Open Source Intelligence (OSINT) is at a turning point. In this episode, Melisa Stivaletti shares insights on institutionalizing OSINT, public-private collaboration, and the role of AI and PAI in modern intelligence. Discover why OSINT is now the ‘INT of first resort.’
How OSINT Differs from Traditional Cyber Threat Intelligence?
While there may be some minor overlap, there are major distinctions between traditional Cyber Threat Intelligence (CTI) and the more advanced Open Source Intelligence (OSINT). The efficiency, effectiveness, and approach […]
OSINT Investigator Training 101: Building a Foundation for Success
Today’s investigators and analysts using online sources to investigate cases are often so focused on where to click, that they don’t even realize what their tools are doing in the […]
OSINT Methods To Investigate Suspected AI Generated Content
The proliferation of content generated by artificial intelligence (AI) is just beginning. Recent years haveseen online accounts, run by bots, create fake news articles, divisive social media posts, fraudulentproduct reviews, […]
ShadowDragon Commentary: OSINT vs Classified Secrets
In a recent opinion piece for The Cipher Brief, Gregory Sims, former CIA Clandestine Service for over thirty years, including multiple field tours as Chief and Deputy Chief of CIA […]
Sportradar Case Study: Deep Background Checks, Organizational Integrity, and Fraud Investigations
Investigating integrity and criminality in commerce is a daunting task that requires access to vast amounts of information and complex organizational analysis. The scale rises considerably when investigations are international […]
OSINT Observations from ShadowDragon Experts: Moldova
NicoDekens, Director of Intelligence and Innovation Collection, ShadowDragon You Might Also Enjoy… The Significance of AI and ML in OSINT to Human Investigators ShadowDragon Commentary: OSINT vs Classified Secrets Diving […]
Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger
After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which […]
Additional Insights into Iranian Cyber Espionage | APT33
Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we wanted […]
Background Checks & Due Diligence
Many years ago, when I was in college, I had a job at a large retailer. It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, […]
Heat Maps: Form Over Function
Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map: […]
Unmasking a carder with OSINT
Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder. I spent about an […]
Iran and OSINT Hunting for Fun & Profit.
Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic […]
Job Post: Training and Curriculum Specialist
ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities, government and law enforcement agencies around the […]
Timeline Analysis | Epstein Death Reported on 4Chan Before Announced
In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to […]
Understanding Link Analysis and Using it in Investigations
I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet. A longtime friend, Roelof from Paterva, shared his vision for a […]
Buckle up for Insight into Charming Kitten Cyberespionage Attacks
The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]
- « Previous
- 1
- 2