Hurry! This special Offer is Selling Out Fast!

Secure Your Spot Now!

Enroll in any board certification and SAVE 50% OFF and get a Free Diploma Package (Value: $199) & Live Instructor Support (Value $2400). Disclaimer: Scholarship Offers are valid only on new self-funded enrollments. Cannot be combined with other discounts or applied to past purchases. Not valid with military credentialing assistance or business purchases.

4,515,188

Students from Around the Globe.

75,897

Certified Professionals.

4,899

Organizations & Agencies.

Download the Syllabus Now

Dive deep into our curriculum by downloading the full course syllabus. Discover the specific topics covered, the skills you'll gain, and how this program aligns with your professional goals. Our detailed syllabus provides insights into learning objectives, real-world applications, and the exclusive resources we offer to ensure your success. Start shaping your future today!

Trusted by Global Authorities:

Accredited, Certified, and Recognized

The McAfee Institute stands at the pinnacle of excellence, recognized and accredited by leading government organizations and agencies worldwide. Our certifications are not just badges of honor; they represent a commitment to the highest standards in law enforcement, intelligence, and investigative training.

Why It Matters:

For professionals in law enforcement, intelligence, and investigations, credibility is paramount. Our affiliations ensure that our programs are rigorously vetted and meet the stringent standards set by top-tier agencies. By choosing McAfee Institute, you are aligning yourself with a globally respected institution that empowers you with the skills and knowledge recognized by the most trusted authorities in the field.
Testimonials

Hear from REAL students

5.00
Timothy B
Private Investigations
5.00
Kristin S.
5.00
Nicholas T.
5.00
James H.
5.00
Timothy B
Private Investigations
5.00
Kristin S.
5.00
Nicholas T.
5.00
James H.
5.00
Theodore S.
Deputy Sheriff
5.00
Nigel R.
5.00
Katlyn S.
5.00
Theodore S.
Deputy Sheriff
5.00
Nigel R.
5.00
Katlyn S.
5.00
Ateeb M.
5.00
Michael M.
5.00
Katlyn S.
5.00
Ateeb M.
5.00
Michael M.
5.00
Katlyn S.
5.00
Timothy B
Private Investigations
5.00
Theodore S.
Deputy Sheriff
5.00
Ateeb M.
5.00
Kristin S.
5.00
Nigel R.
5.00
Michael M.
5.00
Nicholas T.
5.00
Katlyn S.
5.00
Katlyn S.
5.00
James H.
What to know about

The Certification Process

1

Choose your Program

Identify the program you wish to attend. Review the eligblity requirements and curriculum to ensure you qualify and it meets your expecations for learnings.

2

Register for the Program

Choose the certification program you wish to attend and register above.

Certified Organized Retail Crime Investigator (CORCI) - McAfee Institute
3

Attend the Training

Attend and complete the official training program which consist of videos, labs, research assignments, prep review quizzes, and discussions.

4

Sit for the Exam

Sit for the board exam which is online and proctored. The exam is up to 200 questions and is multiple choice, true/false and situational based questions.

Certified Organized Retail Crime Investigator (CORCI) - McAfee Institute
5

Earn your Credentials

Upon successfully passing the exam and eligiblity check you will earn your board certification and credentials to put behind your name.

6

Maintain your Credentials

Your certification is renewed every 2 years. The cose is $125 every two years and you have to earn CPE credits to renew them.

Visit CPE Policy
Certified Organized Retail Crime Investigator (CORCI) - McAfee Institute
Certified Organized Retail Crime Investigator (CORCI) - McAfee Institute

Open Source Intelligence (OSINT): Essential Guide for Intelligence, Investigations, and Law Enforcement

What is Open-Source Intelligence? Open-Source Intelligence (OSINT) is intelligence produced by collecting, evaluating, and analyzing publicly available information to answer specific intelligence questions. It transforms raw data into actionable intelligence by providing context and analysis.

Information vs. Intelligence It's crucial to distinguish between raw data and processed intelligence. Raw data becomes valuable intelligence only after it is critically analyzed and contextualized. For instance, merely collecting a person's Facebook friends list is not OSINT. The real value lies in interpreting this data to provide meaningful insights relevant to an investigation or intelligence question.

