More About Amy Mortlock

Connect with Amy Mortlock
Amy Mortlock, VP of Marketing at ShadowDragon, has over 15 years of experience in cybersecurity, OSINT and brand development.
Latest Posts by Amy Mortlock
ShadowDragon Introduces Horizon™ Identity – Eliminate Complexity
ShadowDragon is proud to introduce Horizon™ Identity, the newest feature in our Horizon™ platform. Horizon™ Identity was designed from the ground up to empower users of all technical skill levels to conduct fast, thorough research on individuals—without needing a background in OSINT, cybersecurity, or data science. The amount of publicly available information on the Internet
Spotting the Signs: How Social Media and the Dark Web can Reveal Human Trafficking Activity
By: Amanda Blake and David Cook From 2012 to 2022, human trafficking convictions doubled, according to the US Bureau of Justice Statistics. While this most likely indicates an increase in the effectiveness of law enforcement tactics rather than a surge in human trafficking activity, the fact that 1,912 persons were referred to US attorneys for
Navigating Election Monitoring: Insights on Security, Disinformation, and Social Media Trends
ShadowDragon’s latest podcast explores election monitoring challenges, including misinformation, security threats, and social media’s role in shaping narratives, with insights from expert analyst Bryeanne Ravettine.
Surprising Ways OSINT is Used for Good
Open source intelligence (OSINT) is a powerful tool used for good across various sectors, including combating human trafficking, preventing crime, monitoring elections, ensuring corporate responsibility, protecting consumers, supporting humanitarian aid, and aiding public health and environmental efforts.
Unpacking OSINT: The Power of Publicly Available Information
Discover the power of Open Source Intelligence (OSINT) for turning publicly available data into actionable insights. From national security to corporate risk management, learn how OSINT tools identify patterns, track threats, and uncover new opportunities while addressing ethical considerations.
Illuminating Context with Timeline Analysis
In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions will enable success while following a robust investigative methodology. Without performing the discipline of timeline analysis in simple or complex cases, context and hidden motives
Introducing ShadowDragon’s Horizon™ Monitor.
We are excited to announce a game-changing enhancement to our Horizon™™™™ intelligence platform: Horizon™™™™ Monitor. This represents a significant leap forward, seamlessly integrating with our existing world-class OSINT link analysis, breach data and geolocation analysis capabilities to offer an unmatched intelligence analysis platform in the OSINT space. Transforming Intelligence with Real-Time Monitoring Horizon™™™™’s robust platform
ShadowDragon Partners with SynapseAi to Expand Influence in Asia Pacific
Hoover, AL – [26th June] – ShadowDragon™, a provider of ethical open-source intelligence (OSINT), unique datasets and APIs, is pleased to expand its partner ecosystem through a strategic partnership with SynapseAi to allow secure access of ShadowDragon’s OSINT investigative tools and enhance reach and capabilities in the Asia Pacific region. This collaboration offers security for
Link analysis with OSINT, breach data, and intelligence in one comprehensive investigations toolkit
In a landscape where information is power, the ability to gather, analyze, and act upon open-source intelligence (OSINT) is paramount for organizations across all sectors. Recognizing this need, we have made some significant advancements to our OSINT Platform, Horizon™™™™®. Unlock a modern approach to link analysis with OSINT, breach data, and intelligence together in one
ShadowDragon Wins 2024 Frost & Sullivan Best Practices Award for Excellence in Global Open-Source Intelligence
As a pioneer of open-source intelligence (OSINT) investigation tools dating back to 2009, ShadowDragon is honored by a recent award recognizing us as a transparent and reliable vendor that supports security operations aligned with ethical standards. In other words, an independent evaluation of our company supports our stance that ShadowDragon is the leading voice of
ShadowDragon Enters Strategic Partnership with Collaboraite and Vestigo to Build Trust in OSINT
Global leaders in open-source intelligence and operational security partner to foster trust in data and technology HOOVER, ALABAMA – March 4, 2024 – ShadowDragon™, a provider of ethical open-source intelligence (OSINT), unique datasets and APIs, is pleased to expand its partner ecosystem through a strategic partnership with both Collaboraite® and Vesitgo Consulting, which are part
The (Un)hidden Threat: Child Grooming on Social Media
Technative generations do not know life without the internet and even my one year old niece knows how to navigate a device. Whilst screen time can be good for learning and a useful tool for negotiation there are so many uncontrolled opportunities for exposure to illicit material and seemingly harmless interactions wherein lies sinister threats:
Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence
[First printed in the December 2023 edition of Security Technology]
ShadowDragon Commentary: How to Scale Investigations Using Open-Source Intelligence
Recently, ShadowDragon CEO, dclemens, contributed an article to Security Management Magazine for their October 2023 organized crime issue. In the piece, he offers firsthand insights into how investigators can improve their workflows and scale their investigations with the power of open-source intelligence (OSINT.)
ShadowDragon Commentary: OSINT vs Classified Secrets
In a recent opinion piece for The Cipher Brief, Gregory Sims, former CIA Clandestine Service for over thirty years, including multiple field tours as Chief and Deputy Chief of CIA stations, shared his views on the evolving role of open source intelligence (OSINT) in a world filled with secrets.
Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger
After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which is ongoing) has captured the attention of our nation, for good reason, and seemingly challenged investigators.
Additional Insights into Iranian Cyber Espionage | APT33
Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we wanted to use our tools to track down additional information relating to online identities and infrastructure used by the actors as well as identifying additional IOCs
Heat Maps: Form Over Function
Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map: It is great. It is pretty. It paints a picture… but it means absolutely nothing. This is the critical problem with heat maps. Without the
Job Post: Training and Curriculum Specialist
ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities, government and law enforcement agencies around the world. The training and curriculum specialist will be the primary point of contact responsible for our training classes and curriculum development. Our training classes take
Timeline Analysis | Epstein Death Reported on 4Chan Before Announced
In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to drive home is there won’t ever be an investigation with a timeline. If you don’t have a timeline (or the discipline), you are not going
Understanding Link Analysis and Using it in Investigations
I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet. A longtime friend, Roelof from Paterva, shared his vision for a link analysis platform. Within a year SocialNet was born. It was an unique marriage of link analysis with the process of collection and enhancement of
Buckle up for Insight into Charming Kitten Cyberespionage Attacks
The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why the Clear Sky report on Iranian cyberespionage group – known oxymoronically as Charming Kitten – is such a great read. A classic tale of Zero