
















PROFESSIONALS TRAINED
COUNTRIES
CHINA OSINT TRAINING PROVIDER
Open-Source Intelligence (OSINT)
Social Media Intelligence (SOCMINT)
Imagery Intelligence (IMINT)
Geo Spatial Intelligence (GEOINT)
Business (Corporate) Intelligence
Cyber Intelligence
You gain real life practical skills of:
Understanding linguistics- breaking down context from raw data to intelligence.
Learning to search , pivot, and navigate China's ecosystem like a local.
Obtain access to uniquely developed EPCYBER frameworks, techniques and search strategies to all OSINT disciplines above.
Get our in-house 2026 playbook to bypass access to restricted networks & content in China, geo-restricted sources, DPI and Chinese +86.
Updated for 2026
60+ exercises
3 months access
1 Live F2F Zoom session of 30min
Team support via e-mail
500+ PDF Content Pages (Updated)
*The most popular choice of China OSINT professionals.
Enrollment requires simple corporate email verification

Everything in Advanced+
Full adversary military intelligence
Dual Use Technology Tracking
Military Activity / Movement
Strategic People, Entities, Facilities
You get 2 custom requests - may request to bypass any Chinese platform of your choice and / or research on any Chinese entity (per possibility).
Upon successful completion, organization will receive access to the RedRadar platform.
Updated for 2026
90+ exercises
6 months access
3 Live F2F Zoom sessions 30min/ea
Premium support
800+ PDF Content Pages (NEW)
Includes double the content compared to 2025, new techniques and uniquely developed strategies.
For Active Government · Federal · Military · Intelligence ONLY

This training is for those who want to get a deep dive into China OSINT, strongly familiarize yourself with what doing investigative work in China's digital ecosystem looks like in practice.
This is the perfect starter course, a deep dive into fundamentals and everything you need.
Search, collect, and verify from sources your competitors will never reach.
You practice drills on real people, accounts, companies on various scenarios of OSINT, SOCMINT, IMINT.
Updated for 2026
30+ exercises
2 months access
300+ PDF Content Pages (NEW)
Team support via e-mail
*This training is designed to take you from no prior China-focused OSINT experience to feeling comfortable around searching fundamentally and getting results.
This entire training is focused on the art of source development in CTI work.
You will learn how to identify new C2 infrastructure, new domains, new markets, forums that are just emerging, before 99% of CTI firms identify them.
The goal of this training is to give your team and yourself the competitive edge by practicing new techniques, and methods that beat all automated "TIPs" today.
100% manual techniques — what automation misses, you won't.
Updated for 2026
40+ exercises
3 months access
1 Live F2F Zoom session of 30min
Coming Soon: Updated 2026 pre-recorded video lessons
Team support via e-mail
Includes double the content compared to 2025, new techniques and uniquely developed strategies.
You will learn WeChat verification bypass techniques. Create accounts and explore various WeChat features for OSINT investigative work, like groups, channels, moments, and public accounts. Collect intelligence from the platform that many know how to register, few know how to verify their accounts.
You learn about various methods that exist in obtaining access to such platform (+86) registration and what most Westerners don't have access to.
You practice drills on real people, accounts, companies on various scenarios from corporate intelligence to OSINT on people.
Updated for 2026
15+ exercises
30 days access
Team support via e-mail
*This is a platform-specific training, includes only WeChat related OSINT

You will learn all you need in this specialized Social media intelligence training that covers various Chinese domestic platforms. You will do investigative OSINT work on QQ, Weibo, WeChat, across China's digital ecosystem. Weibo, Douyin, Xiaohongshu, Zhihu, and beyond. Profile building, network mapping, and influence tracking.
You learn about various methods that exist in obtaining access to such platform (+86) registration and what most Westerners don't have access to.
You practice drills on real people, accounts, companies on various scenarios from corporate intelligence to OSINT on people.
Updated for 2026
25+ exercises
2 months access
Team support via e-mail

China's most interesting platform, and hardest to access due to installation, registration and verification restrictions.
You learn about various methods that exist in obtaining access to such platform (+86) registration, installation bypass, access bypass, and accessing what most Westerners don't have access to in QQ.
Intelligence that most of the West misses. Due to gap in coverage and visibility.
You practice drills on real people, accounts, companies on various scenarios from corporate intelligence to OSINT on people.
Updated for 2026
15+ exercises
30 days access
Team support via e-mail
*This is a platform-specific training, includes only QQ related OSINT
OUR MISSION:
To equip professionals and those who want to become them with real industry-relevant skills. The main issue with existing training vendors in the industry, especially in areas of China OSINT, dark web, is you mostly get information instead of learning the actual skills you need to move up in your careers.
ABOUT THE FOUNDER:
Former Military Intelligence Officer from a Special Operations Division, I work at the intersection of OSINT, cyber threat intelligence, and intelligence collection across high-risk digital environments.
Over the past 15+ years, I’ve trained and supported European defense contractors, US and NATO-aligned agencies, and intelligence teams operating in complex and sensitive regions.
My core expertise centers on China OSINT, dark-web intelligence, and advanced threat detection. Since early 2017, I’ve specialized in mapping, navigating, and extracting intelligence from China’s digital ecosystem — a focus that has evolved from personal interest to full-time professional practice.
I currently lead two companies.
EPCYBER — a recognized leader in training government and defense teams across Europe and the U.S. to gather intelligence from regions and digital spaces that are normally very hard to access.
And RedRadar — a collection-first data intelligence engine designed to give organizations real visibility into places and ecosystems where information is usually impossible to obtain.
My methods and research have been cited by the U.S. Army War College, Defense Magazine, and leading European think tanks.
I’m an Oxford University Executive Leadership graduate (top honors) and earned my Chief Information Security Officer (CISO) certification at 22. My background spans OSINT, IMINT, SOCMINT, GEOINT, CTI, and penetration testing (Web, Cloud, API), with a focus on bridging intelligence gaps for European governments, financial institutions, and global organizations.
Currently based in Europe, I support clients across France, and broader Western regions with intelligence-led solutions, training, and high-risk ecosystem visibility.







We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.