Updated: May 11, 2020
A recent survey of 338 Cyber Threat Intelligence analysts and practitioners highlighted a prevalent lack of Open-Source Intelligence (OSINT) training in the Cyber Threat Intelligence sector. 85% of participants in the survey reported that they received little or no training in OSINT techniques and risk prevention from their current employer; This is something that I believe may extend beyond Cyber Threat Intelligence, to a number of industries that rely on internet investigations. The participants in the study demonstrated through their further responses to the survey that this lack of training has resulted in poor standards of practice that could potentially result in direct harm to their organisation. OSINT training is a worthwhile investment for any company that has staff conducting any type of investigations online. As an OSINT trainer, I'm inherently biased. However, as an active OSINT practitioner, I recognise the need for OSINT training, not just to impart good techniques but also to educate practitioners in good practice.
Open-Source research and investigation is a powerful tool against crime and bad actors. However, improper use of the internet for research and investigative activity presents risks to staff, active and future investigations, and organisational hardware, as well as inviting potential legal and reputational risk to the organisation o