OSINT Training for Journalists in London: Learn from World Class Specialists

- Understand fundamental OSINT principles and methods
- Implement OSINT in your journalism
- Protect yourself by masking your digital footprint during research (Operational Security)
- Communicate securely with sources and colleagues via encrypted services
- Use the latest OSINT tools, including one developed by Nathaniel Fried
- Compare, combine, and analyse information to assemble the full picture
- Conduct research on Russian websites and social media platforms
London, EC4A 2HR


Course Structure
The course is held over two days in London. It is divided into modules consisting of 30 minutes of theory and 20 minutes of exercises. Below is a detailed description of the course:
Day 1
We begin the course with theory on Operational Security, which is primarily about the journalist’s personal safety and ensuring that the journalist does not reveal that they are researching a particular topic or individual.
1.1 The importance of anonymity during research
You will learn the following techniques for hiding your digital footprint:
1.2 Virtual Machines (VMs)
A virtual machine allows you to create a software-based computer where you can conduct your research. If you visit unsafe websites containing viruses, malware, or tracking tools, it is the virtual machine that is affected — not your own computer.
1.3 Use of Virtual Private Networks (VPNs)
Hide your IP address and encrypt your internet traffic for added protection.
1.4 The Onion Router (TOR)
Use Tor for anonymous browsing to keep your research activities untraceable.
1.5 Fake Social Media Profiles
Learn how to build convincing yet safe false identities and how to manage them.
1.6 Common Traps That Reveal Identity
Understand the pitfalls and how to avoid giving yourself away.
1.7 Secure Communication
Master the use of encrypted tools for secure messaging.
1.8 Secure Data Storage
Learn how to safely store and destroy data. Participants may ask questions about the different OpSec methods. Participants also receive guides for installing the tools. If problems arise, help will be available on the second day.
Exercises:
We conduct an exercise to determine how easily participants can be identified by the owners of the websites they visit.
We perform another exercise to find out how much personal information can be retrieved about the participants. This is done in pairs.
We begin the second module with a short introduction to how journalists can use OSINT to improve their research.
2.0 Fundamental OSINT principles and methods
Learn why it is important to work methodically. There are hundreds of OSINT tools and methods — so how do you plan your research and avoid wasting time?
A typical OSINT workflow consists of:
Planning, information collection, information processing, analysis, and communication of results.
2.1 Tools
You will learn how OSINT tools work and how they have evolved.
Nathaniel Fried is one of the creators of Osint.Industries, where you can enter a name, phone number, email, or username, and the tool will find all publicly available information online.
We present journalistic case studies showing how the tool can be used to identify who is behind an email, phone number, or social media username.
Exercise: We test the tool on ourselves or on a criminal case.
Now that we understand how Osint.Industries works and what it can be used for, the next question is:
How do we find a person’s emails, usernames, and phone numbers?
A range of tools can help with this.
Exercise: Participants locate a person’s approximate location using various tools.
We show how to optimise your searches on social media. Some external tools can do more than, for example, Facebook’s own search engine.
Telegram
Telegram has become a major journalistic topic, particularly due to mercenary recruitment and drug sales.
Researching on the encrypted platform is difficult, but there are methods to examine a user’s network and groups they belong to.
We end the day with a range of exercises of varying difficulty, so there is something for everyone.
Day 2
A central part of OSINT is identifying the exact location where a photo or video was taken — geolocation. We show examples of how this can be used journalistically.
You will learn about Geographic Information System (GIS) concepts — software that can collect, store, and analyse geographic data. It can be used for:
Geolocating photos and videos: using metadata or landscape comparison
Mapping social media posts: using geotagged data to track events such as terrorist attacks, natural disasters, or wars
Satellite imagery analysis: monitoring landscape changes, construction, disaster zones, or military activity, e.g. in Ukraine
Exercise: Participants learn to use the best map tools effectively: Google Earth, SentinelHub, and NASA Worldview.
We also test street-level tools: Google Street View and user-generated services like Mapillary, which often contain images from streets where Google’s camera cars have not been.
Exercise: Participants receive a folder of photos from London that they must locate. This is done in groups.
Participants learn to use Geospy AI, a tool that uses artificial intelligence to estimate where a photo was taken.
If you upload a photo of a building, the tool uses AI to analyse its architecture and locate matching or similar buildings.
The tool has also analysed street-level photos from several major cities, including London. It is extremely effective: you can upload an image of an anonymous building in London, and Geospy will find the location.
Exercise: We locate the images we did not manage to place in the previous exercise.
There are tools that use facial recognition to identify people.
We show journalistic use cases and discuss when it is ethically responsible to use such tools.
There are also tools that compare two faces to determine whether they belong to the same person.
Why is it important to know how to search effectively on Google?
We present a journalistic case in which a Google search provided the breakthrough.
You will learn how to optimise your searches using advanced techniques.
Exercise: A short search-technique exercise.
Due to the war in Ukraine and Russia’s influence operations in Europe, research on Russian websites and social media has become increasingly important.
- In this module, you will learn to:Use tools to search Russian-language content, including on Telegram
- Use VKontakte (VK) — Russia’s equivalent of Facebook — and a tool designed to research it
We conduct a series of exercises of varying difficulty to apply everything learned.
We discuss the use of different OSINT methods.
- Which methods should be used for which projects?
- When is it necessary to establish ethical guidelines for your research?
Sign up for the training
Got Questions?
This OSINT Training course is designed for professionals across sectors — from corporate investigators to compliance teams, researchers, and journalists. Whether you’re tackling complex cases, tracking international conflicts, investigating fraud, or exposing digital disinformation, you’ll gain practical tools, secure research methods, and geolocation techniques to strengthen your investigations.
No, the course is not just about the OSINT Industries platform. The tool, created by instructor Nathaniel Fried, is included, but the training covers much more. It teaches open source intelligence skills for all investigators. Topics include operational security, geolocation, social media research, and OSINT tools. It also covers Russian-language platforms and ethical considerations. OSINT Industries is just one part of a broader curriculum.
The OSINT training lasts for two full days, running from 9:00 AM to 4:00 PM on both Thursday and Friday. During this time, participants will engage in a mix of theory and hands-on exercises across multiple modules. The schedule is designed to provide an intensive and immersive learning experience, allowing attendees to build practical skills in open source intelligence, from operational security to advanced research techniques, all within a focused and structured setting.
Yes, participants can expect to receive a certificate of completion at the end of the course. This serves as proof of your training and the skills you’ve gained in OSINT methods and tools.
No prior OSINT experience is required. The course is suitable for both beginners and experienced journalists. It starts with the basics and gradually introduces more advanced tools and techniques, making it easy to follow regardless of your background.
Testimonials and Feedback
Federico Becchetti
Italian Police Constable
Anonymous
US Intelligence Officer and Investigator
Level Up Your Investigations. Sign Up for our Training today.
Equip your team with essential skills to elevate your investigations with open-source intelligence.