Research. Analyze. Decide.

Delivering trustworthy, relied upon Open Source Intelligence (OSINT) products, training, and technology that give our clients a competitive advantage.

3165

Professionals Trained

710

Hours of Curriculum

1012

Products Delivered

What is OSINT?

When open source information (also called publicly available information) is validated as relevant, accurate, and actionable for use by consumers, it is then considered OSINT.  This process begins by methodically gathering information from public sources and the deep and dark web.  Open source information can be gathered from the internet, social media, in books, images, videos and anywhere else information is available to the public.  Additional sources of OSINT can be information obtained during a public webinar, at a public speech, or during a conference.

Why do I need OSINT?

Open Source Intelligence (OSINT) is used for a number of reasons by businesses today due to the explosive growth of the internet and social media.  Organizations are typically using OSINT teams to assist with their hiring process, to protect their executive teams, asses the vulnerability of information available on the internet to hackers and competitors, to protect their assets, to monitor and respond to security threats, manage third party risk, and to be alerted in the event sensitive information is leaked.

Why Echo Analytics Group?

Echo Analytics Group has been providing OSINT services for over ten years.  Whether you need OSINT products, training, or technology, we’ve got you covered. Our carefully screened analysts are armed with dozens of advanced analytics tools, data mining software, and our field tested OSINT research and analysis methodology to achieve one goal – prepare you for what comes next!

Our Commitment to You

WE CARE. We will conduct ourselves with honesty, integrity and transparency and treat you with respect.

WE LISTEN.  We will invest the time to learn about you, your experiences, and your needs.

WE ENGAGE. We communicate early and often to ensure you and your team members are always kept informed.

WE DELIVER. We build legally compliant and innovative products that support your goals.

OSINT Products

Your team of experts at Echo Analytics Group build custom products that protect and enhance your operations, enabling you to identify opportunities while reducing risk. These products are purpose-built and customized to meet your business needs. Contact us today to learn more.

Background Research

Our comprehensive line of background research products are ideal for businesses looking to make smart hiring and resource allocation decisions.  Leveraging dozens of  public and proprietary data sets, these products deliver a complete and comprehensive understanding of exactly who you are dealing with.

Risk Monitoring

Our media monitoring specialists, content analysts, and internet researchers can identify issues early and monitor threats for significant changes or escalation, enabling you to build a more tailored approach to security.

Due Diligence

Our team of  professionals will help you uncover the social, criminal, and financial risks that might threaten your business as you plan for the next big move.  Our due diligence products deliver information that protects your organization and uncovers hidden risk in people and business relationships.

OSINT Consulting

Safeguarding proprietary data is a critical component of conducting business in the digital era. We work with clients to create a social risk framework — outlining business objectives, assessing risk, defining tolerance levels, and prioritizing gaps.

Companies Who Trust Echo Analytics Group

Purpose-Built OSINT Research and Analysis Training

Master the Discover, Develop and Monitor (D2M) methodology and bring the skills and knowledge of our cutting-edge, field-tested OSINT research and analysis methodology back to your colleagues. We offer a range of online and in-person courses that are purpose-built for intelligence and security professionals. Get certified through one of our training programs and take your career to the next level!

Student Testimonials

Great course and extremely relevant” – USASOC Student

“The instructors were clearly chosen because of their vast knowledge and experience.  That makes a big difference to me.” Course 1810 Student

“What EAG taught us was priceless” – Student, 5th SFG

“I was just packing up in Rio de Janeiro, where I worked the security detail of a foreign sports team.  The use of D2M to gain operational information was a great success.  In September, I am off to South Sudan and can’t wait to use D2M again!” CEO, Security Firm.

“It was awesome to finally get training from folks who are clearly on the leading edge of this new discipline” – Senior Analyst, JP Morgan

“What EAG taught us was priceless” – Student, 5th SFG

“What EAG taught us was priceless” – Student, 5th SFG

“Instructor performance, very engaging, insightful, knowledgeable, and a great background to give students real-world accounts” -USASOC Student

“Useful beyond measure!  Knowing multiple approaches to finding the desired information is great!!” – Air Force Student

“The tool-agnostic approach is so much different from what I am used too.  This really adds value.”  Course 1806 Student

“The tools we learned and applied to real-world problems are so helpful, and to do so with methodology makes all the difference.” Course 1802 Student

“I loved learning all of the SM tools, their capabilities, and their uses.  I can use any tool now as part of the D2M methodology.” Course 1709 Student

“All of the tools we learned applied to the final exercise, which we chose for ourselves.  Real-life practical exercises were effective.” Course 1709 Student

“Our instructors were great – they teach on the level and in a way that makes it easy to learn and remember.”  Course 1806 Student

Who Should Attend Our Courses?

  • OSINT Analysts
  • Social Media Analysts
  • Fact Checkers
  • Law Enforcement
  • Journalists
  • Research Professionals

Five Open Source Intelligence Certification Tracks

Open Source Information Analyst

Learn More

Open Source Collection Technician

Learn More

Open Source Media Forensics Specialist

Coming Soon

Open Source Collection Manager

Coming Soon

Open Source Intelligence Team Manager

Learn More

Sign up for free now in the menu bar at the top of this page under the CID tab.

Introducing CID

A purpose-built online content research & analysis dashboard designed to leverage endless data sets and open source analytical tools & resources.

Easily customizable research workflows enable users to build, modify, and access data and tool sets for any research project.

C.I.D. OVERVIEW:

  • Access 1000+ freeware tools and data sets in ONE LOCATION
  • Adaptable to industry & role
  • Customize up to 20 task-specific tool-set groups
  • Safe & secure AWS protection
  • FREE access when enrolled in an Echo Academy Course

More ways to Connect with Echo Analytics Group

Latest Insights

User-Agents (UA)

Every user makes use of different browsers or devices in accessing web services. Also, once connected, you are more likely to notice different looks for the same website under different browsers. Once a browser directs a request to a web service, the browser recognizes itself through the user agent string attached before retrieving the necessary […]

Internet Protocol (IP) Address

Every system connected to a network features a unique identifier. And similar to addressing letters sent via mail, computers employ a unique identifier in communicating data to other computers on a similar network. Nowadays, most networks, comprising of internet-connected computers, make use of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol as a standard for network […]

Forming A Research Question

The development of robust research questions is essential in guiding open-source information gathering efforts. Most information requests require focused thought and problem-solving to properly begin a disciplined approach to satisfying the requirement. With this in mind, it becomes essential to get intricate when forming a research question, and for businesses conducting open-source research for their […]