New Blog Entry

You want to build a Platform? ..What Platform Should I use?

By Daniel Clemens / August 9, 2020

The echo’s of investors had started the buzz of the need for new investigative / intelligence platforms a great deal more than there had been in the past few years.…

4 training fundamentals2

Training, methodology, and not dying in a ball of twisted metal

By Elliott Anderson / June 3, 2020

Here at ShadowDragon, since 2008 we have been building world class OSINT tools and cyber security products.  From SocialNet to OIMonitor to Malnet, we’ve put together solutions for solving problems,…

where does operational security

Where does operational security begin?

By Elliott Anderson / May 20, 2020

Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password habits.  All…

darkweb rambo6

Becoming Dark Web Rambo

By Elliott Anderson / May 6, 2020

There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space.  I’ve met a huge swath of capable engineers and developers who can explain the…

data vs intelligence1

Data vs. Intelligence

By Josh C / April 22, 2020

It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you…

Fishing with a Subaru

Fishing with a Subaru

By Elliott Anderson / April 15, 2020

There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of pinpointing…

demystifying the darkweb3 1

Demystifying the Dark Web: Part 3

By Josh C / April 1, 2020

After looking at the structure of both the dark web and normal web, we can now start to see why so many people want the benefits Tor gives, especially the…

AD8756B4D0DF3EADE00473C8CAD9A1E0

Filtering Out Noise

By Brooks M / March 25, 2020

When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may…

background checks

Background Checks & Due Diligence

By Elliott Anderson / March 11, 2020

Many years ago, when I was in college, I had a job at a large retailer.  It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers,…

heatmaps

Heat Maps: Form Over Function

By Josh C / March 6, 2020

Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map: …

dark web 1

Demystifying the Dark Web: Part 2

By Josh C / March 4, 2020

This is Part 2 of our 3-part series on demystifying the dark web. In Part 1, we looked at how the regular internet works at a networking layer. Today, we…

password maths

Password Maths

By Brooks M / February 26, 2020

As a follow up to our last blog about password reuse and the recent data breach of Disney, I would like to talk about how to create strong passwords and…

Scroll to Top