top of page

Day 1

Tuesday, 12th September 2023
9:00am - 4:00pm AEST

Networking Function 4:30pm - 6:30pm AEST

9:00am

Welcome and Opening Address

9:10am - 9:50am

Creativity, left-field thinking (and luck) in OSINT research: a geolocation demonstration

Presenter: Gordon Farrer

 

In an informative and entertaining talk, Gordon will show how he solved a seemingly impossible task to geolocate two images: one of a row of trees against a pinkish sky; the other a couple on a small boat bobbing in front of a distant landmass.

He will demonstrate, step-by-step, the thinking and investigative approaches he used to gradually tease out the information in the images to solve the challenge and talk through what he learned from the experience that made him a better OSINT practitioner and OSINT teacher. The journey includes some stumbles, dead-ends and a surprising twist.

9:55am - 10:35am

Digital Threat Assessment®: The Application of OSINT Techniques to Identify/Assess Online Threats and Establish a Digital Behavioral Baseline

Presenter: Colton Easton

 

This presentation aims to provide a comprehensive understanding of the importance of using and applying Open-Source Intelligence (OSINT) when conducting a Digital Threat Assessment® (DTA). The application of OSINT when conducting a DTA® helps Behavioral Threat Assessment teams identify and assess potential online threats in near real-time as well as helps establish the Digital Behavioral Baseline of a Subject of Concern (SOC). In this session, we will highlight the latest OSINT tools and techniques used in DTA® data collection, and how Behavioral Threat Assessment teams can utilize data to help assess and determine an overall level of risk to communities when conducting their threat assessment. By the end of this presentation, attendees will have a better understanding of how to effectively use OSINT techniques when conducting a DTA®, as well as how to use DTA® as a critical part of any modern-day threat assessment.

10:35am - 11:00am

Break

11:00am - 11:40am

Open Door

Looking Inwards - Leveraging OSINT in the protection of employees from Serious Threats

Presenter: Matt Lucas

 

This session focusses on how Corporate Security managers can utilise OSINT techniques to review and assess threats against employees who may be:


- Subject to domestic violence and/or harassment
- Targeted by fixated persons
- High risk targets for information elicitation and/coercion such as senior leaders and those with access
to highly sensitive information.

Closed Door

DROSINT: Drones & OSINT Capabilities

Presenter: Venessa Ninovic

Drones are like little computers in the sky, also referred to as an unmanned aerial vehicle (UAV). They provide live-streamed, real-time video and image capture, used for so much more than just great wedding photos and real estate imagery. With over 50,000 drones in Australia alone, you are bound to have a POI who has a vested interest, or is an owner, of a drone. So, you might wonder what are the OSINT tools available in this space (pun intended)? This talk will you provide you with insight on how to how to identify drones and their users with the current tools and techniques available for various countries worldwide.

11:45am - 12:25pm

Building and Enhancing an OSINT Team: Gaining Executive and Board Support

Presenter: Tara Dharnikota

Establishing and enhancing an Open Source Intelligence (OSINT) team within a large organisation can be a challenging. With numerous teams and business units competing for resources and attention, it is vital for an OSINT team to stand out and demonstrate its value to gain support from executives and board members.

This presentation will discuss the key aspects of building a successful OSINT team and the strategies to secure buy-in from decision-makers.

By attending this presentation, participants will gain valuable insights into building a successful OSINT team and securing the necessary support and resources from organisational leaders. They will be equipped with practical strategies to navigate the challenges faced by newly established OSINT teams and to maximise their impact within the organisation.

Application of OSINT in Cybercrime Investigations

Presenter: Cody Nagel

This presentation will showcase trending OSINT techniques and how they are or can be applied in cybercrime investigations as well as showing the power of data breaches and how no one is safe (online).

12:30pm - 1:10pm

Shrinking the World & Emerging Technologies

Presenter: Chris Poulter

 

This presentation will explore the effectiveness of private-public-partnerships (PPP) with open-source intelligence work & how technical methods for geo-based attribution of CSAM distributors in encrypted messaging apps are possible through a real case study. The talk will then focus on understanding emerging technologies such as Generative AI & the impacts it is having on intelligence work from concepts to reality.

