Technical Tips & Training

Practical and How-to Guides

Spotting the Signs: How Social Media and the Dark Web can Reveal Human Trafficking Activity

By ShadowDragon / January 13, 2025

By: Amanda Blake and David Cook From 2012 to 2022, human trafficking convictions doubled, according to the US Bureau of Justice Statistics. While this most likely indicates an increase in […]

dark prism data wave

What Are the Common Struggles of OSINT Investigations?

By ShadowDragon / September 4, 2024

Conducting OSINT investigations can be challenging, with issues like information overload, data quality verification, technical skills, legal considerations, and misinformation. Overcoming these hurdles requires the right tools, methodologies, and expertise to streamline efforts and ensure actionable insights.

Navigating the Gray Zone: The Role of Open-Source Intelligence in Modern Conflict

By David Cook / July 26, 2024

Navigating the evolving gray zone of modern conflict, this post highlights the growing importance of open-source intelligence (OSINT) in addressing global threats, leveraging publicly available data, and adapting to irregular battlefields to protect security and ensure resilience.

Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence

By Daniel Clemens / December 6, 2023

[First printed in the December 2023 edition of Security Technology] 

OSINT Investigator Training 101: Building a Foundation for Success

By Olivia Gransback / June 20, 2023

Today’s investigators and analysts using online sources to investigate cases are often so focused on where to click, that they don’t even realize what their tools are doing in the […]

ShadowDragon OSINT Experts Share Tips for Keeping Children Safe Online

By Elliott Anderson / March 6, 2023
into the darkwebs1

Into the Dark Webs

By Brooks M / May 27, 2020

What is the DarkWeb The dark web sounds scary, but in reality, it is anything you cannot get to via Google, or that uses a masked IP address. The classification […]

where does operational security

Where does operational security begin?

By Elliott Anderson / May 20, 2020

Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password habits.  All […]

too many nodes1

Rate Limits in Data Visualization

By Josh C / May 13, 2020

One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes […]

Cutting your teeth on ShadowDragon’s advanced CTF

By Elliott Anderson / April 29, 2020

We’ve talked in recent weeks about the importance of training and the methodology behind it.  Much of the OSINT work we do is focused on the social aspects and footprint […]

APT33 CircleOfTruth

Additional Insights into Iranian Cyber Espionage | APT33

By Daniel Clemens / April 24, 2020

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we wanted […]

Fishing with a Subaru

Fishing with a Subaru

By Elliott Anderson / April 15, 2020

There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of pinpointing […]

Scroll to Top