OPEN SOURCE INTELLIGENCE SEMINAR SERIES. Transforming Your Research and Analytic Skills



Similar documents
INTELLIGENCE AND CYBERSECURITY SEMINAR SERIES. Transforming Your Research and Analytic Skills

I N T E L L I G E N C E F O R S A L E S P R O F E S S I O N A L S. Business Development with Open Source Tools and Data

sd street toolz digital centre

Masters in Applied Risk & Crisis Management (distance-learning) Commencing 2014

Digital Marketing Institute s. Professional Diploma in Digital Selling. Validated by the Syllabus Advisory Council (SAC)

Professional Diploma. in Digital Marketing

WHITE PAPER: THREAT INTELLIGENCE RANKING

Turning data into business. Exploiting big data requires fundamental rethinking of how we do business.

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

Professional Diploma. in Search Marketing.

TESTING OUR SECURITY DEFENCES

JamiQ Social Media Monitoring Software

Professional Diploma. in Social Media Marketing.

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

How To Get A Security Degree In Australia

Guide: Social Media Metrics in Government

Professional Diploma. in Digital Marketing.

Win with the ACCA Advantage Programme The Academy

EMS BYOD Pilot--Frequently Asked Questions

Social Media Analytics, from Data to Deliverables. REQUEST A FREE TRIAL. Visit or call

Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector.

BIG DATA AND CYBERSECURITY:

How To Complete A Professional Diploma In Digital Marketing

Digital Marketing Institute (DIY courses)

Cyber Learning Solutions

The SHU Social Media CoLab: developing a social media strategy through open dialogue and collaborative guidance


Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

BIG DATA TRIAGE & DIGITAL FORENSICS

Cyber Intelligence Workforce

European University Association Contribution to the Public Consultation: Science 2.0 : Science in Transition 1. September 2014

Strategic Planning and Performance Management for Public Organizations

Insiders Guide to EU Affairs

This document has been archived International Strategic Leadership of ICT (I-SLICT) programme

DATA QUERY: ADVANCED DATA MODELLING

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper

Measuring your Social Media Efforts

CALL FOR QUOTATION For COMMUNICATION SERVICES

The London Film School (LFS)

Creating a Digital Marketing Strategy

January Communications Manager: Information for Candidates

THE MCKINSEY GLOBAL INSTITUTE has predicted that by 2018, the US alone could face a shortage of between 140,000 to 190,000 people with deep

State Records Guideline No 18. Managing Social Media Records

CYBER SECURITY TRAINING SAFE AND SECURE

Director Global IT Service Delivery Information Services

Digital Advertising & Action PMGT

MODULE OUTLINE. Module Overview CRISIS COMMUNICATIONS. Personal Information

Social Media Marketing and Managing Proposal

How To Teach The Cambridge Philosophy Course

Evaluation criteria for Google Apps backup

Ewater Pumping, Source Modelling and Design

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research

MSc Cyber Security. identity. hacker. virus. network. information

Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach

UNIVERSITY OF BRADFORD

Setting the Standard for Safe City Projects in the United States

Create, attract, retain and delight customers, profitably. HubSpot Connector

Digital content is emerging as the newest strategic

Dubai School of Government Master of Public DSG MPA

(BDT) BDT/POL/CYB/Circular

However, there has still been one serious limitation until now.

CONSUMER EDUCATION Policy Recommendations of the OECD S Committee on Consumer Policy

W3C USING OPEN DATA WORKSHOP VISUAL ANALYTICS FOR POLICY-MAKING OPPORTUNITIES AND RESEARCH CHALLENGES Francesco Mureddu, Tech4i2.

United Nations Children s Fund (UNICEF) Phnom Penh, Cambodia Vacancy Nº COMM/15/008. Terms of Reference

MSC INTERNATIONAL MANAGEMENT AT THE SCHOOL OF MANAGEMENT...

The Social Media and Communication Manager will implement the. Company s Social Media Strategy, develop brand awareness, generate

digital mums THE Strategic Social Media Manager Programme COURSE BROCHURE

the beginner s guide to SOCIAL MEDIA METRICS

Britepaper. How to grow your business through events 10 easy steps

Athabasca University Management Position Description Section I

Midwest Association of Colleges and Employers (MWACE) Website Redesign & Restructuring

The SIEM Evaluator s Guide

THE COMMUNITY MANAGER PROGRAMME BROCHURE

AACSB International Accounting Accreditation Standard A7: Information Technology Skills and Knowledge for Accounting Graduates: An Interpretation

The Ideal Future for Intelligence Education: Rebuilding and Balancing Practice and Theory

Big Data Big Privacy. Setting the scene. Big Data; Big Privacy 29 April 2013 Privacy Awareness Week 2013 Launch.

