In this second of a two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are shaping the future of technology.
DHS has warned that the exploitation of the COVID pandemic by domestic violent extremists DVEs for the purpose of committing hate crimes, acts of violence, or inciting others to commit violence.
In this two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are shaping the future of technology.
OODA Members are highly informed on the state of Artificial Intelligence, with most already applying some component to business operations and all benefiting from the use of AI in their personal lives via popular applications from Google, Amazon, Microsoft, Facebook, Apple and others.
A Guide to Open Source Intelligence (OSINT)
The fact that AI is here to stay is clear. But where is it going in the near future? This special report was produced to shed insight into this critically important megatrend. This is part two of our series with Dr.
The session is full of important advice on how to survive and thrive in and after the current crisis. OODA helps our clients identify, manage, and respond to global risks and uncertainties while exploring emerging opportunities and developing robust and adaptive strategies for the future. Bob Gourley Read More. Coronavirus takes a serious turn in Russia, and Putin no longer radiates confidence. North Korea fires barrage of missiles from ground and air. Chernobyl fire under control, Ukraine officials say.
One third of NHS staff and key workers tested in the UK have coronavirus, amid concerns over access to protective equipment. Subscribe today! The Department of Homeland Security has issued a series of intelligence advisories associated with t. An email chain dubbed Red Dawn shows how experts inside and outside the government identified the th. Fake Covid tracker app delivers ransomware, disinformation abounds Cybercriminals have been capitalizing on the public unrest over the current pandemic, and the onslau.They also showed their warts.
A year later, groups in Libya revolted against the government of Col. Moammar Gadhafi. Social media was there, guiding the United Nations humanitarian support as well as reporting and, to some extent, fomenting the rebellion. Tweeting became an act of bravery when the Libyan government began to locate sources. Those seeking to harness social media to make it part of the open source intelligence OSINT aggregate are operating in a wildfire-like confluence of technology, political upheaval, and natural disaster.
Social media is the latest in a continuum of OSINT elements that go as far back as the earliest newspapers and speeches, and later, radio, television and public government documents, including budgets. The advent of the Internet altered OSINT once again, offering databases, online news sources, and quicker access to public information, including blogs. But the Internet also complicated the already complex task of separating facts from opinion and propaganda, still a key concern among OSINT operatives.
With the Internet, their mission became even more complicated, in an era bursting with possible facts to balance against one another in an effort to provide the clearest picture possible.
Add social media and the phenomenon of crowd-sourced information to that mix, and the task looms both mountainous and frenetic. It also added an immediacy that was unprecedented by any other medium. Some companies, such as HumanGeo, are developing geospatial applications and tools to synthesize, manage and exploit large data sets derived from social media.
There is an ongoing rush to keep up with advancing technology for the social media mix.
Take Google Goggles for example. This technology provides geospatial information when viewing pictures and video on a smartphone. OSINT operatives in and out of government continuously strive to keep abreast of emerging technologies as well. Can it add to the geospatial construct necessary to tell a story that can be acted upon?
Following the earthquake in Haiti, volunteer groups, in particular OpenStreetMap, used a geospatial wiki to build a street map of Haiti in two weeks—a task that ordinarily would have taken a year. As more data streamed in, new maps were created. It was a challenge to piece together the geospatial information accompanying tweets and other social media messages. Still, the maps provided relief agencies with the story of a Haitian population on the move from the devastation in Port-au-Prince, seeking help.
Disaster relief efforts in Haiti proved that the method could, and should be taken seriously, when social media messages revealed the locations of people still alive under the rubble days after the earthquake. Videos posted online showed some of the hardest-hit neighborhoods, and those reports were confirmed when aid workers rushed in with supplies. The combination of traditional OSINT with geo-tagged social media data provided an invaluable resource to the large conglomerate of response organizations and those watching around the world.
In earlyUshahidi was formed as a website to map reports of violence in Kenya after the post-election fallout. Today, Ushahidi is a full-blown nonprofit tech company, specializing in information collection, visualization, and interactive mapping.April 15, by Joseph Fitsanakis 1 Comment. Ever since the emergence of the novel coronavirus, prominent scientists have dismissed rumors that it could be a synthesized bioweapon.
