSO confronts inevitable bad news
Join the discussion
Be the first to comment on this article. Our Commenting Policies