Basel Institute on Governance Open-Source Intelligent (OSINT) Course
Introduction
OSINT - OSINT stands for open source intelligence, which refers to any information that can legally be gathered from free, public sources about an individual or organization. In practice, that tends to mean information found on the internet, but technically any public information falls into the category of OSINT whether it’s books or reports in a public library, articles in a newspaper or statements in a press release. OSINT also includes information that can be found in different types of media, too. Though we typically think of it as being text-based, information in images, videos, webinars, public speeches and conferences all fall under the term.
Basel Institute
The Basel Institute on Governance is an independent, non-profit organization working around the world to strengthen governance and counter corruption and other financial crimes, established by Mark Pieth in 2003 at Basel, Switzerland. This course, through a simulated investigation will help you learn the basics of how to prepare, conduct and report an OSINT undertaking.
The course which was grouped into nine(9) sessions set the learner up as an Analyst for the National Criminal Investigation Division (CID) in a country called Fair Islands, whose team was enlisted for help by the Coast Guard regarding a shark fin seizure that occurred on 20.09.2021. Hence, I will be walking through the sessions as I take on the fantasy investigation.
Session One
An Introduction to the course, it's goal and how to navigate the course. I was also shown relevant information regarding the country I reside in and neighboring countries. This session also took me through the Intelligence cycle, prepared a hypothesis for the investigation.
Session two
In this session, I was walked through how to prepare the environment for the investigation, this included setting up my browsers, Security of Operating system and running a Virtual machine. All these are necessary so as to remain and maintain anonymity throughout the investigative process and not alert your suspect.
Session three
I performed some Database and Web searches on business registry for Mossaman, and FV Malaga
Session four
I used some relevant OSINT tools (Whois) to perform DNS record investigations, seeking for relevant information to aid the Investigation.
Session five
I used tools like the Wayback machine, Archive.today to look at Archived and Cache pages of the target website.
Session six
i did investigation using social media to gather information on individuals possibly related to the case.
Session seven
I exploited information from some Images gathered during the social media investigation using tools like Yandex, Metadata etc. Information like the date, time and location (known as EXIF data)an image was taken.
Session eight
I conducted investigations using Online communities and the dark web through Tor browser. Investigations on virtual currencies (Bitcoin) was also carried out.
Session nine
Proper reporting is always as important as the investigation itself. I learnt that questions like, What? Where? How? Who? and Why the crime should be communicated unequivocally to help the reader have a better grasp for judgement on the case. Where possible Graphs, pictures, etc gathered throughout the investigation should be added to the report also.
Conclusion
At the end of every session, a summary of our discoveries were recorded which aided a comprehensive report. This course exposed me to a lot of OSINT tools and how to properly use them, including the importance of a good report when it's all done.