According to reportsthis question is being carefully examined by Western intelligence agencies. Scientists working for US spy agencies had quickly dismissed the theory that the virus had been deliberately weaponized. Filed under A specialized intelligence website written by experts, since Tagged with biomedical intelligencebiosecuritybiosurveillancebioterrorismCoronavirusCOVIDMark MilleyNews. April 14, by Joseph Fitsanakis Leave a comment.
The United States Department of Defense has barred its employees from using Zoom, a popular video teleconferencing application, due to concerns that foreign spies may be using the software to collect intelligence. The Pentagon made the announcement less than a day after the US Senate advised its members to refrain from using Zoom. The video teleconferencing software is owned by Zoom Video Communications, Inc. It has become popular in recent weeks, due to the increasing reliance on telework resulting from the effects of the COVID pandemic.
But security experts have raised concerns about the privacy and security of Zoom users. On the same day, a memo by the Sergeant-at-Arms of the US Senate advised senators and their staff members to refrain from using Zoom for congressional business.
Finally, on April 10, Pentagon spokesman Lt. Carver said Pentagon employees could still make use of the Zoom for Business application, because it had been issued a provisional authorization under the US Federal Risk and Authorization Management Program.
He added that Pentagon employees could still utilize Zoom for their personal use. April 13, by Joseph Fitsanakis 5 Comments. Additionally, London should be careful not to criticize Beijing at the moment, given that much of the medical supplies that the country needs to defend itself the coronavirus are produced in China.
However, after the COVID crisis, Britain is likely to re-examine its relationship —economic and political— with China, with the help of its intelligence agencies, said The Guardian. April 10, by Joseph Fitsanakis 1 Comment. Satellite photos show that Saudi Arabia is edging closer to completing the construction of a nuclear reactor in Riyadh.
This development continues to prompt concerns that the country may be inching closer to building nuclear weapons. Last week year thanks, S. The facility is being built by INVAP, a nuclear reactor construction firm which is owned by the government of Argentina.
At least six American companies have been authorized by the US Department of Energy to participate in the project in various ways. The photographs published by Bloomberg showed that the construction project, which was initiated in Aprilwas progressing with uncharacteristic speed, and was in all likelihood nearing completion.
The Saudi monarchy insists that the purpose of its nuclear program is peaceful and claims that it complies with international agreements. It also claims that it will make all its nuclear facilities available to inspectors, and that it is honoring nuclear non-proliferation treaties, including the NPT.
April 8, by Joseph Fitsanakis 2 Comments. Grocery stores across the nation remain generally well-stocked, even if in some cases like in Nevada and Arizonathe National Guard has been brought in to help with restocking.
Shortages in certain types of foods, such as canned soup or pasta, are the result of unprecedented demand, rather than a breakdown in the food supply chain. Overall, therefore, there are no signs of systematic food shortages across the nation. However, disruptions —some of them severe— are likely to be experienced in the coming weeks.This weekly podcast presents ideas to help you become digitally invisible, stay secure from cyber threats, and make you a better online investigator.
Click HERE for details. This digital document PDF contains my entire collection of personal online data removal links from all of my books. It is updated often as sites change.
News & Information
If you are looking for the most recent list of online information removal resources, this is it. We always keep an updated list of privacy related gifts for those looking to introduce this topic to others or just buy cool stuff for yourself.
From books to security gadgets to faraday bags, we have you covered HERE. Free Workbook This digital document PDF contains my entire collection of personal online data removal links from all of my books. Privacy Related Gifts We always keep an updated list of privacy related gifts for those looking to introduce this topic to others or just buy cool stuff for yourself.
Episode Show Notes. Your Neighborhood. Online Dating. Start Here. RSS Feed.Image Search Engines. Images shared across social media sites can be found in the following locations:.
There are specialized sites that hold images appeared in the press and news media, to search for this type of images go to:. Most important Grey literature academic and scholarly resources websites can be found in the following list:. Made with by Graphene Themes. Toggle navigation. Home Books Contact Us. Ubersuggest : suggest keywords not available in the Google Keyword Planner. Startpage : Fetch results from Google without tracking its users.
Peekier : Privacy oriented search engines that fetch its results using its own search algorithm. Qwant: Based in France. Oscobo : Based in UK. Gigablast : Open source search engine. Meta search engines Excite Search MetaGer Zapmeta etools : Compile its results from major international search engines, keep user privacy by not collecting or sharing personal information of its users.