Learn More About OSINT at McAfee Institute

Enroll in our Certified OSINT Professional (C|OSINT) program to gain in-depth knowledge and practical skills in open-source intelligence. Our certification equips you with the tools and techniques to excel in intelligence gathering and analysis, making you a valuable asset in any field requiring detailed and actionable intelligence.

What is Open-Source Intelligence (OSINT)?

Understanding Open-Source Intelligence (OSINT)

What is OSINT? Open-Source Intelligence, commonly referred to as OSINT, is a form of intelligence that's gathered from publicly available sources. This can include the internet, media, public government data, professional and academic publications, and more.

The Process of OSINT The essence of OSINT lies not just in collecting information, but in the thoughtful analysis and evaluation of that data to produce useful intelligence. Simply put, information alone does not constitute intelligence; it must be assessed and interpreted to serve a specific purpose or answer a detailed question.

Beyond Mere Data Collection For example, the mere act of aggregating a person’s social media activity does not qualify as OSINT. True OSINT work digs deeper, using such data to extract actionable insights pertinent to a specific intelligence question. It's about transforming raw data into a strategic tool.

Critical Thinking in OSINT A critical aspect of OSINT involves applying a critical thinking approach to the data under consideration. Analysts must not only gather the data but also ask critical questions like, "Why is this information important?" and "How can it provide meaningful intelligence?" This depth of analysis is what transforms simple information into actionable intelligence.

By understanding and applying these principles, OSINT provides a crucial advantage in answering intelligence questions and supporting thorough investigations.

Why is Open-Source Intelligence valuable compared to other forms of intelligence collection?

Open-Source Intelligence (OSINT) is highly valuable compared to other forms of intelligence collection due to its immediate applicability, respected reputation, and high demand in various sectors such as law enforcement, military intelligence, loss prevention, and cybersecurity. One of the pivotal reasons OSINT stands out is its accessibility to publicly available and legally accessible information, which allows organizations to gather intelligence without the need for classified or restricted sources. This not only speeds up the intelligence collection process but also reduces costs associated with gathering information from more covert means.

Moreover, OSINT can be sourced from a diverse array of channels including social media, news articles, government reports, and academic papers, providing a multidimensional view on a wide range of topics. This breadth of sources ensures that organizations can swiftly adapt to current events and emerging trends, maintaining a proactive stance in their strategic planning.

Additionally, the cost-effectiveness of OSINT is unparalleled, as it does not require specialized equipment or highly trained personnel, unlike other forms of intelligence like human intelligence or signals intelligence. The transparency and ease of verification of OSINT further enhance its reliability and value, making it a preferred choice for many organizations.

By mastering OSINT through the C|OSINT Certification, individuals gain access to actionable skills crucial for investigations, enhance critical thinking abilities, and become proficient in areas like Open Source Intelligence, Social Media Intelligence, Cyber Investigations, Intelligence Collection, and Legal Fundamentals. This certification not only equips individuals with essential skills but also ensures they join an elite network of skilled cyber investigators, offering unparalleled career growth opportunities and an extensive global community of experts.

What sources can be used for collecting OSINT?

In this program, you will gain access to a variety of sources for collecting OSINT, including techniques and methodologies for conducting research using open source intelligence tools and resources. As part of your training, you'll explore how to effectively gather information from diverse and publicly accessible sources such as social media platforms, news outlets, government publications, academic research, and specialized commercial databases. These sources are crucial for a comprehensive OSINT toolkit, allowing for both manual searches and the use of advanced automated tools that streamline the aggregation of data.

The curriculum covers advanced techniques and strategies for conducting in-depth OSint research, understanding and utilizing Social Media Intelligence (SOCMINT) in OSINT operations, investigating mobile applications for OSINT purposes, and combining OSINT and SOCMINT techniques for reconnaissance and intelligence gathering. You will learn not only to identify the right sources but also how to efficiently extract and analyze the data using both traditional methods and cutting-edge technology, enhancing your capabilities in intelligence collection and analysis.

