ECHO ACADEMY
Pioneers in OSINT Training
The Echo Academy exists to create new and exciting pathways for you to increase your success as an open-source intelligence professional.
This course is designed for the Civil Affairs and PSYOP community. During this course, students will explore all the technical components associated with hardware, software, social media platforms, and open-source tools. This course has an emphasis on critical thinking and decreasing cognitive bias to gain an objective view of the research topic. Additional emphasis is placed on managing digital signatures to decrease organization and personal risk. Through the Fundamentals of Open-Source Research and Analysis Course students will gain a firm understanding of what is needed to plan and efficiently collect data to answer well defined research questions.
This Advanced PAI Research and Analysis Course is design to reinforce of the PAI methodologies learned during the Fundamentals of Open-Source Research and Analysis Course. During this course, students will exercise critical thinking and be provided with a basic overview of social media platforms, the psychology of social media, social media tools and services and a practical application of the Discover, Develop, Monitor (D2M™) methodology. The course focuses students on developing an area of interest using specific PAI tools alongside a methodical workflow. Students will conduct advanced application of D2M, predictive analysis, scenario development, and identification of indicators and warnings within the context of real-world research requirements.
This is a replica course of the Fundamentals of Open-Source Research and Analysis course designed for commercial or non-government attendees. During this course, students will explore all the technical components associated with hardware, software, social media platforms, and open-source tools. Students will gain an understanding of what is needed to produce open-source intelligence while engaging critical thinking and decreasing cognitive bias to gain an objective view of a specified research requirement. Additional emphasis is placed on managing digital signatures to decrease organization and personal risk. Through this course, Foundations of Open-Source Intelligence, students will gain a firm understanding of what is needed to build perspective, establish a process, and ultimately produce open-source intelligence.
This course focuses on the application of open-source research principles through multiple practical exercises. Student will be armed with the ability to assess the online Information Environment (IE) accurately, rapidly, and with effectiveness using perspectives based Publicly Available Information (PAI) research methods. Students will engage in advanced discussions on open-source research principles and workflows to help establish a deeper understanding of how to produce open-source intelligence.
During this course students will be introduced to critical thinking analysis techniques using the Discover, Develop, Monitor (D2M™) methodology through. Students will receive a basic overview of social media platforms and publicly available information. As the foundation for learning the advanced application of D2M™, student will be introduced to predictive analysis concepts and scenario development. Students will learn the basic procedures for setting up their computers and internet browsers, including information on how to mask their digital identities. The course also provides real-world examples and case studies to encourage students to use creative and critical thinking skills.
During this course, students will explore all the technical components and applications associated with hardware, software, social media platforms, and open-source tools. This course has an emphasis on objective, risk, threat, and requirements. Students will navigate through ethics, legalities, internet, web, digital footprint, signature management, harvesting, and cleaning data techniques. Upon completion, students will gain a firm understanding of what is needed to plan and efficiently collect data to fulfill requirements and to perform duties as an OSCT effectively.
This course explores how social media is utilized by approximately 3.8 billion people worldwide, which is close to half of the world’s population. Students will learn about components associated with top social media platforms and how to optimize security and privacy settings related to those platforms, as well as the devices used to access social media content. Students will be introduced to the Discover, Develop, Monitor (D2M™) methodology to identify threats and monitor a child’s online activity to ensure safe internet and social media use.
Get Overwatch delivered directly to your inbox every Tuesday & Thursday at 9am EST.