too many nodes1

Rate Limits in Data Visualization

By Josh C / May 13, 2020

One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes…

APT33 CircleOfTruth

Additional Insights into Iranian Cyber Espionage | APT33

By Daniel Clemens / April 24, 2020

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage” detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we…

data vs intelligence1

Data vs. Intelligence

By Josh C / April 22, 2020

It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you…

background checks

Background Checks & Due Diligence

By Elliott Anderson / March 11, 2020

Many years ago, when I was in college, I had a job at a large retailer.  It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers,…

unmasking carder07

Unmasking a carder with OSINT

By Elliott Anderson / February 19, 2020

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.  I spent about an…

OSINT for Fun and Profit02

Iran and OSINT Hunting for Fun & Profit.

By Elliott Anderson / January 15, 2020

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”.  There’s no deep takeaway here –– just some basic…

OSINT PAI 2020

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / January 11, 2020

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on…

IMG 5858

Iran Hype – Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

By Daniel Clemens / January 6, 2020

On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as…

WhatsInAnEmail3

What’s in an email address?

By Elliott Anderson / December 17, 2019

A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same…

bad yelp review copy

Bad moods = Bad decisions

By Elliott Anderson / August 25, 2019

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak.  “I’ve hit a dead-end,…

image 1

Social Networks: Friends of Friends

By Josh C / May 31, 2019

Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that…

Lego Bricks Colorful

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

By Daniel Clemens / April 3, 2019

Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each…

Scroll to Top