What are sources of OSINT

OSINT leverages a wide range of publicly accessible sources, including:

  • Public Records: Court documents, property records, and business filings provide insights into legal disputes, asset ownership, and business operations.
  • News Media: Current and archived news articles offer context and updates on various topics.
  • Libraries: Academic and public libraries provide access to a wealth of published information.
  • Social Media Platforms: Analyzing activity on platforms like Facebook, Twitter, and LinkedIn can reveal trends, sentiments, and connections.
  • Images and Videos: Visual content from sources like YouTube and Flickr can provide critical evidence and context.
  • Websites: Information from blogs, forums, and official websites adds depth to research.
  • The Dark Web: Monitoring illicit activities and emerging threats.

Who Uses OSINT? 

OSINT is utilized by various professionals and organizations, including:

  • Government Agencies
  • Law Enforcement
  • Military
  • Investigative Journalists
  • Human Rights Investigators
  • Private Investigators
  • Law Firms
  • Information Security Professionals
  • Cyber Threat Intelligence Analysts
  • Penetration Testers
  • Social Engineers

These users employ OSINT for diverse purposes, such as security assessments, market research, background checks, and investigative journalism.

Real-World Example of OSINT 

Consider a scenario where someone finds a driver’s license on the street. By simply Googling the person's name, they might quickly find a LinkedIn profile that includes the individual’s name, photo, and workplace. This example illustrates how easily accessible public information can be used to gather insights.

The Intelligence Cycle in OSINT

The Intelligence Cycle is a structured process that guides OSINT activities:

  1. Preparation: Assessing the requirements and defining the objectives.
  2. Collection: Gathering data from relevant sources.
  3. Processing: Organizing and collating the collected data.
  4. Analysis and Production: Interpreting the data to produce actionable intelligence.
  5. Dissemination: Delivering the findings to stakeholders in an appropriate format, such as reports, briefings, or alerts.

Understanding Intelligence Dissemination in the OSINT Process 

Intelligence dissemination is a crucial phase in the Open Source Intelligence (OSINT) process. This step ensures that the valuable insights gathered during the intelligence collection and analysis stages are effectively communicated to the relevant stakeholders. The methods employed to disseminate this information can vary based on organizational requirements and the urgency of the intelligence.

Key Approaches to Dissemination:

  1. Reports: These are detailed documents that provide in-depth analysis and recommendations. Reports are typically used for strategic decision-making and are formatted to be easily digestible by high-level executives.
  2. Briefings: These are more direct and concise than reports. Briefings are often delivered orally, accompanied by visual aids, to convey essential information quickly. This method is favored in situations requiring immediate action or decisions.
  3. Alerts: For time-sensitive information, alerts are used to instantly inform decision-makers about critical intelligence. These can be delivered through various channels, including emails, SMS, or specialized internal communication platforms.

By tailoring the dissemination method to the specific needs of the organization and the nature of the information, OSINT practitioners ensure that intelligence reaches the right people at the inthe right form and at the most appropriate time, facilitating timely and effective decision-making.

Passive vs. Active OSINT 

Understanding the difference between passive and active OSINT is crucial:

Passive OSINT: Involves collecting information without engaging with the target. This method ensures anonymity and minimizes risks.

Active OSINT: Involves direct interaction with the target, such as joining social media groups or messaging individuals. This method can yield deeper insights but carries higher risks of exposure and legal implications.

How is OSINT Used? 

OSINT supports a wide array of applications:

  • Security and Intelligence: Identifying and mitigating security threats.
  • Business and Market Research: Analyzing competitors and industry trends.
  • Investigative Journalism: Uncovering stories and gathering evidence.
  • Academic Research: Studying social trends and public opinion.
  • Legal Proceedings: Gathering evidence and conducting due diligence.

Benefits of OSINT 

OSINT offers several advantages:

  • Accessibility: Utilizes publicly available information.
  • Diverse Sources: Draws from a wide range of platforms.
  • Timeliness: Provides real-time data collection.
  • Cost-Effectiveness: More affordable than other intelligence methods.
  • Transparency: Easily verifiable information.

How OSINT Works 

The OSINT process involves:

  1. Collection: Gathering data from various public sources.
  2. Processing: Filtering and organizing the collected data.
  3. Analysis: Identifying trends and extracting actionable insights.
  4. Dissemination: Sharing the intelligence with stakeholders.

