POPULARITY
Nach drei intensiven Episoden zur digitalen Spurensuche sprechen Gregor Münch und Martin Steiger in der vierten und letzten Folge über die entscheidende Phase: Wie lassen sich OSINT-Funde so sichern und präsentieren, dass sie auch vor Gericht standhalten? Konkret gehen Sie folgenden Fragen nach: • Welche Beweisformen funktionieren im digitalen Kontext – reicht ein einfacher Screenshot? • Wie erhöht man die Glaubwürdigkeit digitaler Belege ohne übertriebenen Aufwand? • Was tun, wenn der Gegenbeweis behauptet: „Das ist gefälscht“? • Wie beweist man die Echtheit von Bildern, E-Mails oder Online-Posts – und wo liegen die Grenzen? • Wann braucht es IT-Sachverständige – und wann genügt anwaltliche Plausibilität? Martin erzählt ausserdem von einem konkreten Fall, in dem Zweifel an Screenshots zu einem Freispruch führten – und zeigt auf, was Strafverteidiger:innen daraus lernen können. Diese Folge ist für alle, die mit digitalen Beweismitteln arbeiten – und verstehen wollen, wie man aus einer Information ein durchsetzbares Argument macht. Die Podcasts "Auf dem Weg als Anwält:in" sind unter https://www.duribonin.ch/podcast/ oder auf allen üblichen Plattformen zu hören
In dieser Folge spricht Gregor Münch erneut mit Martin Steiger – Anwalt, Datenschutzaktivist und OSINT-Experte – über digitale Recherchewerkzeuge, die Jurist:innen im Alltag unterstützen können. Wie findet man heraus, wem eine Domain gehört? Was verraten Metadaten in PDFs über die Entstehung eines Dokuments? Wie lässt sich ein Alibi mit Google Maps oder Street View plausibilisieren? Und welche rechtlichen Fragen stellen sich beim Einsatz von Tools wie PimEyes oder Clearview AI? Gregor und Martin beleuchten konkrete Anwendungsfelder von Open Source Intelligence: • Satelliten- und Verkehrsdaten zur Alibiprüfung • Rückwärtssuche von Bildern zur Verifizierung von Online-Inhalten • Analyse von Metadaten in PDFs und Bildern • Monitoring-Tools, Alerts und spezialisierte Suchmaschinen • Rechtliche Graubereiche bei Gesichtserkennung und Scraping. Diese Folge richtet sich an Anwält:innen, Ermittler:innen, Journalist:innen und alle, die wissen wollen, wie digitale Spuren zu belastbaren Beweismitteln werden – und warum technisches Verständnis heute zur juristischen Kernkompetenz gehört. Podcastfolgen von Martin und Gregor: - [#689 Spurensuche im Netz: Die neue Macht von Open Source Intelligence (OSINT)](https://www.duribonin.ch/689-spurensuche-im-netz-die-neue-macht-von-open-source-intelligence-osint/) - [#691 Ich weiss, wie viel Du verdienst – Open Source Intelligence (OSINT)](https://www.duribonin.ch/691-ich-weiss-wie-viel-du-verdienst-open-source-intelligence-osint/) Links zu diesem Podcast: - Zu unserem Gast [Martin Steiger](https://www.linkedin.com/in/martinsteiger/), [Anwalt](https://steigerlegal.ch) und [Unternehmer](https://martinsteiger.ch/) für Recht im digitalen Raum, sowie Sprecher der [Digitalen Gesellschaft](https://www.digitale-gesellschaft.ch/uber-uns/kurzvorstellung-personen/) - Martin publiziert regelmässig auf [chaos.social](https://chaos.social/@martinsteiger), [bsky](https://bsky.app/profile/martinsteiger.ch) und führt spannende Gespräche in seinem Podcast [Datenschutz-Plaudereien](https://podcast.datenschutzpartner.ch) - [Interaktives Tool zur Ungleichheit - Hier die Armen, da die Reichen: So durchmischt ist Ihr Wohnort](https://www.tagesanzeiger.ch/armut-und-reichtum-in-der-schweiz-diese-karte-zeigt-wo-die-privilegierten-wohnen-898746224551) - Anwaltskanzlei von [Gregor Münch](https://www.d32.ch/personen) - Anwaltskanzlei von [Duri Bonin](https://www.duribonin.ch) - Titelbild [bydanay](https://www.instagram.com/bydanay/) - Das Buch zum Podcast: [In schwierigem Gelände — Gespräche über Strafverfolgung, Strafverteidigung & Urteilsfindung](https://www.duribonin.ch/shop/) Die Podcasts "Auf dem Weg als Anwält:in" sind unter https://www.duribonin.ch/podcast/ oder auf allen üblichen Plattformen zu hören
