Course

Operational OSINT Fundamentals

Workshops
Self-paced
Online
Accredited

Tools Go Down. Tradecraft Does Not.

This Operational OSINT Fundamentals course delivers 12 modules of accredited OSINT training.

Not a tools walkthrough.

Not a weekend tutorial.

A structured OSINT Training programme built and taught by a Bronze Star-decorated SOCOM OSINT Instructor who has operated in the environments he teaches.

Here Is the Problem with Most OSINT Training

Most OSINT Training programmes are selling you a tool list disguised as tradecraft. They teach you which buttons to click. Then the platform updates its API, the scraper breaks, and everything you learned becomes obsolete.

You walk away with screenshots of interfaces that already look different. A certificate that says you attended. And no ability to explain to a:

Judge, a commander, or a boardroom why you believe what you believe.

Here is what we see constantly:

  • Analysts who cannot verify a single piece of content through a structured workflow. Their method is “I Googled it and it seemed right.”
  • Reports that describe what was found but never what it means.
    • No confidence levels.
    • No estimative language.
    • No decision support.
  • Zero OPSEC discipline.
    • No managed attribution.
    • No understanding of how platforms collect on the analyst while the analyst collects on the target.
  • No legal or ethical framework.
    • No awareness of GDPR, CFAA, or ECHR Article 8.
    • No understanding that publicly accessible does not always mean fair game.

This is not a skills gap. It is a tradecraft gap. And no amount of tool tutorials will close it.

“OSINT doesn’t fail because information is wrong. It fails because reasoning is sloppy.”

What This Operational OSINT Training Actually Teaches

This course does not start with tools. It starts with thinking.

Across 12 modules, you build a structured OSINT capability from the ground up. How to plan collection. How to verify content. How to operate safely online. How to navigate legal and ethical constraints. How to write intelligence that changes decisions. And how to do all of it in a way that survives scrutiny from people who were not in the room when you produced it.

What separates this from every other OSINT Fundamentals on the market:

  • It builds method, not dependency. You will learn to think through problems, not memorise tool interfaces that change every quarter.
  • It covers military, law enforcement, and corporate OSINT applications in one programme. Three domains. One tradecraft standard. You learn the discipline once, then apply it everywhere.
  • It is taught by someone who has used OSINT operationally in combat zones, trained special operations personnel, and now leads intelligence training at the only fully online university-accredited intelligence school in the world.
  • It includes a full capstone simulation. Not a multiple-choice quiz. A real operational exercise where you plan, collect, verify, analyse, document, and report under realistic conditions.
  • It treats law, ethics, and OPSEC as core modules, not afterthoughts. Because capability without accountability is risk.

“Two analysts can use the same tools and produce completely different outcomes.”

This Operational OSINT Fundamentals Course Was Built for You If

  • You work in intelligence, law enforcement, corporate security, compliance, or risk, and you need structured OSINT tradecraft. Not another tools demo.
  • You are a military or government analyst who needs to integrate OSINT into F3EAD targeting cycles and live operations.
  • You are a journalist, researcher, or investigator whose current method is search and hope. You know that will not hold up.
  • You are transitioning from classified intelligence work and want a portable, accredited skillset that translates to the private sector.
  • You are a due diligence, compliance, or fraud analyst who needs to defend your methodology to regulators, courts, or clients.
  • You have taken an OSINT before and walked away knowing tools but not tradecraft.
  • You manage an intelligence or security team and need a structured training pathway that produces analysts who can operate independently.

This is not for people looking for a weekend tutorial, a list of free tools, or a certificate that requires no effort. The capstone alone will test everything you have learned.

The 12 Modules

Module 1: Origins and Fundamentals of OSINT

Where OSINT came from. What it actually is. What it is not. The difference between publicly available information and intelligence. The equation that defines the discipline: RFI + PAI = OSINT.

