fbpx

Research. Analyze. Decide.

Our team of INTELLIGENCE PROFESSIONALS deliver industry leading Open-Source Intelligence (OSINT) training, technology and products that help you achieve decision making dominance.

3165

Professionals Trained

710

Hours of Curriculum

1012

Products Delivered

What is OSINT?

When open-source information (also called publicly available information) is validated as relevant, accurate, and actionable for use by consumers, it is then considered OSINT.  This process begins by methodically gathering information from public sources and the deep and dark web.  Open-source information can be gathered from the internet, social media, in books, images, videos and anywhere else information is available to the public.  Additional sources of OSINT can be information obtained during a public webinar, at a public speech, or during a conference.

Why do I need OSINT?

Open-Source Intelligence (OSINT) is used for a number of reasons by businesses today due to the explosive growth of the internet and social media.  Organizations are typically using OSINT teams to assist with their hiring process, to protect their executive teams, assess the vulnerability of information available on the internet to hackers and competitors, to protect their assets, to monitor and respond to security threats, manage third party risk, and to be alerted in the event sensitive information is leaked.

Why Echo Analytics Group?

Echo Analytics Group has been providing OSINT services for over ten years.  Whether you need OSINT products, training, or technology, we’ve got you covered. Our carefully screened analysts are armed with dozens of advanced analytics tools, data mining software, and our field tested OSINT research and analysis methodology to achieve one goal – prepare you for what comes next!

Our Commitment to You

WE CARE. We will conduct ourselves with honesty, integrity and transparency and treat you with respect.

WE LISTEN.  We will invest the time to learn about you, your experiences, and your needs.

WE ENGAGE. We communicate early and often to ensure you and your team members are always kept informed.

WE DELIVER. We build legally compliant and innovative products that support your goals.

OSINT Products

Your team of experts at Echo Analytics Group build custom products that protect and enhance your operations, enabling you to identify opportunities while reducing risk. These products are purpose-built and customized to meet your business needs. Contact us today to learn more.

Background Research

Our comprehensive line of background research products are ideal for businesses looking to make smart hiring and resource allocation decisions.  Leveraging dozens of  public and proprietary data sets, these products deliver a complete and comprehensive understanding of exactly who you are dealing with.

Risk Monitoring

Our media monitoring specialists, content analysts, and internet researchers can identify issues early and monitor threats for significant changes or escalation, enabling you to build a more tailored approach to security.

Due Diligence

Our team of  professionals will help you uncover the social, criminal, and financial risks that might threaten your business as you plan for the next big move.  Our due diligence products deliver information that protects your organization and uncovers hidden risk in people and business relationships.

OSINT Consulting

Safeguarding proprietary data is a critical component of conducting business in the digital era. We work with clients to create a social risk framework — outlining business objectives, assessing risk, defining tolerance levels, and prioritizing gaps.

Companies Who Trust Echo Analytics Group

Purpose-Built OSINT Research and Analysis Training

Master the Discover, Develop and Monitor (D2M) methodology and bring the skills and knowledge of our cutting-edge, field-tested OSINT research and analysis methodology back to your colleagues. We offer a range of online and in-person courses that are purpose-built for intelligence and security professionals. Get certified through one of our training programs and take your career to the next level!

Student Testimonials

Great course and extremely relevant” – USASOC Student

“The instructors were clearly chosen because of their vast knowledge and experience.  That makes a big difference to me.” Course 1810 Student

“What EAG taught us was priceless” – Student, 5th SFG

“I was just packing up in Rio de Janeiro, where I worked the security detail of a foreign sports team.  The use of D2M to gain operational information was a great success.  In September, I am off to South Sudan and can’t wait to use D2M again!” CEO, Security Firm.

“It was awesome to finally get training from folks who are clearly on the leading edge of this new discipline” – Senior Analyst, JP Morgan

“What EAG taught us was priceless” – Student, 5th SFG

“What EAG taught us was priceless” – Student, 5th SFG

“Instructor performance, very engaging, insightful, knowledgeable, and a great background to give students real-world accounts” -USASOC Student

“Useful beyond measure!  Knowing multiple approaches to finding the desired information is great!!” – Air Force Student

“The tool-agnostic approach is so much different from what I am used too.  This really adds value.”  Course 1806 Student

“The tools we learned and applied to real-world problems are so helpful, and to do so with methodology makes all the difference.” Course 1802 Student

“I loved learning all of the SM tools, their capabilities, and their uses.  I can use any tool now as part of the D2M methodology.” Course 1709 Student

“All of the tools we learned applied to the final exercise, which we chose for ourselves.  Real-life practical exercises were effective.” Course 1709 Student

“Our instructors were great – they teach on the level and in a way that makes it easy to learn and remember.”  Course 1806 Student

Who Should Attend Our Courses?

