Introducing the capabilities of internet intelligence and investigations.
Defines III (OSINT) and introduces the capabilities of III (OSINT) and explains how it is used to process investigations.
The practitioner will understand what III (OSINT) is, and what it is not and will have learned about the scope, capabilities and limitations of III (OSINT) and how to manage expectations.
Module 1 Part B does not differentiate between the public and private sectors.
INTRODUCING OPEN SOURCE INTELLIGENCE
DEFINING OPEN SOURCE INTELLIGENCE
OSINT / III / i3
HISTORIC OSINT RESOURCES
III (OSINT) RESOURCES
RESOURCES THAT ARE NOT III (OSINT)
OBSTACLES TO SAFE III (OSINT) DEPLOYMENT
EXAMPLES OF III (OSINT) CAPABILITIES
THE BELLINGCAT INVESTIGATION OF GRU OPERATIVES
IDENTIFYING A PERSON OF INTEREST
VICTIM, WITNESS OR SUSPECT?
A FRAUDULENT TRAVEL INSURANCE CLAIM
DRUNK & DISORDERLY
DEFRAUDING AN EMPLOYER
BENEFIT FRAUD
DIFFERENTIATING PUBLIC & PRIVATE SECTOR INVESTIGATIONS
PUBLIC AUTHORITIES
PRIVATE SECTOR
DEPLOYING III (OSINT) IN INVESTIGATIONS
EXPANDING THE SCOPE OF THE INVESTIGATION
VERACITY OF OPEN SOURCE INTELLIGENCE
PROCESS EVERYTHING LOCATED