International Relations Networking of the Austrian Armed Forces

Gareth Dunlop CEO and owner of Fathom, a dedicated User Experience and Digital Planning agency

Technology & Applications. Three Technology Must-Haves to Improve Sales Effectiveness and Boost Win Rates

Capturing Meaningful Competitive Intelligence from the Social Media Movement

INFORMATION SYSTEMS (INFO)

Summer Programme on International Sports Law:

1. Title: Support for International Development Research

Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence?

TECHNOLOGY TRANSFER PRESENTS MARK BUSINESS INTELLIGENCE ESTENDING BI TO SUPPORT ONLINE MARKETING AND CUSTOMER ANALYSIS

The Center for Research Libraries

Athabasca University Management Position Description Section I

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

Business School DBA The Professional Doctorate in Business Administration

Master of Arts Public Policy Leadership

APQC CORPORATE EDUCATION CATALOG

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN INFORMATION TECHNOLOGY IN EDUCATION (MSc[ITE]) *

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

1

SMM Brochure. #discoverdigital

Executive Diploma in Big Data Management & Analytics

J339T /J395 Web Design for Journalism 07775/07995 Spring 2015 MW 1-2:30, CMA School of Journalism The University of Texas at Austin

Bring your learning into the Digital Age

ONLINE RECONNAISSANCE

Multidisciplinary Engineering Systems Graduate Education: Master of Engineering in Mechatronics

Transcription:

OPEN SOURCE INTELLIGENCE SEMINAR SERIES Transforming Your Research and Analytic Skills Winter 2015

Contents A 21st Century Skillset 3 Course Dates 5 Course Fees 5 Open Source Intelligence 6 Advanced OSINT 8 Social Media Intelligence 10 Additional Information 13 The Organisers 14 The Instructor 15 Contact Us 16 2

A 21st Century Skillset The Global Governance Institute and i-intelligence are pleased to announce the next iteration of their intelligence and cybersecurity seminars in Brussels. Designed and developed by leading faculty and experts from industry, government and academia, our seminars will provide you with the research, analytic and technical skills you need to advance your career in the coming decade. Specifically, we will show you how to: - Improve the quality, accuracy and relevance of your search results - Automate the collection of mission or business critical data using free web tools - Enhance your critical thinking and analytical skills - Produce world class reports and presentations - Monitor social media to support strategic and operational decision making - Improve your online privacy and security - Protect the physical and digital data assets of your organisation - Boost your efficiency and productivity in the workplace Quality Education Our seminars offer the perfect blend of theory and practice. Participants will be introduced to the concepts and models that inform today s best practices, and will be given ample time to experiment with the tools, techniques and technologies that are taught. In addition to the course slides, participants will receive a host of supplementary materials including cheat sheets, templates, software tools and additional reading materials to enable self-study. 3

Professionally Relevant Our seminars guarantee measurable outcomes. Our curricula are designed around professional standards and best practices. We draw on the experience of the world s foremost practitioners and use real-world case studies and simulations to help students internalise lessons learned and apply these skills in the workplace. Cost Effective We are committed to making instruction in intelligence and cybersecurity as affordable as possible. Our seminars have been competitively priced to help organisations and individuals of all backgrounds acquire and employ a 21st century skillset. Group discounts are available for organisations wishing to send more than one participant. Contact us to find out more. Who Should Attend Our seminars are relevant to all professionals, regardless of their background or career ambitions. That said, they have been optimised to support the work of: - Diplomatic staff and foreign affairs professionals - Law enforcement and intelligence practitioners - Defence professionals - Researchers, analysts and desk officers - Risk managers and consultants - Chief information officers - Fraud investigators - Strategy professionals - Journalists - Academics and students 4

Course Dates Our Winter 2015 seminars will take place on the following dates: Open Source Intelligence: 11 13 November 2015 Advanced Open Source Intelligence: 16-18 November Social Media Intelligence: 30 November 2 December Course Fees The following fees apply for participation at our seminars. Payment should be made in advanced of the course to an account specified by the organisers. Open Source Advanced SOCMINT Intelligence OSINT Corporate 1,000 1,000 1,000 Military 700 700 700 Law Enforcement 700 700 700 Government 700 700 700 Media 700 700 700 Non-Profit 700 700 700 Student 400 400 400 Student applicants have to provide written confirmation from an academic institution that they are enrolled in a full or part time program of education. 5

