331-999-0071

New
OPSEC, OSINT, and Darknet Collection  OPSEC, OSINT, and Darknet Collection

OPSEC, OSINT, and Darknet Collection

Reduce your risk. Collect with confidence

$2,199.00

Intelligence organizations often overlook operational security when researching. Open-source collection activities become proforma activities without consideration for risk. Social media changes, browser shift, and general apathy lead to unknown exposures. The new course from Treadstone 71 ensures OPSEC in your passive collection. We cover browser configurations, container builds, persona alignments to technology and priority intelligence requirements, in both OSINT and Darknet environments.


  • SPECIFICATION

OPSEC, OSINT, and Darknet Collection  // //

Classes Forming Now (private and public)


Intelligence organizations often overlook operational security when researching. Open-source collection activities become proforma activities without consideration for risk. Social media changes, browser shift, and general apathy lead to unknown exposures. The new course from Treadstone 71 ensures OPSEC in your passive collection. We cover browser configurations, container builds, persona alignments to technology and priority intelligence requirements, in both OSINT and Darknet environments.

We explore the tools used in OSINT by hackers from adversary countries. Students learn their usage, methods, tactics, and sites they regularly visit. From nation-state threat actors to cyber criminals, the course includes hands on setup and proving of browser configuration, extension use, and container builds. Students leave with the confidence that their collection activities are always secure. No leakage of any type!

Passive collection is, by nature, risk adverse. Create rules-of-engagement aligned to legal needs and corporate risk appetites. Ensure your data maintains provenance with a patient and pragmatic approach to data collection. Perform initial data reviews for credibility and source analysis for validation. Keep your collection relevant to your intelligence requirements.

This course follows a crawl-walk-run in-class methodology with hands-on  validation of skill. Each student walks away with ready-built, proven configurations they can use on day one. We also provide ROE and RACI(S) examples for collection and analysis.

 This course is for any organization who needs to up their skills. Enhance your cyber intelligence teams with this 3-day intensive course from Treadstone 71.


 Brief Outline

  1. OPSEC Methods, Tools, Configurations, Containers
  2. Use of Virtual Tools and Setup
  3. Anonymity and Trust Heuristics
  4. Browser Extension Selections and Segmentation
  5. Leak Checking
  6. OSINT Methods of collection – Tools
  7. SOCMINT, Cyber HUMINT
  8. Adversary OSINT Toolkits
  9. Methods for Research
  10. Darknet collection methods
  11. Find out where they hang their hats
  12. Maintaining Data Provenance
  13. Searching the non-standard Social Media Platforms
  14. Indicators Cyber DECIDE, DETECT, DELIVER and ASSESS (D3A) framework
  15. Validation of adversaries - Socio-Cultural Cyber Analysis – STEMPLES Plus
  16. Adversary Profiling for Risk Assessment and Prioritization – Baseball Cards
  17. Adversary Risk Models
  18. What they are saying about you and where
  19. Source Validation Credibility Relevance
  20. Intelligence Requirements Management
  21. Passive collection cyber personas
  22. Rules of Engagement (RoE)
  23. Personality Reviews – Yours and your teams
  24. False Virtual Persona Checklists
  25. Tracking Activities
  26. Content Creation when and where needed
  27. Threat Intelligence feeds assessment and analysis
  28. AI and other tools
  29. Case studies
  30. Hands-on Practical Exercises

Main Specifications


SKUOPSECOSINT

Product reviews (0)

Contact Treadstone 71 Today. Learn more about our Targeted Adversary Analysis, Cognitive Warfare Training, and Intelligence Tradecraft offerings.

Since 2002  CONTACT US TODAY