Menu

The Journey of Sawyer 459

soilsingle0's blog

Osint Research

Our training in advanced online investigation teaches participants an understanding of the way information is structured on the internet and the methods and tools used by law enforcement and security services to uncover evidence that would never otherwise be available. The notable players operating in the global OSINT market include Dassault Systemes SA (France), NICE Ltd.(Israel), Expert System (Italy), Intrinsic Technologies (US), Digimind (US), Verint (US), Datalkz (UAE), Thales SA (France), Palantir Technologies (US), CybelAngel (France), SAIL LABS Technology GmbH (Austria), KB Crawl SAS (France), and Recorded Future (US).
Imagine a harried SOC analyst staring at a strange IP address and uncertain what to do about it. He or she could use OSINT resources OSINT like these to research the IP address and file binary, as well as registration entries and any other appropriate data points.

In recent history, OSINT was introduced during World War II as an intelligence tool by many nations security agencies, however, with the explosive growth of the internet communications and the huge volume of digital data produced by the public worldwide, OSINT gathering becomes a necessity for different organizations, for instance, government departments, nongovernmental organization, (NGO) organizations, and business corporations are starting to rely to a large extent on OSINT rather than private and classified information.
Like one former participant described it: R.I.S. is OSINT on step 4 to 5, where other training programmes are step 1 and 2”. The research methodology can be used to use Google to the max, but can also be used for other search engines, commercial databases or your in-house search engines.
February 2019-Sonatype, with expertise in automated open source, has entered a partnership with Kenna Security, a leader in predictive cyber risk, for improving the risk-based vulnerability management strategies of modern organizations backed by the high-quality intelligence on open source components.

Terrorist Organizations: Terrorists use OSINT sources to plan attacks, collect information about targets before attacking them (like when using satellite images such as Google Maps to investigate the target location), procure more fighters by analyzing social media sites, acquire military information revealed accidentally by governments (like how to construct bombs), and spread their propaganda across the world using different media channels.
The first category includes open source tools to query multiple search engines simultaneously such as IntelTechniques or search engines that provide results separately such as All in One or DuckDuckGo This category also includes social media search engines and search engines of domains and people such as , , Website.informer.

It's also particularly useful for picking up trends on a national or international breaking story before people begin tweeting about something under a unified hashtag, like #MallAttack.” You can search Mall attack,” shooting,” and Minneapolis” at the same time and track the results as they first come in. If something internationally significant happens, like #Brexit,” you can track Brexit-related news across four different columns by pairing that hashtag with different keywords.
It's not recommended to approach open source intelligence from the perspective of finding anything and everything that might be interesting or useful — as we've already discussed, the sheer volume of information available through open sources will simply overwhelm you.

As we have seen already, the desire to gain information or intelligence regardless of the purpose for doing so has long been a part of human existence and as such, techniques and threats have emerged to see that this information and intelligence gathering capability continues and flourishes.
The course equips delegates with the skills to go beyond

Go Back

Comment

Blog Search

Comments

There are currently no blog comments.