Descent into a CAPTCHA rabbit hole

Presenter: Scott Anderson

 

Case Study of the OSINT and intelligence techniques used to identify the 23 victims and producer of a Georgian child exploitation studio modeling series.  This presentations highlights tools used to help locate the children and the importance of the open sharing of information in relation to the timely protection of children.

1:10pm - 2:00pm

Lunch

2:00pm - 2:40pm

The Intersection of HUMINT and OSINT in Modern Intelligence Gathering

Presenter: Jessica Stutzman

In this talk, we will delve deep into the realms of Human Intelligence (HUMINT) and Open Source Intelligence (OSINT) - two distinct but complementary methodologies in intelligence gathering. We will illuminate the unique and shared strengths of both methodologies, and how they synergize in the real-world practice of intelligence. The heart of this discussion lies in the fusion of HUMINT and OSINT, exploring how their integration can enhance the richness and effectiveness of intelligence operations. However, this fusion is not without challenges. Information overload, credibility of sources, and ethical considerations are just some of the hurdles to overcome in successfully integrating HUMINT and OSINT. Through the course of the talk, we will uncover ways to navigate these challenges and unlock the full potential of HUMINT and OSINT fusion in the ever-evolving landscape of intelligence gathering.

2:45pm - 3:25pm

3:30pm - 4:10pm

They're a 10 But They Don't Exist: Investigating Dating Apps with OSINT

Presenter: Jemma Ward

With more than 300 million users worldwide, dating applications are often a trove of personal information, as well as a hunting ground for scammers. Online dating platforms present both challenges and opportunities for open-source investigators. In this presentation, we’ll look at some of that tactics and techniques that OSINT practitioners can use to leverage dating apps for research and person of interest investigations, as well as some of the implications of dating app usage for privacy and operational security.

Behind the Screens: Harnessing OSINT to Identify Online Human Trafficking & Child Exploitation
Networks

Presenter: Alisa Gbiorczyk

The relentless transformation of the world into a digital landscape has given rise to an alarming trend: the escalating utilization of cyberspace to facilitate human trafficking and child sexual abuse material. This paradigm shift has been driven by new technologies, allowing traffickers and exploiters to adeptly adapt their operational strategies for the virtual realm. In this context, these criminals have
ingeniously integrated technology into their methods, harnessing digital platforms for purposes such as advertising, recruitment, and the exploitation of victims. This presentation serves as a crucial bridge to address this evolving landscape. As part of this presentation, participants will be immersed in an in-depth exploration of the skills, methods, and tools essential for conducting thorough and effective OSINT
investigations into human trafficking and human exploitation such as CSAM. Attendees will gain insight into the intricacies of navigating the virtual avenues where traffickers and smugglers conduct their illicit activities. This will equip participants with the proficiency to track and analyze digital footprints, uncover hidden trails, and decipher the digital patterns woven by these perpetrators. Moreover, the presentation will empower the audience with the knowledge needed to effectively combat these modern challenges. Participants will become adept at understanding the digital hallmarks of trafficking operations, including the telltale signs within online advertisements, recruitment schemes, and exploitative tactics. The
presentation’s focus on hands-on training with cutting-edge tools will foster an environment where attendees can acquire practical experience in unraveling complex digital networks.In essence, this presentation stands as a pivotal resource for anyone engaged in the fight against human trafficking and CSAM in the digital age. By bridging the gap between traditional investigative methods and the evolving
landscape of cybercrime, participants will emerge with the skills and confidence to navigate the intricate nexus between technology and criminality. In an era where cyberspace has become a dark playground for
 perpetrators, this presentation serves as a beacon of light, illuminating the path toward effective cyber investigations and a safer world for all.

4:10pm - 5:00pm

Afternoon Tea

5:00pm - 7:00pm

Networking Function - Marble Bar

Day 2

Wednesday, 13th September 2023
9:00am - 4:30pm AEST

9:00am

Welcome and Opening Address

9:10am - 9:50am

Finding Content Online in a Foreign Language

Presenter: Skip Schiphorst

This session will present a search model which can be used when researching online content in a foreign language.

