top of page

Linux for OSINT Investigations

​

 

​​​This course teaches specialists in the fields of investigation, security and analysis practical techniques for the effective use of Linux distributions in OSINT investigations. Participants learn how to search publicly available data sources automatically, analyse relevant information and document the results in a legally compliant manner. Particular emphasis is placed on the use of specialised Python tools to make OSINT research more efficient, structured and comprehensive.

 

In practical exercises, participants apply their knowledge directly. They install and configure OSINT tools, automate data queries and analyse digital traces using realistic scenarios.

​

​

Agenda

​

Introduction to Linux for Open Source Intelligence (OSINT)

  • Why Linux for OSINT? Advantages over Windows and macOS

  • Recommended Linux distributions

  • Legal, ethical and security considerations

 

Linux basics

  • Installing and configuring Linux distributions

  • Setting up Linux as an investigation platform

  • System hardening

  • Working with the command line

  • Navigating the Linux file system

  • Access rights and security aspects

 

OSINT techniques

  • Effective search strategies – methods for efficiently searching for and verifying information

  • Identifying and applying OSINT tools and scripts – selecting and using specialised tools for different investigation purposes

  • Person and company research – identifying and linking information from open sources

  • Username and profile research – analysing and linking online identities across different platforms

  • Email and phone number analysis – reverse search, identity verification and linking with other data sources

  • Website analysis and metadata extraction – technical investigation of websites and collection of relevant information

  • Social media intelligence (SOCMINT) – evaluation of social media profiles and networks for information gathering

  • Data leaks and compromised information (breached data) – identification and analysis of sensitive data that has been made public

  • Darknet and deep web research – identification, evaluation and investigation of content outside the clear web

  • Network and infrastructure analysis – investigation of IP addresses, domains and server structures

  • Geolocalisation and digital trace analysis – location determination and tracking of digital activities

  • Image and video analysis – geolocalisation, metadata checking and verification of the authenticity of visual media

  • Automated OSINT processes – web scraping, data extraction and structured processing for more efficient research

  • Data visualisation and link analysis – presentation of complex relationships with specialised analysis tools

​​

Security and anonymity in digital investigations

  • Secure use of VPNs, proxies and Tor

  • Dealing with digital traces and metadata

  • Encryption and secure communication

  • Data protection

​​

​​

Information

​

Duration: 3 days

​

Course location: At the client's premises or at the premises of Baumgartner Research GmbH, Löwenstrasse 2, 8001 Zurich.

​

Number of participants: Max. 15 persons, Min. 5 persons

​

Price: CHF 1'500 per person

​

Language of instruction: English or German

​

​​​

How You Benefit

​

After completing this course, participants will confidently use Linux as a research platform, deploying specialized OSINT tools, scripting automated queries, and extracting intelligence from multiple open data sources. They will enhance their ability to conduct anonymized, legally compliant investigations while improving data processing efficiency.

​​​

​​​​​​​

​​​Instructor

​

The course is led by Yves Baumgartner. He has over 19 years of experience as a researcher and investigator for public institutions and private clients. As an adviser with i-intelligence, he has taught investigative skills to security, defence and law enforcement professionals and is a regular lecturer on the use of OSINT to counter terrorism, extremism and organised crime.

​

​

​

bottom of page