Introduction
New obligations for asset management companies and financial intermediaries: internal control system and application criticalitiesPresentationOSINT, is the acronym for the English words Open Source INTelligence (from open sources), and identifies the process / activity of collecting information through the consultation of publicly accessible sources or open sources.
OSINT is the activity carried out by the character played by Robert Redford with the code name “Condor” in Sidney Pollack's 1975 film “Three Days of the Condor”. Redford was a CIA analyst who worked in a clandestine New York office where he read and analyzed the contents of books, newspapers and magazines from around the world with the aim of finding hidden meanings, secret codes and suspicious individuals.
Today this activity, as well as by governments, police forces, intelligence etc., has also spread among private organizations such as large companies, banks and financial intermediaries, which increasingly use this methodology.
The functions most affected are: InternalAudit, Compliance, Anti-Money Laundering, Risk Management, Recruiter and Investigative Journalists.
The Specialization Course will present the basic and advanced concepts for personnel approaching the world of Intelligence for the first time and in particular OSINT.
The aim of the course is to provide an in-depth knowledge of the disciplines related to the world of Intelligence, focusing on methods of analysis of Open Sources and their practical application. In consideration of the prevalent practical component, each learner must be equipped with their own Personal Computer (BYOL mode - Bring Your Own Laptop).RecipientsThe functions most affected are: Anti-Money Laundering, Risk Management, Corporate Lending, Internal Audit, Compliance, Whistleblowing, HR Recruiter, Investigative Journalists and Private Investigators.AimsThe aim of the course is to provide the advanced technical and theoretical tools for carrying out an OSINT research on the Internet. At the end of the course, participants will be able to carry out an OSINT analysis using both manual techniques and research tools that allow to:Find information on individuals and companies;
Evaluate its reliability;
Verify the documents of individuals and companies;
Verify the identities of the subjects analyzed;
Verify the possession of assets and assets of individuals and companies;
Validate data / information for the purpose of proper Adequate Customer Verification;
Validate data / information to proceed with a correct SOS;
Identify all the social contacts of the analyzed subject;
Identify all the social activities of the subject analyzed;
Identify all the social interests of the subject analyzed;
Produce reports and present the results.In summary, the OSINT Expert will be able to provide the Decision Maker with the information that can allow them to make appropriate and considered decisions.Program (in short)OSINT: history and definitions
Methodologies, tools, techniques
Team work
Operator safety
Standard and non-standard search engines
Standard and non-standard sources
Social networks
Geolocation
File and metadata
Images
OSINT tools
Verification and validation of sources and information
Report creationProgram (extended)Presentation of the courseOSINTIntroduction
The world of intelligence
OSINT: history and definitions
Characteristics and methodologies of Open Sources
OSINT matrix
Methodology, tools, techniques
Flow charts and mind mappers
Browser configuration and add-onsTeamworkDivision of participants into teams
Team Leader role definition
Evaluation of the target and available information
Division of tasks and supervisionOperator SafetyVirtual machine
VPN
Tor
Tails
Fake profiles
Sock puppets
Sms
VoIP
Fake mail
Moskow rulesSearch engineStandard
dedicated
dorks
Alerts
Custom enginesStandard and Non-Standard SourcesStandard sources
Other sources (Gray literature, Deep web)Social Networks: API and Online Tool for Finding Information on:Facebook
Twitter
Whatsapp
Instagram
Skype
LinkedinGeolocation: Tools and MethodologiesIP locator
Wifi
Exif data
HLR
IBANImages and Files: MetadataMetadata analysis manually and through tools
Image analysis
Logical analysis
Technical analysis (Error level analysis)
Reverse image searchOSINT ToolsMaltego
Recon-ng
Spiderfoot
Mapping tools
Map history
Street view
Web scraping: use of google documents
Web history
DNS HistoryVerification of Sources and Validation of InformationEvaluation of sources and information
Evaluation scales
Evaluation methodOSINT Report Creationreports
Real report analysisStructureThe course is organized in 4 modules lasting two afternoons each, for a total of 8 meetings. During the course numerous Missions will be carried out with presentation of the results and discussion on the methods used. All the techniques described will be supported by examples and practical exercises carried out in working groups.