9:55am - 10:35am

Human Trafficking: A Tech-Facilitated Global Epidemic

Presenter: Julie Jones

Human Trafficking is a serious crime and a grave violation of human rights. While the subject is gaining more attention as a global epidemic, a lack of cross-jurisdictional cooperation regionally and between nations, compounded by limited knowledge, corruption, and a lack of resources, has meant that the links between smuggling, illicit migration, human trafficking, organized crime and money laundering, has not been recognized or prioritized in many parts of the world.

 

These complex crimes are carried out in many cases by transnational criminal organizations with the participation of corrupt officials, and increasingly through the use of the internet to lure and

exploit victims.

 

This presentation will explain known modalities of human trafficking, along with recruitment and exploitation methods used by local, national, and international organized crime groups, and address the often-ignored topics of consent, coercion and the manipulation of society’s most vulnerable victims.

10:35am - 11:00am

11:00am - 11:40am

Break

Open Door

Great pay, safe work, no human trafficking

Presenter: Jack Kerr

How OSINT revealed the link between a Champions League winner and a suspected Cambodian cyber slavery compound. 

 

In this presentation, investigative journalist Jack Kerr will show how OSINT was key to uncovering the story behind 8XBet, the highly secretive betting partner of the Manchester City football club. 

 

Using cyber and social media intelligence, the company’s trail could be followed from Northern England to the UAE - and then to a Cambodian bordertown full of “cyber slavery” compounds, where workers trapped behind razor wire are forced to fleece unsuspecting victims on an industrial scale. 

 

The investigation was undertaken as part of a project which won this year’s European Centre for Press and Media Freedom IJ4EU Impact Award, the continent’s biggest prize for cross-border investigative journalism collaborations.

Closed Door

Using OSINT to understand China's offshore interests and activities 

Presenter: Emerald Sage

International relations with China are exceedingly complex - our global economy relies on ties with a strong and productive China, while our collective cultural heritage owes much to indigenous Chinese philosophies and history. However, the Chinese Government is using a variety of entities to overtly and covertly pursue global influence, often displacing US alliances and confronting the US and its allies over divergent interests. It is critical that we identify key organisations and individuals pursuing Chinese foreign policy objectives, to the detriment of western interests and assets. OSINT can help us make informed assessments, so we can know why a Chinese entity is pursuing access to a particular asset or organisation and evaluate the associated security and business implications. 

11:45am - 12:25pm

Analysing vectors of PRC external activity

Presenter: Alex Joske

The Chinese Government’s global footprint goes far beyond traditional forms of diplomacy or intelligence activity. This talk will introduce the vectors of external activity used by the Chinese Government, using illustrative examples of united front work in Australia and our region. It will explain the different forms of activity and bureaucratic systems of the Chinese Government in the context of open-source research and analysis. This “systems” approach is essential for guiding research and preparing analysis on China’s external influence.

Presenter: Lantern Rescue

Human trafficking is a global issue often intermingled with other forms of organized crime. Working as a network, traffickers exploit vulnerable populations through force, fraud, and coercion to make a profit. For the traffickers in this case study, a transnational ring created a system that exploited Colombian and Venezuelan women in the Dominican Republic for commercial sex. Using OSINT, undercover operations, and Lantern’s four-step process, the vast capacity of this ring, along with others, has been uncovered. With 17 traffickers prosecuted and another case currently under investigation, the Co-founder of Lantern Rescue along with lead operators will share the processes used to combat this growing problem through the Counter Human Trafficking Joint Task Force.  

12:30pm - 1:10pm

Beyond the Algorithm: The Human Touch in Effective Risk Assessment and Supply Chain Analysis

Presenter: Beau Jose and Jessica Skinner

 

Jessica will share the stage with co-presenter Beau Jose to delve into critical subjects, such as supply chain vulnerabilities and tailored risk assessments. The focal point of their presentation will be the indispensable role that a traditional analyst plays within the complex landscapes of both governmental and industry spheres. Through real-world case studies, they will discuss the enduring necessity for human analysis in an evolving technological and data-driven assessment landscape, reinforcing the value of expertise honed through practical experience.  Beau will explore supply chain vulnerabilities and tailored risk assessments. Their presentation outlines the essential role of a comprehensive approach to supply chain assurance, anchored by ISO 28000:2007.