Ralph welcomes back Erica Payne, founder of Patriotic Millionaires, to update us on that group's latest efforts to save American democracy by lobbying to raise wages for workers and tax the rich. Plus, according to our resident constitutional expert, Bruce Fein, the count of Trump's impeachable offenses is now up to twenty-two and rising faster than a Space X rocket.Erica Payne is the founder and president of Patriotic Millionaires, an organization of high-net-worth individuals that aims to restructure America's political economy to suit the needs of all Americans. Their work includes advocating for a highly progressive tax system, a livable minimum wage, and equal political representation for all citizens. She is the co-author, with Morris Pearl, of Tax the Rich: How Lies, Loopholes and Lobbyists Make the Rich Even Richer.What we saw on January 20th, I believe, was the result of a global oligarchical coup who just took the Queen on the chessboard. When you've got three people whose combined worth is around a trillion dollars standing behind who is an unethical at least, criminal at worst billionaire president, Houston, we have a problem here. And the problem is not actually Donald Trump. The problem is the preconditions that led to the rise of a vulnerability to an authoritarian leader and an oligarchy. And that vulnerability was brought about by the actions of both parties over decades.Erica PayneIf you ran a business, Ralph, would you ever fire your accounts receivable department? No. It would be the last department you would cut. So then it says he's either stupid because that's what he's cutting, which I think is probably inaccurate. So if he's not stupid, then why is he doing it? And he's doing it for the same reason that lawmakers have hacked at the IRS budget forever—they don't want their donors to get taxed. They don't want their donors to be audited. And so they cut the cops. So all these folks who are griping about black Americans calling to defund the police are actually defunding the police that is keeping them in line and keeping them honest.Erica PayneAt a divided moment in America, I think we can agree that the federal government shouldn't tax people into poverty, and (to the extent necessary) rich people should pick up the difference.Erica PayneBruce Fein is a Constitutional scholar and an expert on international law. Mr. Fein was Associate Deputy Attorney General under Ronald Reagan and he is the author of Constitutional Peril: The Life and Death Struggle for Our Constitution and Democracy, and American Empire: Before the Fall.I start out with the fundamental idea of due process—you simply cannot deprive someone of liberty without giving them an opportunity to explain or to refute what allegations the government has made. And the reason why I start out with that, Ralph, is we've had an experiment in World War II with what happens when you have no due process. We did that with 120,000 Japanese Americans. No, we just said that they're all likely to commit espionage or sabotage, got to put them in concentration camps. We made 120,000 errors (and later apologized for it in 1988). So there's a reason due process is not simply an academic concept. It's essential to preventing these kinds of egregious instances of injustice from happening.Bruce FeinThe Democrats and a lot of liberal economists are not keeping up with the horror show that's going on. They don't use words like cruel and vicious. They don't turn Trump's words like deranged, crazed, corrupt on him. They're still using words like authoritarian practices, or problematic, or distressing, or disconcerting, or concerning. They're not catching up with the horror show here. That's why Trump continues to have a soliloquy. The Democratic Party is now having gatherings to see how are they going to collectively deal with Trump? How does a bank deal with a bank robber? They let the bank robber rob the bank and flee with the gold while they deliberate how they're going to deal with a bank robber they see coming into the bank?Ralph NaderNews 5/2/251. At the eleventh hour, Representative Jim Jordan – Chair of the House Judiciary Committee – pulled his measure to strip the Federal Trade Commission of its antitrust enforcement powers and consolidate those within the Justice Department, Reuters reports. “The House panel…had included the proposal in its budget package on Monday. During a hearing on the package…the committee passed an amendment that would remove the measure.” Trump's FTC Chairman Andrew Ferguson opposed Jordan's move and intervened with the White House. As Reuters notes, “The proposal mirrored the One Agency Act, a