ShadowDragon Commentary: OSINT vs Classified Secrets
In a recent opinion piece for The Cipher Brief, Gregory Sims, former CIA Clandestine Service for over thirty years, including multiple field tours as Chief and Deputy Chief of CIA […]
The Impact of Bad Energy Policy on Cybercrime
dclemens, Founder & CEO, ShadowDragon Is climate change the cause of higher energy prices? Likely not. That being said, there is common confusion surrounding energy policy and basic economics. The […]
Sportradar Case Study: Deep Background Checks, Organizational Integrity, and Fraud Investigations
Investigating integrity and criminality in commerce is a daunting task that requires access to vast amounts of information and complex organizational analysis. The scale rises considerably when investigations are international […]
OSINT Observations from ShadowDragon Experts: Moldova
NicoDekens, Director of Intelligence and Innovation Collection, ShadowDragon
Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger
After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which […]
Siren Forms Strategic Partnership with ShadowDragon
Market Leading Technologies Combine to Provide Powerful Investigative Solution
ShadowDragon Combines Capabilities with Chorus Intelligence
September 15, 2022 – Virginia Beach, VA – Chorus Intelligence (“Chorus”) has powered up their digital intelligence platform by embedding SocialNet from ShadowDragon within it. This combined capability provides law […]
ShadowDragon Expands Partnerships for OSINT Collection
Hoover, AL – As the sophistication of organized cyber threats increases, so does the need for cooperation to catch the perpetrators of these malicious acts. ShadowDragon™, a leading provider of […]
SocialNet is now available on-demand through King & Union Avalon
ALEXANDRIA, VA, UNITED STATES, March 15, 2021 / — Data and investigative platform companies King & Union and ShadowDragon today announced an integration agreement that gives cybersecurity analysts on-demand access to ShadowDragon’s […]
You want to build a Platform? ..What Platform Should I use?
The echo’s of investors had started the buzz of the need for new investigative / intelligence platforms a great deal more than there had been in the past few years. […]
Into the Dark Webs
What is the DarkWeb The dark web sounds scary, but in reality, it is anything you cannot get to via Google, or that uses a masked IP address. The classification […]
Where does operational security begin?
Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password habits. All […]
Rate Limits in Data Visualization
One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes […]
Becoming Dark Web Rambo
There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space. I’ve met a huge swath of capable engineers and developers who can explain the […]
Cutting your teeth on ShadowDragon’s advanced CTF
We’ve talked in recent weeks about the importance of training and the methodology behind it. Much of the OSINT work we do is focused on the social aspects and footprint […]
Additional Insights into Iranian Cyber Espionage | APT33
Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we wanted […]
Hacking in the Middle East
In the past, we have looked into a hacker who comes from Iran by the name of Mrb3hz4d. Now if we take some of the information we saw from his […]
Data vs. Intelligence
It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you […]
Fishing with a Subaru
There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of pinpointing […]
Demystifying the Dark Web: Part 3
After looking at the structure of both the dark web and normal web, we can now start to see why so many people want the benefits Tor gives, especially the […]
Filtering Out Noise
When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may […]
Background Checks & Due Diligence
Many years ago, when I was in college, I had a job at a large retailer. It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, […]
Heat Maps: Form Over Function
Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map: […]
Demystifying the Dark Web: Part 2
This is Part 2 of our 3-part series on demystifying the dark web. In Part 1, we looked at how the regular internet works at a networking layer. Today, we […]
Password Maths
As a follow up to our last blog about password reuse and the recent data breach of Disney, I would like to talk about how to create strong passwords and […]
Unmasking a carder with OSINT
Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder. I spent about an […]
Demystifying the Dark Web: Part 1
This post is part of a 3-part series that explains the difference between normal internet and the dark web, and how some actors use the dark web. Today we are […]
Tracking an Outbreak
I recently setup a project in OIMonitor to track the mentions of infectious diseases mentioned in the news. I immediately got results, though not all of it was good. One […]
Exploring OSINT, War Stories & OSINT with (NicoDekens) Dutch_OSINTguy
Nico, (dutch_osintguy) is our Director of Intelligence and Collection Innovation and has a background as an (all source) Intelligence Analyst in the Dutch Law Enforcement. He analyzed murder cases, international narcotics […]
Iran and OSINT Hunting for Fun & Profit.
Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic […]
What Will OSINT/PAI and Collection at Scale Look like for 2020?
2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on […]
Iran Hype – Past and Present Recollections
On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as […]
What’s in an email address?
A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same […]
The Problem with Technology Keywords
Big data, AI, machine learning, block chain, and every other cool new tech words are all really just that–words. To a developer or computer scientist, they are a type of […]
Iranian Watering Holes. Target Centric Analysis IOCs
Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging […]
Into the Breach
We’ve all heard the advice a million times, “Don’t use the same password on different websites.” Unfortunately, (or fortunately, depending on our motivations) many users make this exact mistake. In […]
Scaffolding: The Basis of Everything
The first lesson I was ever taught in programming is the need for scaffolding. Just like painting a house, even if you are certain you can reach every nook and […]
The Vital Few and the Useful Many
In 1896, at the University of Lausanne in Switzerland, a young economist by the name of Vilfredo Pareto publish a paper showing how 80% of the land in Italy was […]
Job Post: Training and Curriculum Specialist
ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities, government and law enforcement agencies around the […]
- « Previous
- 1
- 2
- 3
- Next »