Anyone can OSINT – An overview of the MBIE Intelligence (New Zealand) journey

Presenter: Amy Turner

A brief overview of the recently founded Open Source Intelligence Team and OSINT practice of the Ministry of Business, Innovation, and Employment’s Intelligence team. This session features some case study examples, tools, and techniques used by MBIE Intelligence’s OSINT analysts and researchers. It will also cover challenges, innovation and skill transfer.

1:10pm - 2:00pm

Lunch

2:00pm - 2:40pm

The Power and Pitfalls of Open Source Intelligence Analysis 

Presenter: Dallas Knight

2:45pm - 3:25pm

Hiding While Watching: Managed Attribution for Everyone 

Presenter: Cynthia Hetherington

Working with care, learn to keep your footprint at a minimum while you cyber surveil, check in on or research sensitive targets. The OSINT’er approach to managing security must be tightened down, but not overthought.

3:30pm - 4:10pm

Setting the Bar: Leveraging traditional intelligence practices to optimise OSINT

Presenter: Kylie Pert

Being an OSINT analyst is compelling. Delving into vast digital landscapes, scrupulously scouring online sources, and piecing together information like a detective to uncover hidden patterns for actionable intelligence. But being an OSINT analyst is also inherently challenging, and can be a thankless task. You need to draw accurate conclusions and reliable insights while working with:
 

  • large amounts of data that require scrutiny and analysis

  • rapidly evolving technologies (and ensure you’re staying ahead of your adversary)

  • potentially biased information and dis/misinformation.


And all under the pressure of short timelines. So how can OSINT practitioners ensure they consistently provide meaningful and actionable insights for decision-makers?

This session will show you how to focus information collection and improve source evaluation to strengthen analysis and insigh
ts. You’ll walk away with an understanding of how to:

  • apply traditional intelligence standards and practices to OSINT

  • blend time-tested methodologies with modern digital information gathering

  • pick the tools, techniques and strategies available to you

  • improve intelligence outcomes by advocating for the use of structured analytical techniques.


Join Kylie to discover how combining the best of both worlds can set a new benchmark for conducting OSINT in today’s dynamic information landscape.

4:10pm - 5:00pm

Afternoon Tea

Day 3

Thursday, 14th September 2023
9:00am - 4:30pm AEST
VIRTUAL ONLY

OSINT in the Shifting Digital Terrain

 

Join OSINT Combine’s Training and Tradecraft Team virtually for a day of Open-Source Intelligence (OSINT) training. Ideal for investigators and analysts at all experience levels, this workshop delves into the evolving challenges of the online environment, providing practical methodologies for the collection and analysis of open-source information.


We’ll start with an in-depth understanding and application of appropriate tradecraft to minimise the risk of online attribution. Our journey then moves onto an investigation of various social media platforms, highlighting OSINT collection opportunities and addressing issues like API restrictions and anti-scraping measures.


The day also incorporates hands-on practical scenarios, offering demonstrations and opportunities for you to apply new tools and methods in a real-world context. And, in the context of the evolution of OSINT, we'll look into the influence of Generative AI, assessing the opportunities it creates and the potential hurdles it may present.


Our session concludes with an exploration of Structured Analytical Techniques, designed to help you efficiently organise and analyse the information we've collected.


Don't miss this chance to elevate your OSINT skills. Register today and step confidently into the shifting terrain of open-source intelligence.

Our Trainers

Jake_edited.jpg

Jacob Hunter

Head of Training and Tradecraft - OSINT Combine

0165_X1A9172web (1).jpg

Jemma Ward

Senior OSINT Specialist - OSINT Combine

0068_X1A9010web.jpg

Kylie Pert

Senior Intelligence Specialist, Training and Tradecraft - OSINT Combine

ShiftingDigitalTerrain
bottom of page