Common OSINT Techniques

OSINT employs various techniques, including:

  • Search Engines: Using advanced search operators to filter results.
  • Social Media: Monitoring and analyzing social media activity.
  • Public Records: Accessing court documents, property records, and business filings.
  • News Sources: Analyzing current and archived news articles.
  • Web Scraping: Using tools to extract data from websites.
  • Data Analysis Tools: Utilizing software like Excel and Tableau for data analysis.

OSINT in Action: Organizational Benefits 

Organizations can leverage OSINT for:

  • Criminal Investigations: Providing background profiles and situational awareness.
  • Human Source Assessments: Evaluating the credibility of sources.
  • Security and Risk Assessments: Identifying potential threats.
  • Strategic Decision-Making: Informing policy and operational decisions.

How can search engines be utilized in OSINT?

Leveraging Search Engines for Effective OSINT Gathering

Search engines are indispensable tools in the realm of Open Source Intelligence (OSINT). Beyond simple queries, platforms like Google, Bing, and Yahoo offer advanced capabilities essential for OSINT practitioners. Here’s how these tools can be effectively utilized:

  1. Advanced Search Operators: Mastering search operators allows analysts to narrow down vast amounts of data to the most pertinent information. For example, using operators like "site:", "intitle:", "inurl:", and "filetype:" can help in pinpointing specific documents, sites, and even within-site contents.
  2. Custom Alerts: Setting up alerts in search engines can keep you updated about new content matching specific criteria. This is critical for real-time intelligence gathering and monitoring changes or updates on a particular subject or entity.
  3. Data Export and Analysis: Many search engines provide options to export search results in a structured format which can then be analyzed using various data analysis tools for patterns, trends, and other insights that could be missed with a manual review.
  4. Search History and Trends: Analyzing past searches and trends gives OSINT analysts insights into historical data and can highlight patterns or spikes in interest in specific topics or regions over time.

By utilizing these advanced features and techniques, search engines can play a powerful role in OSINT strategies, providing comprehensive data that can be tailored to specific intelligence needs.

What role do public records play in OSINT?

The Role of Public Records in OSINT

Open Source Intelligence (OSINT) utilizes publicly available sources to gather data, and one of the most valuable reservoirs of such information is found in public records. These records encompass a wide range of documents including court proceedings, real estate transactions, and official business registrations.

  1. Court Documents: They provide insights into legal disputes, criminal records, and other judicial deliberations. This can be crucial for background checks or legal case preparations.
  2. Property Records: By examining property ownership, transaction histories, and valuations, analysts can uncover patterns and details about an individual’s or entity’s assets and investments.
  3. Business Filings: These documents reveal the structure, ownership, financial status, and compliance of companies, offering a comprehensive view of a business’s framework.

Public records serve as an indelible part of OSINT strategies, supplying critical data that can influence decision-making processes in fields ranging from security to market research. By diligently mining these resources, OSINT practitioners can assemble a detailed and authoritative picture of their subjects of interest.

How does open-source intelligence (OSINT) work?

What is OSINT?
Open-Source Intelligence, commonly known as OSINT, refers to the method of using publicly accessible data to form valuable insights or intelligence. This intelligence is often used in various sectors like security, market research, and governmental operational strategies.

Steps Involved in the OSINT Process

  1. Collection
  2. Processing
  3. Analysis
  4. Dissemination

Iterative Nature of OSINT
OSINT is not a linear process but rather an iterative one. It often requires revisiting earlier steps based on new insights and feedback, continuously refining the data and its interpretations.

Challenges and Limitations
Despite its accessibility, OSINT must be handled with care. Analysts must be aware of potential biases and the reliability of the sources. Proper training and critical thinking are essential to interpret the data effectively and to leverage it in decision-making processes.

Through these comprehensive steps and careful evaluation, OSINT provides a structured approach to intelligence gathering using openly available resources.

What are some common OSINT techniques?

Open Source Intelligence Research: Techniques and methodologies for conducting research using open source intelligence tools and resources include leveraging search engines like Google, Bing, and Yahoo. Here, advanced search operators play a crucial role in filtering and refining search results to extract pertinent information efficiently.