This search engine is very fast and show a summary for each search query -on the right side- detailing the source of its results. Metacrawler : Aggregate results from Google and Yahoo!. It uses visual search technology to recognize uploaded picture and give instant results about it like related images, local shopping results and a vast selection of web results. Daily Earth Search U. Newspaper Directory, Present Newspaper Map World News The paperboy Newsography : International relations and armed conflicts global news aggregator and historical database.
Newspaper Directory, Present using these two links from the Library of Congress. Hoaxy : Check the spread of false claims like a hoax, rumor, satire, news report across social media sites.Open source intelligence, which researchers and security services style OSINT, is one of the most valuable tools to a contemporary reporter, because of the vast amount of publicly available online information. Reporters conducting OSINT-based research should aspire to use the information they gather online to peer behind the superficial mask of the internet—the anonymous avatars on Twitter, for example, or the filtered photographs on Instagram—and tell the story of the real, flesh-and-blood human beings on the other side of our screens.
Every time we go online, we give up part of our identity. Sometimes, it comes in the form of an email used to make a Twitter account. Journalists can piece together clues like this and use them to tell stories which are of interest to the public. The following guide is written to provide a basic foundation not only for doing that work, but also for verifying the information, archiving findings, and interacting with hostile communities online.
The closer we get to understanding the people who make the influential and newsworthy aspects of the internet happen—and their motivations—the easier our work of discovery becomes. Open-source reporting refers to the effort of retrieving information that is publicly available online, part of what we will call an open network.
When you communicate through devices like phones, laptops and tablets, you use both open and closed networks without even thinking. You probably talk to some of the same friends while dancing back and forth between open and closed networks, and do so within a span of only a few minutes.
Reporters should be conscious of the difference. When you think about the difference between open and closed networks, think about how you use Facebook: You want the public to find the link to the story you wrote, so you post it publicly on your timeline. The public post is open and the snarky comment on Messenger is closed. These are two different types of communication, and how you report on the use of them will require different approaches.
Ask yourself: Does the conversation you are viewing require an invitation? If the answer is no, you are looking at what we call an open network.
So is a conversation on imageboard forums like 4chan and 8chan. So is anything you can read by searching Google.
OSINT Goes Social
So is Yahoo Answers. So is a neo-Nazi forum like Iron March. When accounts are set to public, anyone with access to the internet can see what is posted. If anyone can see it, anyone can report on it. Most of what you will read about in this guide revolves around how to find, verify, and analyze content found on open networks.
The users do not want strangers to see what they are writing to one another, and users need to be invited to read it. Does the conversation you are viewing require an invitation? If the answer is yes, you are looking at a closed network.
Encrypted messaging apps like WhatsApp, Signal and Wire are good examples of closed networks because they require an invitation from another person to view and participate in a conversation. Keybase and Telegram are examples of encrypted messaging apps where a good amount of material about the users on it is public facing and part of an open networkbut the conversations are not always presented that way.
Disboard and similar websites do not appear to pick up on a complete list of active Discord servers. You may encounter screenshots posted on open networks of conversations that were captured on closed networks. These conversations provide challenges in terms of verification because they often cannot be authenticated by searching the internet. The only thing you have to work with is a police issued-press release suggesting that this year-old woman robbed a bank.
In doing your due diligence, you call another year-old woman named Cynthia Jackson who was close friends with Smith, according to local news reports.Real-Time OSINT: Investigating Events as They Happen - SANS OSINT Summit 2020
Jackson shares with you screenshots of private text messages she claims to have had with Smith prior to the robbery. One screenshot appears to show Smith sharing a picture of young Joseph Stalin.Sign up with Facebook Sign up with Twitter. I don't have a Facebook or a Twitter account. Research and publish the best content. Try Business. Join Free. Tag cybercrime 1. Afghanistan 1. Africa 1. AirTransport 1. Al Shabaab 1. Alarm Systems 1. Amnesty International 1. Amsterdam 1. Android 2. Android-Malware 1.
Apple 1. Apple-Insecurity 1. Are you a hacker's target? Arid Lands Information Network 1. Arpinder Singh 1. ASIS 1. Attacks 1. Australia 1. Awareness 2. Bangkok 1. Barack Obama 2. Barroso 1. Bashar al-Assad 1. Berlin 1. Biological weapons 1. BluefinTuna 1. BND 1. Boeing 1. Bok review 1. Botnet 1. BYOD 2. BYOD-Dangers 1.