Republican bill that has gotten support from Elon Musk…[which] would effectively repeal the FTC's...authority to sue companies over unfair methods of competition, which the agency is using in cases against pharmacy benefit managers, Amazon…and John Deere.” In short, the FTC's antitrust powers survive today, but there is no guarantee about tomorrow.2. Yet, while avoiding the worst possible outcome on the corporate crime front, the Trump administration is still hard at work going soft on corporate crooks. Public Citizen's Rick Claypool reports “Two Wells Fargo execs had their fines reduced by 90% (related to the bank's accounting scandal) by Trump's [Office of the Comptroller of the Currency].” Claypool links to a piece in Radical Compliance, which explains that “David Julian, former chief auditor at Wells Fargo, saw his fines cut from $7 million to $100,000 [and] Paul McLinko, executive audit director, had his fines cut from $1.5 million to $50,000.” Both Julian and McLinko were part of the senior leadership team at Wells Fargo in the 2010s, when regulators “charged the bank with turning a blind eye to employees opening bank accounts without customer consent to hit sales quotas. That misconduct eventually led to a $3 billion settlement with Wells Fargo in 2020.”3. Lest you think the Democrats are in danger of seriously opposing Trump's policies, the Bulwark reports that House Minority Leader Hakeem Jeffries is putting the kibosh on the recent spate of Democrats' trips to El Salvador exposing the reality of the CECOT deportation scheme. This report alleges that “Cory Booker and the Hispanic Caucus were planning on going [to El Salvador],” but are no longer. Perhaps worse, Jeffries is not giving clear marching orders to the party rank and file. One Democrat is quoted saying “As a member of a party you need to be disciplined…They say, ‘Get on a plane,' ‘Don't get on a plane'—that's what you do. Nine out ten times you do what they ask. But you can't take that approach if you're not having regular communications… You have to be clear in messaging what the plan is and you have to do that regularly if you want to keep people in line.” This is just another example of Jeffries' weak and indecisive leadership of the caucus.4. Advocates are having more luck resisting the administration's overreach in court. On Wednesday, Mohsen Mahdawi – the Columbia student faced with deportation after being lured into an ICE trap with the false promise of a citizenship test – was freed by a federal judge, POLITICO reports. After the judge ordered his release, Mahdawi told the press “I am saying it clear and loud…To President Trump and his Cabinet: I am not afraid of you.” Mahdawi's ordeal is not over, but he will remain free while his case winds its way through the courts and a previous order blocked the administration from changing venues, meaning the case will proceed in the relatively liberal Second Circuit.5. Mahmoud Khalil also scored a major legal victory this week. The Huffington Post reports that the ICE agents sent to arrest Khalil did not, contrary to their false claims in court, have an arrest warrant. Amy Greer, a lawyer for Khalil, is quoted saying “Today, we now know why [the government] never showed Mahmoud [a] warrant — they didn't have one. This is clearly yet another desperate attempt by the Trump administration to justify its unlawful arrest and detention of human rights defender Mahmoud Khalil, who is now, by the government's own tacit admission, a political prisoner of the United States.” The ACLU, also defending Khalil, has now moved for this case to be dismissed.6. Despite these victories though, the repression of anything pro-Palestine continues. At Yale, Prem Thakker reports hundreds of students protested in advance of a speech by Itamar Ben-Gvir, Israel's radical National Security Minister who has previously been arrested many times for inciting racism and supporting pro-Jewish terrorism in Israel itself. Yet the university responded by “stripp[ing] the school's Students for Justice in Palestine Chapter…of its status as an official student group.” If students cannot even protest Ben-Gvir, what will the colleges regard as legitimate protest of Israel?7. In Yemen, Ryan Grim reports on CounterPoints that the Trump administration has