Module 2: The Internet and the Information Battlespace

The internet as contested terrain. Not a library. Undersea cables, data centres, digital chokepoints. Surface web, deep web, dark web. How infrastructure shapes what you can see and what is deliberately hidden. Metadata and your digital shadow. Managed attribution.

Module 3: Research Tradecraft, Tools and Critical Thinking

The analytical brain behind the tools. Tradecraft defined as method, judgment, and restraint. Cognitive biases. Structured analytical techniques. Collection planning. Boolean mastery and Google dorking. Public records. People search.

Module 4: Social Media and Persona Intelligence (SOCMINT)

Social media as behavioural analysis. Not scrolling feeds. Platform-specific collection across X, Facebook, Instagram, Telegram, TikTok, LinkedIn, VK, and Reddit. Persona profiling. Username pivoting. Network mapping. Temporal and behavioural patterns.

Module 5: Verification, Geolocation and Chronolocation

Verification as a step-by-step workflow: capture, preservation, metadata extraction, provenance, geolocation, chronolocation, corroboration, analytic judgment. ExifTool, Google Earth Pro, SunCalc, reverse image search.

Module 6: Law, Ethics and Operational Security

GDPR, CFAA, ECHR Article 8, platform Terms of Service. Why publicly accessible does not always mean fair game. Ethical frameworks: necessity, proportionality, accountability. Applied OPSEC: VMs, managed attribution, sock-puppet lifecycle, secure communications.

Module 7: Dark Web, Cyber Threat Intelligence and Commercial Data

Non-indexed internet spaces. Tor architecture. Dark web intelligence use cases. Cyber threat intelligence: indicators of compromise, MITRE ATT&CK. AdTech and ADINT: how ad technology, data brokers, and commercial telemetry create intelligence without surveillance.

Module 8: Applied OSINT: Military, Law Enforcement, Business

One discipline. Three missions. Different stakes. Military OSINT within F3EAD. Law enforcement for intelligence-led policing and evidentiary standards. Business intelligence for due diligence, supply chain risk, corporate structure analysis.

Module 9: Live Collection, Corporate-to-SOCMINT Exploitation

A structured OSINT workflow from corporate footprint to individual targeting. Website exploitation, DNS and WHOIS, identity pivoting, SOCMINT entry, network mapping, behavioural patterns.

Module 10: Analysis, Report Writing and Dissemination

Where OSINT either becomes intelligence or stops. BLUF principle. Estimative language. Confidence levels. Report structures: spot reports, SITREPs, assessments. Tailoring analysis for different audiences.

Module 11: The Future of OSINT: AI, Automation, Synthetic Media

AI in the kill chain. Deepfake detection. LLMs in intelligence workflows. Counter-OSINT and adversarial AI. Predictive analytics. The policy and legal landscape forming around AI in intelligence.

Module 12: Capstone Examination and Operational Simulation

Full-spectrum operational simulation. Select a real-world business. Conduct a complete OSINT investigation supporting HUMINT, SIGINT, and GEOINT. 50-question examination. Vignette-based exercise. Produce a structured intelligence brief with BLUF, evidence, confidence statements, and ethical awareness.

After This OSINT Training, You Will Be Able To

  • Plan and execute structured OSINT collection operations with a documented, repeatable methodology that survives audit.
  • Verify content using a step-by-step workflow: metadata, geolocation, chronolocation, corroboration, and structured analytic judgment.
  • Conduct SOCMINT across major platforms with persona profiling, network mapping, and behavioural analysis.
  • Navigate the legal landscape across jurisdictions: GDPR, CFAA, ECHR Article 8 compliance.
  • Apply structured analytical techniques to reduce cognitive bias and produce defensible assessments.
  • Operate safely online using managed attribution, VMs, sock-puppet lifecycle management, and professional OPSEC.
  • Write intelligence products using BLUF structure, estimative language, confidence levels, and audience-tailored delivery.
  • Integrate OSINT into F3EAD targeting cycles, law enforcement investigations, and corporate due diligence.
  • Exploit corporate digital footprints from website scraping through DNS to individual SOCMINT targeting.
  • Evaluate AI, automation, and synthetic media threats to open-source integrity.

