Open Source Intelligence OSINT

Intelligence gathering usually starts with scraping information from public sources, collectively known as open source intelligence or OSINT. There is such a wealth of legally collectible OSINT available now thanks to social media and the prevalence of online activities that this may be all that is required to give an attacker everything they need to successfully profile an organization or individual.

If you’ve heard the name but are wondering what it means, OSINT stands for open source intelligence, which refers to any information that can legally be gathered from free, public sources about an individual or organization. In practice, that tends to mean information found on the internet, but technically any public information falls into the category of OSINT whether it’s books or reports in a public library, articles in a newspaper or statements in a press release.

OSINT

Here is a classic use of OSINT – Warning that the below contains some stressing scenes.

On 6 March, huge anti war demonstrations across Russia saw more than 5,000 protesters arrested. 29 were taken to Moscow’s Brateyevo Police Station for questioning. There, an unnamed police officer wearing black subjected at least 11 young women to verbal and physical abuse, often amounting to torture. This included suffocation. Two of the detainees recorded their ordeals and on release leaked the audio to the press.

Despite international outrage and multiple calls for an investigation by a Russian politician, the authorities did not open a criminal case. In place of one, the victims set out to find the ‘man in black’ themselves. Using a leaked database from a Russian food delivery company called Yandex, archived social media accounts, and old dating profiles.

Finding My Torturer tells the story of how these young women came together to expose the identity of their torturer and his commanding officer using classic OSINT techniques.

Websitecyber related posts:

Artificial Intelligence for Military Use and National Securi...

collaboration between the US Government and the technology sector, Artificial Intelligence governance and its geopolitical context, and the ethics of autonomou...

Government Cyber Security

The government has pledged to make significant changes to cyber security, following data breach attacks on Medibank and Optus.

Meat Supplier JBS Paid $11 Million Ransom To Hackers

The world's largest meat processor, JBS, is now revealing for the first time that it paid an $11 million ransom to the hackers who breached its computer system,...

Shopping Night

Shopping Night is a holiday song that teaches you how to shop online safely and avoid suspicious websites.

Ex-CIA Employee Jailed for 40 Years

Joshua Schulte Ex-CIA employee jailed for 40 years for carrying out largest data leak in the agency’s history. He leaked CIA's hacking tools and capabilities.

Cyber Scam Traffickers

They're educated and tech-savvy and have been trafficked into forced labor in Southeast Asia by cyber scam traffickers.

Palo Alto Networks

Palo Alto Networks Blog.

Could Alien Life be AI

Artificial Intelligence or AI more specifically strong AI or artificial superintelligence could possibly be the answer to alien life.

Banks Caught up in Cyber Breach

There are fears customers banking details may have been compromised in a recent cyber breach on law firm HWL Ebsworth.

LaMDA is Google's AI Sentient?

Can AI come alive? A Google computer scientist claimed that the company's AI appears to have consciousness.

Russian Ransomware Gang AlphV

A notorious Russian ransomware gang which infiltrated one of Australia's largest law firms has now targeted a string of Victorian businesses, which it is extort...

Telstra Scam Reporting System

With 42 per cent of scams being sent via text this year, Telstra have announced a new way to ‘Snitch a Scammer’ with a new scam text reporting system.
Share Websitecyber