Open Source Intelligence This three-day seminar provides a detailed introduction to the discipline of Open Source Intelligence (OSINT). Participants will learn how to identify their intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis and decision-making in their organisation. Course Outline Day 1 Introducing OSINT OSINT in history, theory and practice The varieties of OSINT (online, offline, etc.) The benefits and limitations of OSINT The strategic and operational dimensions of OSINT Legal and ethical constraints Managing Requirements Working with intelligence customers Identifying collection requirements The Key Intelligence Topics (KITs) process Collection planning Collection frameworks Day 2 Effective Internet Exploitation Working with keywords Search strategies Search engines and operators Automating data collection Alert services Working with the Deep Web Working with Social Media Building a customized search engine Essential browser tools and extensions Safer Searching Privacy, anonymity and proxy tools Working with Tor and the Dark Web Day 3 Data Management and Exploitation Validating your search results Data processing and enrichment Organising data for analysis The pre-analysis checklist 6

Course Benefits On completion of this course, participants will have acquired the ability to: Identify and manage their intelligence requirements Improve the quality, accuracy and relevance of their search results Automate the collection of data from the web and social media Build a personal monitoring system to support strategy and decision making Improve online privacy, anonymity and security Organise data to identify knowledge gaps and support effective analysis Course Requirements Participants are required to bring a laptop with them and to set up a Gmail and Twitter account if they do not already have one. 7

Advanced OSINT This three-day seminar builds on the content of our introductory OSINT course. The objective here is to extend the OSINT professional s skillset, allowing them to exploit a broader range of sources and data types. Emphasis is also given to the importance of human and cultural intelligence as a compliment to one s online skills. Course Outline Day 1 Advanced Data Collection Google Hacking the Deep Web Web rippers and scrapers Feed manipulation and processing tools Working with open data and APIs Day 2 Web Intelligence Whois, DNS and IP tools Site mapping Email tracing and validation Metadata exploitation Network analysis with Maltego Day 3 Geospatial Intelligence Maps and mapping tools Working with geolocational data Generating data from social media Crisis mapping with Ushahidi Human Intelligence Identifying and working with experts Leveraging social networks Professional networks and associations Interview and elicitation skills Analysing for duplicity and deception Cultural Intelligence Varieties, benefits and limitations Gathering and analysing CULTINT Incorporating CULTINT into your analytic products Communicating CULTINT to decision makers 8

Course Benefits On completion of this course, participants will have acquired the ability to: Automate data collection and processing using free web-based tools Identify the ownership and provenance of websites and other resources Conduct web reconnaissance on organisations and individuals of interest Leverage geospatial data for strategic and operational intelligence purposes Identify and work with human sources of intelligence Course Requirements Participants are required to bring a laptop with them and to set up a Gmail and Twitter account if they do not already have one. Additional software requirements will be sent prior to the start of the course. We also recommend that participants on our Advanced OSINT program first take our Open Source Intelligence seminar to ensure they understand the technical standards and operating principles that underpin data collection and analysis. 9

Social Media Intelligence This three-day course will demonstrate how to generate strategic and operational intelligence from social media sources. Participants will be shown how to collect, process, analyse and communicate social medial intelligence (SOCMINT) using free tools and standard office productivity software. Further, they will be shown how to identify and monitor influences and leading voices. Finally, they will be shown how to conduct rigorous online investigations using a broad range of tools and resources. Course Outline Day 1: SOCMINT I Introducing SOCMINT Social media: it s history and evolution The variety of SOCMINT sources Defining your SOCMINT requirements Legal and ethical considerations Establishing Your SOCMINT Toolkit Configuring your browser Extending your search capabilities Developing keyword indices Research tools and extensions Collaborative research tools Content curation / management tools Automating SOCMINT Collection Monitoring frameworks and approaches Keyword / hashtag discovery and validation Source discovery and validation Recommended tools, apps and extensions Establishing a monitoring dashboard Working with Social Networks Working with Facebook, Google+ and LinkedIn Finding and monitoring users, groups and fan pages Mining social networks for SOCMINT Using third party tools and search services Generating user stats and analytics 10

Day 2: SOCMINT II Working with Twitter and Instagram Finding, monitoring and geolocating users Monitoring geolocated content Generating user stats and analytics Automating data collection Search and content discovery tools Third party dashboards and extensions Blogs and Discussions Boards Mining blogging platforms for intelligence Working with visual blogs (Pinterest, Tumblr, etc.) Working with Reddit and discussion boards Determining reach and influence Foreign Language SOCMINT Mapping the SOCMINT universe Mining and monitoring foreign language services Working with translation tools and extensions Day 3: Online Investigations Getting Started The investigators toolkit The investigative process Working with target profiles and templates Maintaining privacy and security online Investigating Websites Whois, DNS and IP tools Site mapping Site stripping Cached and archived content Network analysis with Maltego Investigating Organisations Company profiling Identifying management and ownership Working with official records Working with satellite / imagery sources Sources of financial data Investigating Individuals Finding people online Mapping an individual s online footprint Screen name investigations Finding and validating email addresses Email tracing and traffic analysis 11