Advanced OSINT Research: Advanced techniques and strategies for conducting in-depth OSINT research often involve the use of data analysis tools such as Excel, Tableau, and R. These tools help in identifying patterns, trends, and relationships within large datasets, providing deeper insights into the intelligence gathered.

SOCMINT: Understanding and utilizing Social Media Intelligence (SOCMINT) in OSINT operations encompasses monitoring various social media platforms like Twitter, Facebook, and LinkedIn. Analysts can gain valuable insights into public sentiment, emerging trends, and potential threats through systematic analysis of social media activities.

Mobile Apps OSINT: Investigating mobile applications for OSINT purposes includes techniques such as web scraping, where software tools are employed to extract useful data from multiple mobile app databases swiftly. This approach helps in gathering a vast amount of data, which can then be analyzed to uncover valuable information.

OSINT and SOCMINT Recon and Intelligence: Combining OSINT and SOCMINT techniques for reconnaissance and intelligence gathering often involves accessing public records. These records, which include court documents, property records, and business filings, are pivotal in collecting information on individuals, organizations, and other entities.

Each of these areas contributes to a robust framework for conducting comprehensive open-source intelligence research. By integrating these different techniques, analysts are better equipped to gather, analyze, and utilize publicly available information effectively.

Insights into

McAfee Institute

Enhancing Law Enforcement Training: Insights from an Academy Director
As a law enforcement leader, instructor, and academy director, I have used several of McAfee Institute's training products to develop internal trainings, support policy development, enhance situational awareness for event security, threat identification and assessment, emergency/critical incident response, intelligence, and investigations. I am extremely impressed with the academic rigor McAfee Institute employs in their research and curriculum development, as well as the caliber of their instructors.They have worked with and provided training for agencies like the NYPD, and I am exploring hosting possibilities for my academy and other NYC partner agencies. As a chief, I prefer my officers to have certifications from accredited sources to support credibility and public trust. I recommend comparing your state's POST standards with the courses you're interested in. Having led private sector security and emergency management, I can attest that McAfee Institute's cybersecurity-based certifications and degrees are in demand.

"I am extremely impressed with the academic rigor McAfee Institute employs in their research and curriculum development, as well as the caliber of their instructors."

Chief John Ward
Chief of Police
Connect with me on Linkedin
From Law Enforcement to Consulting: How McAfee Institute Transformed My Career
During my time in law enforcement, I used techniques from McAfee Institute's programs to track down a human trafficker, starting with just a Snapchat username. Now, as the owner/operator of an investigation and security consulting company, the knowledge and skills developed through McAfee Institute have helped me with various cases, such as cyber stalking, sextortion, fraud, and locating missing persons.For example, the Certified Expert in Cyber Investigations (CECI) program includes approximately 100 hours of training. I have lifetime access to all updates to the curriculum, unlike other certification groups that require payment for updates. Additionally, McAfee Institute's programs require research, writing, or demonstrated application of the materials to progress. I still use my work from these programs as "proof of concept" when meeting with clients.

“"The knowledge and skills developed through McAfee Institute have helped me with various cases, from cyber stalking to locating missing persons." ”

Eli W. Wilkerson, MBA, CASIP
Law Enforcement
Connect with me on Linkedin
From Intelligence to Private Sector: Why McAfee Institute is My Go-To for Training
After nearly 20 years in the US Intelligence Community as an operator and instructor, I sought certification and education that met my needs in the private sector. McAfee Institute came highly recommended in the private sector and partnered with several federal agencies for training. I hold several of their certifications and now serve on their governing board (without compensation, driven by a dedication to developing skills).One of our strengths is the diverse backgrounds of our instructors and course creators. They regularly review and enhance each other's course material. Josh McAfee keeps the curriculum updated with new and interesting content. I believe in these programs so much that I am dedicating budget to sending coworkers through the OSINT course ladder to enhance their basic analysis skills and beyond.

"I believe in these programs so much that I am dedicating budget to sending coworkers through the OSINT course ladder to enhance their analysis skills."

John Byrk
Cybersecurity and Physical Threat Intelligence Analyst
Connect with me on Linkedin