  • OSINT Analysts
  • Social Media Analysts
  • Fact Checkers
  • Law Enforcement
  • Journalists
  • Research Professionals

Five Open-Source Intelligence Professional Tracks

Open-Source Information Analyst

Learn More

Open-Source Collection Technician

Learn More

Open-Source Media Forensics Specialist

Coming Soon

Open-Source Collection Manager

Coming Soon

Open-Source Intelligence Team Manager

Learn More

Sign up for free now in the menu bar at the top of this page under the CID tab.

Introducing CID

A purpose-built online content research & analysis dashboard designed to leverage endless data sets and open-source analytical tools & resources.

Easily customizable research workflows enable users to build, modify, and access data and tool sets for any research project.

C.I.D. OVERVIEW:

  • Access 1000+ freeware tools and data sets in ONE LOCATION
  • Adaptable to industry & role
  • Customize up to 20 task-specific tool-set groups
  • Safe & secure AWS protection
  • FREE access when enrolled in an Echo Academy Course

More ways to Connect with Echo Analytics Group

Latest Insights

Protecting Data Privacy in a Public Social Media World

As the world increases its reliance on digital technology, Americans have significant concerns over how private companies collect and use their data. According to Pew Research, 81% of Americans feel the risks of private companies collecting their data outweigh the benefits. An estimated 16 billion records have been exposed since 2019. Personal data is more vulnerable […]

Echo Analytics Group’s OSINT Intern Jocelyn Anderson Welcomed to the Team 

Congratulations to OSINT intern Jocelyn Anderson, who recently completed her internship with Echo Analytics Group—and is being hired as a full-time Junior OSINT Analyst!   Ms. Anderson came to us via the Seton Hall School of Diplomacy and International Relations, where she specialized in International Security and Conflict Management, participating in the National Security Fellowship there.   She […]

Using OSINT to Stop Human Trafficking

Human trafficking is a growing worldwide problem. According to the International Labor Office in Geneva, the 2017 estimate of worldwide human trafficking was 40 million people, including 25 million victims of forced labor and 15 million victims of forced marriage. One in four of these victims are under the age of eighteen.   While the United States has a record of sustained efforts to investigate and prosecute cases of human trafficking, […]

Protecting Critical Infrastructure with OSINT

Ransomware and other malware attacks are on the rise. Criminals are constantly probing online systems to discover their vulnerabilities to hold systems hostage. Meanwhile, U.S. foreign adversaries are increasingly targeting assets in digitally accessible spaces to achieve their political goals.   Open-Source Intelligence (OSINT) is being used by both attackers and cyber security professionals to find ways to exploit critical systems […]

Quiet Professionals Acquires Echo Analytics Group

Quiet Professionals (QP), a locally headquartered government and commercial contractor, announced today that they have acquired Echo Analytics Group (EAG), an open-source intelligence (OSINT) research and analysis company. “We already have several customers in common with EAG and we are both driven by a greater purpose,” says Andy Wilson, president and CEO of QP. “We’re […]
Protect Your Kids Through Online Safety

5 Ways to Protect Your Kids Through Online Safety

As we cannot always watch our children, consider how we can best monitor their online activity and keep them safe. We explore five ways in which parents can protect their kids through utilizing online safety.
Super Cookies

Super Cookies: An Introduction

Super cookies are a Unique Identifier Header that injects information into packets sent from a connected user to its service provider.
How do websites track you and your online activity

How do Websites Track You?

How do websites track you and your website activity? Online tracking is, in essence, the gathering of useful data about users and their actions online.

User-Agents (UA)

Every user makes use of different browsers or devices in accessing web services. Also, once connected, you are more likely to notice different looks for the same website under different browsers. Once a browser directs a request to a web service, the browser recognizes itself through the user agent string attached before retrieving the necessary […]

Internet Protocol (IP) Address

Every system connected to a network features a unique identifier. And similar to addressing letters sent via mail, computers employ a unique identifier in communicating data to other computers on a similar network. Nowadays, most networks, comprising of internet-connected computers, make use of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol as a standard for network […]