Grey Dynamics has been cited by West Point’s CTC Sentinel, AEI’s Critical Threats Project, CBS News, US Congress, UK House of Commons and more.

We have been producing intelligence for governments, private clients, and the public since 2017.

Still have questions? Contact school@greydynamics.com.

Instructors

Gabriel Fanelli

Director of Training

Gabriel Fanelli is the new Director of Training at Grey Dynamics.A decorated Bronze Star recipient and Subject Matter Expert (SME) with 14 years in the Department of Defence and Intelligence Community. Gabriel is an expert in Open-Source Intelligence (OSINT) and Signals Intelligence (SIGINT). He served as a Tactical SIGINT Operator for the 3rd Special Forces Group.He is a SOCOM OSINT Instructor and brings extensive real-world operational experience from multiple deployments to Africa and the Middle East. He is a cultural advisor and fluent in Arabic, holding a Top Secret/SCI clearance with a Counterintelligence Polygraph.

Contact

Have further questions? Feel free to email us at school@greydynamics.com.

Course information
Start 21 April
Duration 25 Hours
Certification Yes
Cohort Closes 5th of May

Students also bought

Intelligence Dissemination Fundamentals
Once intelligence analysts finalize their product, they must ensure it reaches the right customers. Intelligence Dissemination can be challenging, especially with a large customer base. For a smaller audience, comprehension often requires briefing. This course tackles the complexities of getting intelligence into the hands of those who need it most.
Intelligence Processing Fundamentals
Having grasped how intelligence is collected, let’s shift gears to Intelligence Processing. This crucial stage bridges the gap between raw data and actionable intelligence. Imagine a farmer sifting through a harvest – processing separates the valuable wheat from the chaff of irrelevant information.
Intelligence Analysis Fundamentals
Now that information has been collected and processed, it’s time to use it to answer the intelligence customer’s requirements and the critical thinking stage: Intelligence Analysis. This course focuses on the basics of intelligence analysis and serves as an introduction for the more in-depth courses on analysis.
Human Intelligence (HUMINT) Fundamentals
Welcome to the world of Human Intelligence (HUMINT), the art and science of collecting intelligence through human sources. This course unveils the tradecraft, psychology, and ethical frameworks that intelligence professionals use to recruit, handle, and leverage human sources effectively.

Frequently asked questions

We offer different payment options that offer payment-plans like Klarna, Afterpay and Paypal.

For general inquiries, you can email school@greydynamics.com.

For privacy and accessibility issues please email privacy@greydynamics.com or accessibility@greydynamics.com as appropriate.

Intelligence work is extremely broad and each case is different. Intelligence work ranges from normal office work to physically and mentally demanding activity.

Some roles, particularly those in the military or law enforcement, have physical requirements that are required by the institution rather than the role itself.

Additionally, some workplaces are better able to meet accessibility requirements than others. We recommend potential learners search for the specific roles or organisations that interest them and check those organisations’ requirements and accessibility policies before committing to our course.

Be aware that many organisations accommodate audio or visual impairment in some roles, but not all organisations or governments globally are required by law to make reasonable accommodations. 

We encourage feedback about the course. We integrated a feedback form into the course at the end in which learners can rate their experience and provide comments and recommendations.

If there are any technical issues with accessing the feedback form, please contact accessibility@greydynamics.com.

The simple answer is: No!
You do not need training or schooling in intelligence before starting our courses.

Yes! Our courses are all accredited by the University of Salford in the United Kingdom.

However, we do not offer university credit at this time.

Log in

Stay in the loop

Join thousands of people receiving ground truth based reports that affect their business, investments and personal life.

Contact

Contact

"*" indicates required fields

This field is for validation purposes and should be left unchanged.