been targeting strikes against the Houthis using data gleaned from amateur Open-Source Intelligence or OSINT accounts on X, formerly Twitter. Unsurprisingly, these are completely inaccurate and have led to disastrous strikes on civilians' homes, incorrectly identifying them as “Houthi bases.” One of these accounts is based in Houston, Texas, and another as far away as the Netherlands.8. According to a new World Bank report, Mexico reduced poverty more than any other Latin American country between 2018 and 2023. Not coincidentally, this lines up almost perfectly with the AMLO years in Mexico, which saw a massive increase in the Mexican minimum wage along with other social rights and protections. These policies are now being taken forward by AMLO's successor Claudia Sheinbaum, whose popularity has now surpassed even that of her predecessor, per Bloomberg.9. In Australia, Virginia Giuffre – the most outspoken accuser of Jeffrey Epstein and Ghislane Maxwell – has passed away at the age of 41, the BBC reports. Police concluded that Ms. Giuffre died by suicide and her family released a statement indicating that the “toll of abuse... became unbearable.” Yet, her death was preceded by a bizarre chain of events. On March 31st, the BBC reported that Ms. Giuffre's car collided with a school bus, sending her into renal failure with her doctors saying she had “four days to live.” The Miami Herald also reported “At the time of her death, Giuffre had been in a contentious divorce and child custody battle with her husband, Robert.” The family's statement continued “The death is being investigated by Major Crime detectives; [but] early indication is the death is not suspicious.” One can only hope more details come to light.10. Finally, in a different kind of bizarre story, embattled incumbent New York City Mayor Eric Adams – who has already given up on the Democratic primary and was running for reelection as an independent – will now appear on two new ballot lines “EndAntiSemitism” and “Safe&Affordable,” POLITICO reports. Adams has gone to great lengths to cultivate and maintain his support in the Orthodox Jewish community in New York and is seeking to highlight his strengths and undercut former Governor Andrew Cuomo. Apparently, Adams only needs to secure 3,750 signatures from voters by May 27 for each of these ballot lines, a shockingly low threshold for the largest city in America. These ballot lines will appear without spaces, coming in just under the wire for the city's 15-character limit on ballot lines.This has been Francesco DeSantis, with In Case You Haven't Heard. Get full access to Ralph Nader Radio Hour at www.ralphnaderradiohour.com/subscribe
Willkommen in der schönen neuen Welt der offenen Quellen: In dieser Folge von OSINT Studio diskutieren Matthias Wilson und Samuel Lolagar, wie sich Open Source Intelligence im Spannungsfeld zwischen Technologie, Verantwortung und gesellschaftlichem Wandel verändert. Was bedeutet es, wenn KI-generierte Inhalte kritisches Denken verdrängen, wenn Fake-Identitäten authentischer wirken als echte Menschen und wenn Aufklärung zur Selbstinszenierung wird?Wir sprechen über die zunehmende Rolle von Chatbots in der Propaganda, die Gefahr durch überambitionierte Laienanalysen, die ethischen Grenzen von OSINT4Good-Initiativen und die Frage, warum Tool-Kompetenz nicht Analysekompetenz ersetzt. Auch investigative Recherchen wie die Enthüllungen rund um internationale Scam-Netzwerke, das digitale Erbe von Kriminellen oder Datenpannen auf höchster sicherheitspolitischer Ebene kommen zur Sprache.Linkshttps://www.dutchosintguy.com/post/the-slow-collapse-of-critical-thinking-in-osint-due-to-aihttps://www.linkedin.com/pulse/so-you-think-can-drive-osint-matthias-wilson-mjgbf https://www.linkedin.com/posts/imavropoulos_socialengineering-securityawareness-activity-7312816130404835329-pxQWhttps://www.occrp.org/en/project/scam-empire/scam-empire-inside-a-merciless-international-investment-scam https://www.spiegel.de/ausland/chatgpt-und-perplexity-ai-russland-manipuliert-westliche-chatbots-fuer-seine-propaganda-a-7e276236-cac3-4f35-8ad4-40eaba1c8caf https://www.linkedin.com/posts/osintteam_how-do-you-pick-the-best-tool-for-your-project-activity-7312097811641114624-O9Phhttps://www.linkedin.com/pulse/osint4good-gone-bad-matthias-wilson-ehmtf/https://www.spiegel.de/panorama/bildung/usa-hunderte-gaststudierende-zur-ausreise-aufgefordert-a-afbba62a-111c-49d6-bfa2-93c6e1e29d5b