MENU01684 878 170
Connect | Protect | Assure

Jon Webster -

Jon served for 22 years in the British Army Intelligence Corps in which he worked in various intelligence disciplines: Imagery Intelligence, Human Intelligence, Counter Intelligence and Open Source Intelligence. He excelled in developing technical means to enhance collection and analysis processes culminating in leading the technical counter intelligence team.

OSINT

Jon developed an Open Source intelligence course that is now taught across UK Defence. Whilst serving, he provided OSINT Support to UK Special Forces for the London Olympics and enhanced many counter intelligence operations. His passion for the subject, and interest in cutting edge research and analysis techniques ensures that 3SDL’s OSINT training is relevant and current.

Imagery & ISR

Jon provided training and managerial support to the British Army Reserves Imagery Exploitation Unit after a successful tour as an analyst and shift leader in a multinational unit for US Predator missions over the Balkans. During this time he was responsible for training all Reserve Intelligence Corps recruits in intelligence analysis. Jon also has operational experience in various HUMINT disciplines and multiple theatres as both an operator and analyst.

Cyber

Jon led the British Army Information Security Unit providing information assurance advice and support to the MOD on worldwide operations and in the home base for both physical and technical matters. His team also conducted penetration testing, technical investigations, and digital forensics in support of counter intelligence operations. During this time, Jon was the technical investigation SME to Army HQ.

training speciality

COURSE OVERVIEW

With the deluge of data that now exists, these courses are designed to allow students to make sense of the OSINT world and focus on ways they can find, extract and exploit information that is readily available. These tried and tested courses will greatly enhance your understanding and decision making ability alongside other types of intelligence.

Course duration ranges from a 1 week introductory level course through to a 3 week practitioner course. Course content is tailored to individual requirements but includes a mix of classroom instruction and live scenarios. We are able to work with your existing IT or help you develop your own OSINT training capability. 

Course Prospectus 

Target Audience

  • The introductory course is open to anyone looking to enhance their understanding of the OSINT domain. Students are expected to have a basic grasp of IT before attending the course.
  • Military organisations looking to start or enhance their own OSINT capability.
  • Civilian students from non-governmental organisations, the media, law enforcement agencies and private businesses. 

Subjects Covered

The course has included subjects such as:

  • Basic OSINT Analysis Techniques
  • Planning and conducting searches
  • Safety and security
  • Operating procedures and legal aspects
  • Location and verification methods
  • Advanced techniques 

COURSE OVERVIEW

With the deluge of data that now exists, this course is designed to allow students to make sense of the OSINT world and focus on ways they can efficiently find, extract and exploit information that is readily available. ‘Googling’ for information is easy but you may not realise that you are being shown results that you already agree with and will be different from the same search conducted a few miles away by a different researcher. Your online browsing habits, history and location are used to filter your search and provide you with tailored results, and only from those pages that your search engine has indexed. This tried and tested course will greatly enhance both your internet research capabilities and your understanding of the potential OSINT has to complement other forms of intelligence.

Accredited by OSIRA, the Open Source Intelligence Research Association

Course Prospectus

Target Audience

This course is open to anyone looking to enhance their understanding of the OSINT domain and research techniques.

Students are expected to have a basic understanding of IT before attending the course, as well as exposure to intelligence processes.

Subjects Covered

This course will cover the following subjects:

  • Planning and Constructing Searches
  • Power Searching
  • OSINT Tools
  • Verification, Safety and Security
  • Use of Research Profiles
  • Automated Tools
  • Power Searching 2
  • Foreign Languages & Translation
  • Social Networks
  • Geolocation
  • People Finding
  • Google Dorking
  • The Dark Web

COURSE OVERVIEW

This course builds on the OSINT Fundamentals Course and gives the students a more thorough insight into skills and tools to increase their OSINT knowledge and capabilities, introducing them to OSINT research management processes and operation considerations. The learning is reinforced throughout with real-world exercises and culminates in a team practical.

Course Prospectus

Target Audience

This course is designed for intelligence analysts, researchers and investigators looking to enhance their OSINT research skills and knowledge.

Students are expected to have completed the OSINT Intermediate Course prior to attending the Practitioner course and have an understanding of intelligence processes.

Subjects Covered

This course will cover the following subjects:

  • Social Media (SOCMINT)
  • Research planning and management
  • Geolocation
  • VPNs, VMs and tunnelling
  • Foreign language research
  • Depp and dark web
  • Source verification
  • People finding
  • Building an OSINT toolkit
  • Legal and operational consideration

COURSE OVERVIEW

The Cyber Vulnerability Investigation (CVI) process is a structured way of investigating the Cyber maturity of organisations and systems alike. This course thoroughly guides you through each of the detailed stages involved in a CVI; covering all areas from the requirements of deliverables to client/stakeholder management. This course is taught by experienced Information Security professionals with a large breadth of experience and a proven track record of delivering a number of CVIs to the MOD. 

To download the course flyer, please click here

Target Audience

This course is designed for Cyber Security analysts, project managers and researchers involved in conducting a CVI

Subjects Covered

This course will cover the following subjects:

  • CVI Organisation
  • Conduct of a CVI
  • Useful Applications
  • Research Methods
  • Analytical tools
  • Deliverables and Milestone Reviews