Course Benefits On completion of this course, participants will have acquired the ability to: Monitor a broad range of social media sources, including non-western ones Identify and follow leading voices and opinion makers Track the evolution of critical conversations and ideas Apply free tools and standard office software to analyse the data collected Use SOCMINT to support strategic planning, risk management and crisis response Conduct online investigations in a legal and ethically appropriate manner Course Requirements Participants are required to bring a laptop with them and to set up an anonymous Gmail, Twitter and Facebook account if they do not already have one. Additional software requirements will be sent prior to the start of the course. 12

Additional Information Number of Participants The maximum number of participants per seminar is 15. This ensures a greater level of engagement, collaboration and guidance from the instructor. Course Hours The seminars will run from 9:00am to 5:00pm. This includes a one-hour lunch break and two twenty-minute coffee breaks. Location All seminars will take place in Brussels at a location to be confirmed. Language The language of instruction, together with all course materials, will be English. Registration and Enquiries To register, or for further information, please contact info@i-intelligence.eu or akhatcha@globalgovernance.eu. Confirmation Policy Courses will be confirmed one month prior to the start date. Participants are advised to make travel arrangements only after this time. Cancellation Policy Participants cancelling within a week of the seminar will be charged 80 per cent of the course fee. If you cannot attend, you are welcomed to have someone do so in your place and so avoid losing your registration fee. i-intelligence and the GGI reserve the right to cancel the course if there is an insufficient number of registrations. You will be given adequate notice if this is the case. A full outline of our terms and conditions will be submitted to each participant on enrollment. 13

The Organisers The Global Governance Institute The Global Governance Institute (GGI) is an independent, non-profit think tank based in Brussels. GGI brings together senior policymakers, scholars and practitioners from leading institutions to devise, strengthen and improve forward-looking approaches to global governance. The GGI provides comprehensive research, cutting-edge analysis and innovative advice on core policy issues, informed by a truly global perspective. This includes raising awareness on major governance challenges among the general public. The GGI has conducted research and policy-oriented advice for a variety of national and international bodies. At the heart of its approach lies independence and impartiality, and a deliberate mix of conceptual and policy-oriented perspectives, promoting 'pragmatic idealism' in global problem solving. i-intelligence i-intelligence is a commercial intelligence consultancy based in Zurich, Switzerland. Established in 2010, the company provides research, training and advisory services to public and private sector organisations in Europe and beyond. i-intelligence is a leading provider of holistic training solutions. Our course portfolio covers the entire intelligence cycle as well as related disciplines such as information and knowledge management, futures and foresight and risk and strategy analysis. The company s clients include EU and UN institutions, the Council of Europe, NATO, ministries of defence and foreign affairs, Fortune 500 companies and enterprising SMEs. 14

The Instructor Chris Pallaris is Director and Principal Consultant of i-intelligence. He leads and coordinates the company s research, teaching and consulting activities in Europe and beyond. Chris has over 15 years of experience as an analyst and 10 as a teacher. He is recognised as one of Europe's leading instructors in intelligence and its related disciplines. In addition to teaching engagements for his clients, he also holds a number of formal teaching positions. He is an Associate Lecturer at Mercyhurst University's Institute for Intelligence Studies. He also teaches courses in the domain of strategic intelligence and knowledge management at the ZHAW's School of Management and Law, and on behalf of the Rochester-Bern Executive MBA. He is also a regular instructor at the NATO School in Oberammergau, and at NATO s Centre of Excellence, Defence Against Terrorism (COE-DAT) in Ankara, Turkey. In addition to the above, Chris serves on the board of the European Open Source Intelligence (EUROSINT) Forum, where he chairs a working group on best practices in intelligence. He is also a board member of the European Information Network on International Relations and Area Studies (EINIRAS). Further, he sits on the Editorial Board of the Partnership for Peace (PfP) Consortium of Defence Academies and Security Studies Institutes. Chris has a degree in International History from the London School of Economics and Political Science, and an MBA from the Open University. 15

Contact Us Global Governance Institute Arianna Khatchadourian Tel: +32 (0) 2 614 82 09 Email: akhatcha@globalgovernance.eu i-intelligence Chris Pallaris Tel: +41 (0) 43 243 3849 Email: info@i-intelligence.eu 16