https://www.wired.com/2017/02/guide-getting-past-customs-digital-privacy-intact/https://www.nytimes.com/interactive/2025/03/26/us/pedophile-hunting-violence.html https://www.bellingcat.com/news/2025/03/22/nowhere-to-run-the-online-footprint-of-an-alleged-kinahan-cartel-associatehttps://www.heise.de/news/Datenschutz-bedroht-viele-Wetter-Webcams-in-Oesterreich-10301464.htmlhttps://www.spiegel.de/international/world/pete-hegseth-mike-waltz-tulsi-gabbard-private-data-and-passwords-of-senior-u-s-security-officials-found-online-a-14221f90-e5c2-48e5-bc63-10b705521fb7https://netzwerkrecherche.org/international/guide-investigativjournalismus/ Feedback & Anregungen an feedback@osint.studio© 2025 Samuel Lolagar & Matthias Wilson
Thema in diesem Podcast ist OSINT - Open Source Intelligence. Gemeint ist die Beschaffung, Auswertung und Nutzung öffentlich zugänglicher Informationen. Oft fehlt es Strafverteidigerinnen an Geld für private Ermittlungen. Gerade bei amtlicher Verteidigung werden solche Auslagen meist nicht vergütet. OSINT kann hier helfen: man muss nur wissen, wo die Informationen schlummern. Gregor Münch nähert sich mit dem Rechtsanwalt Martin Steiger dem Thema an, indem sie sich zuerst einmal fragen, was nicht erlaubt ist: Darf ich bspw. Passwörter geleakter Datenbanken nutzen? Wie ist es, wenn man ohne eigenes Zutun mitlesen kann – wie es kürzlich dem US-Journalisten Jeffrey Goldberg passiert ist? Goldberg, Chefredaktor des Magazins The Atlantic, wurde versehentlich in einen Gruppenchat auf Signal eingeladen, in dem Mitglieder der US-Regierung militärische Angriffe im Jemen planten. Er konnte sensible Informationen in Echtzeit mitlesen – darunter Details zu Zielen, eingesetzten Waffen und dem Zeitplan. Und was gilt, wenn man gegenüber Behörden falsche Angaben macht, etwa um einen Interessennachweis vorzutäuschen? Als Strafverteidiger erhält man Einblicke in die unglaublichsten Fälle und arbeitet eng mit sehr unterschiedlichen und spannenden Menschen zusammen. Im Podcast [Auf dem Weg als Anwält:in](https://www.duribonin.ch/podcast) versucht der Anwalt [Duri Bonin](https://www.duribonin.ch) gemeinsam mit seinen Gesprächspartnern (Beschuldigte, Verurteilte, Staatsanwälte, Strafverteidiger, Gutachter, Opfer, Unschuldige, Schuldige …) zu ergründen, wie diese ticken, was sie antreibt und wie sie das Rechtssystem erleben. Behandelt werden urmenschliche Themen. Bei genauerem Hinsehen findet man Antworten auf eigene Fragen des Lebens und der Gesellschaft. Links zu diesem Podcast: - Zu unserem Gast [Martin Steiger](https://www.linkedin.com/in/martinsteiger/), [Anwalt](https://steigerlegal.ch) und [Unternehmer](https://martinsteiger.ch/) für Recht im digitalen Raum, sowie Sprecher der [Digitalen Gesellschaft](https://www.digitale-gesellschaft.ch/uber-uns/kurzvorstellung-personen/) - Martin publiziert regelmässig auf [chaos.social](https://chaos.social/@martinsteiger), [bsky](https://bsky.app/profile/martinsteiger.ch) und führt spannende Gespräche in seinem Podcast [Datenschutz-Plaudereien](https://podcast.datenschutzpartner.ch) - [Bundesgesetz über den Nachrichtendienst](https://www.fedlex.admin.ch/eli/cc/2017/494/de#art_13) (Nachrichtendienstgesetz, NDG) - [Rechtmässigkeit von Open Source-Ermittlungen durch Strafverfolgungsbehörden](https://eizpublishing.ch/ausgabe/risiko-recht-ausgabe-1-2024/), [Monika Simmler](https://www.linkedin.com/in/monika-simmler-525ba815a/) / [Giulia Canova](https://www.linkedin.com/in/giulia-canova-a71138180/) in Risiko & Recht – Ausgabe 1 / 2024 - strafprozess.ch zu [Google Dorking](https://www.strafprozess.ch/google-dorking/) - Anwaltskanzlei von [Gregor Münch](https://www.d32.ch/personen) - Anwaltskanzlei von [Duri Bonin](https://www.duribonin.ch) - Titelbild [bydanay](https://www.instagram.com/bydanay/) - Das Buch zum Podcast: [In schwierigem Gelände — Gespräche über Strafverfolgung, Strafverteidigung & Urteilsfindung](https://www.duribonin.ch/shop/) Die Podcasts "Auf dem Weg als Anwält:in" sind unter https://www.duribonin.ch/podcast/ oder auf allen üblichen Plattformen zu hören
Joining me live is UVU's director of open source intelligence center, Mary Kent.
