On This Page

OSINT Techniques and Methodology

Delitor, Inc. | August 4-5 & August 6-7


This interactive training identifies and demonstrates multiple free online resources that break through traditional search roadblocks. Participants will not only be shown how to "dig" into the internet for personal information about any target but also how to connect attributes across multiple open source data points. While popular sites such as Twitter, Instagram, and Facebook are covered in detail (including techniques that legally access some "hidden" content), the presentation goes much deeper into the vast resources available for researching personal information. Aside from social networks, other technologies such as meta-data, reverse cellular info extraction, mobile app exploitation, and Application Programming Interfaces (APIs) will be explained. The participants will then take all resources available to them and learn how to create their own methodology through practical exercises. All resources can be applied to domestic and international investigations. A custom Linux operating system pre-configured for immediate use will be provided.

  • Conduct advanced search queries across dozens of resources simultaneously
  • Access content believed to be private on Facebook
  • Locate a target's long forgotten Facebook activity
  • Access restricted information through cached results
  • Conduct thorough searches on all social networks
  • Monitor live content and communication on social networks
  • Recover Twitter posts from deleted and manipulated accounts
  • Identify users of private cellular telephone numbers from social networks
  • Retrieve subscriber information from any landline or cellular telephone number
  • Reverse-search photographs and videos for additional copies and details
  • Search historical deleted versions of websites
  • View multiple historic satellite images and street views of any location
  • Identify all social networks in use by target username
  • Use Android Emulators to exploit content only available in apps
  • Create custom operating systems to always have a clean investigation environment

The software session will demonstrate over 40 free software tools that will aid an internet searcher during any type of investigation. Custom portable web browsers will be given to each participant that include pre-configured plugins that add new search features. These include automated reverse image location, media download, screen capture, script blocking, and many more. Custom JavaScript will automate several tasks while websites are displayed in the browser. Additionally, the browser is configured to block website analytics that can divulge sensitive information about the searcher. Other software includes tools that collect entire video feeds, clone websites, protect your true identity, locate Twitter media, display historical satellite data, extract still images from videos, export video metadata, analyze document metadata, and locate additional social network accounts.

The final session in this training will be interactive where the instructor will demonstrate to students, on how to fully analyze all open source information, to show a complete picture in an online investigation. Understanding all resources available is important, but it is as just important to understand how to analyze attribute connections across multiple data points. Participants will conduct timed practical exercises covering domain names, usernames, email addresses and full name.

Please note that this course is interactive training with live demonstration and minimal PowerPoint. There will be practical exercises components and computers are not mandatory but highly recommended for full participation

Who Should Take this Course

  • Online Investigators
  • Penetration Testers
  • Risk Management Professionals
  • Military Personnel
  • National Clandestine Services

Student Requirements

A very basic understanding of internet searches and the presence of social networks.

What Students Should Bring

Please note that this course is interactive training with live demonstration and minimal PowerPoint. There will be practical exercises components and computers are not mandatory but highly recommended for full participation.

What Students Will Be Provided With

  • Complete updated digital list of all training links
  • Methodology flowcharts
  • Pre-configured portable browsers with investigation extensions
  • Custom OVA/VM of a complete investigation operating system
  • Over 25 unconventional online resources for digital investigations


Glenn Devitt is a veteran with 11 years of experience in the United States Army with a background in Human Intelligence (HUMINT) and Counterintelligence (CI). During his military career he was deployed to both Iraq and Afghanistan and was assigned to multiple Joint Task Forces. He has also had the privilege of being an instructor at the Operator Advance Course (OAC), Source Operations Course, Special Operation Forces Physical Surveillance Course, and the Program Manager for the Cyber Operator Greyhat Course. After his military career he joined the H.E.R.O. (Human Exploitation Rescue Operative) Program. This program is designed to allow special operations veterans the chance to become accredited Homeland Security Investigations Computer Forensic Analysts to help combat child exploitation and human trafficking. Glenn then left to start his own company, Delitor Inc., and has spent the last few years supporting governments around the world in targeting human trafficking networks through undercover operations and training agents on how to conduct cyber enabled operations.