SoftStrategynSD

PR: Italy’s Soft Strategy & ShadowDragon Partner providing Investigative training & advanced investigative capabilities.

By Daniel Clemens / June 22, 2020

Rome, Italy JUNE 22, 2020 – SoftStrategy and ShadowDragon partner together to provide advanced investigative training. As the world has become more sophisticated, many businesses have needed to adapt to…

4 training fundamentals2

Training, methodology, and not dying in a ball of twisted metal

By Elliott Anderson / June 3, 2020

Here at ShadowDragon, since 2008 we have been building world class OSINT tools and cyber security products.  From SocialNet to OIMonitor to Malnet, we’ve put together solutions for solving problems,…

shadowdragon share

Cutting your teeth on ShadowDragon’s advanced CTF

By Elliott Anderson / April 29, 2020

We’ve talked in recent weeks about the importance of training and the methodology behind it.  Much of the OSINT work we do is focused on the social aspects and footprint…

OSINT PAI 2020

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / January 11, 2020

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on…

IMG 5858

Iran Hype – Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

By Daniel Clemens / January 6, 2020

On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as…

GetRelatedMalwareSamplesFromDomain 1

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

By Daniel Clemens / December 1, 2019

Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging…

screenshot

Job Post: Training and Curriculum Specialist

By Daniel Clemens / September 3, 2019

ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities, government and law enforcement agencies around the…

1 1

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

By Daniel Clemens / August 10, 2019

In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to…

200 Level Class 2.001

Illuminating Context with Timeline Analysis

By Daniel Clemens / July 29, 2019

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions…

Lego Bricks Colorful

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

By Daniel Clemens / April 3, 2019

Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each…

wolf

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

By Daniel Clemens / August 31, 2018

If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate  — why do we struggle with an increase in more complex…

Link Analysis ChartsGuidance

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

By Daniel Clemens / August 3, 2018

In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved…

Scroll to Top