OSINT school
The Kherson raccoon talks about the basics and tools of open source intelligence (OSINT), gives examples and analyzes Ukrainian cases
Experts: Dmytro Zolotukhin, Dmytro Odnokoz
The raccoon, who lived in occupied Kherson, was captured by the occupiers in November 2022. In captivity he was subjected to various technological experiments, as a result of which he developed extraordinary mental abilities and a native proficiency of the Ukrainian language. Raccoon decided to work undercover, using his own abilities for the benefit of Ukraine. In his guerilla activities he is known by the call sign "Bylava", and is engaged in open source intelligence (OSINT).
Bylava leads a team of Ukrainian teenage hackers, which you can join. But first you need to practice. So, over the course of several series, Bylava will teach you how to use basic OSINT tools on real Ukrainian cases.
The educational series was created by the Institute of post-information society on the initiative of the Ministry of Digital Transformation of Ukraine for the Diia.Education platform.
HARD: Deanonymization of the person, Fact-checking, Geolocation search by image, Reverse image search, Search for personal data in Google and social networks, Search for weather in the past, Step-by-step organization of an OSINT investigation, Use of state registers, Using Google dorks, Work with Google cache, Work with Google maps and Street view to find location, Work with Webarchive, Wayback machine
Program
Get started
Episode 1. Introduction
Episode 1. Introduction
Episode 2. OSINT investigation steps
Episode 2. OSINT investigation steps
Episode 3. Fact-checking
Episode 3. Fact-checking
Invited experts
Dmytro Zolotukhin
Dmytro Odnokoz
Partners
Institute of post-information society
EdtechEbola
Do you have questions?