Nell'era in cui Internet ha reso accessibili a chiunque una quantità pressoché infinita di dati e informazioni, svelare segreti, anticipare mosse di persone o intere organizzazioni, condurre investigazioni private o analisi di mercato sono diventate pratiche non solo comuni, ma facilmente realizzabili da chiunque abbia le capacità e gli strumenti adatti. Tutto questo attraverso l'Open Source Intelligence (OSINT), la disciplina che trasforma in attività di Intelligence la miriade di informazioni pubbliche che ogni giorno lasciamo online. Ma cos'è precisamente questa disciplina? Come funziona e a cosa serve? Quali sono i benefici, ma anche i pericoli che comporta? In questa puntata esploriamo il mondo dell'Intelligence nell'era dei dati aperti.Nella sezione delle notizie parliamo dell'installazione delle prime telecamere di riconoscimento facciale live permanenti nel Regno Unito, di un innovativo ponte neurale sviluppato in Cina per le lesioni spinali e del nuovo generatore di immagini di OpenAI che sostituirà DALL-E in ChatGPT.--Indice--00:00 - Introduzione01:01 - Londra installa telecamere di riconoscimento facciale (BiometricUpdate.com, Davide Fasoli)02:17 - Il ponte neurale cinese per le lesioni spinali (DDay.it, Matteo Gallo)03:44 - Il nuovo generatore di immagini di OpenAI (OpenAI.com, Luca Martinelli)05:32 - L'Open Source Intelligence nell'era digitale (Luca Martinelli)16:05 - Conclusione--Contatti--• www.dentrolatecnologia.it• Instagram (@dentrolatecnologia)• Telegram (@dentrolatecnologia)• YouTube (@dentrolatecnologia)• redazione@dentrolatecnologia.it--Brani--• Ecstasy by Rabbit Theft• Found You by Time To Talk, Avaya & RYVM
In this episode, recorded live from New York during the Digital Asset Summit, Sam sits down with Matt Wright — founder of Gaia and partner at EVM Capital.Matt has been building at the frontier of developer ecosystems, decentralized tech, and now AI agents. He walks us through his journey from organizing global hackathons to JP Morgan and ConsenSys, and finally to Gaia — a decentralized inference network for AI agents.We discuss how AI agents are about to become the dominant users of the internet, why the current stack is overly reliant on centralized providers like OpenAI, and how Gaia empowers developers to run their own sovereign LLMs with zero data leakage. Matt also breaks down Gaia's unique domain system, monetizing knowledge bases, and how Web3 primitives (like tokens, wallets, and identity) make agent coordination actually work.If you're curious about the intersection of AI and blockchain, and what the future of work might look like in an agent-native world, this is an episode you don't want to miss.Key Timestamps[00:00:00] Introduction: Sam introduces the episode, live from New York at the Digital Asset Summit, featuring Matt Wright from Gaia. [00:01:00] Matt's Background: From AngelHack to JP Morgan to ConsenSys, Matt shares how his journey led to building Gaia. [00:02:00] Developer Culture: Matt contrasts how developers in Asia and the West ship products—and how Gaia merges both. [00:05:00] Enter Gaia: The idea behind Gaia, born at the intersection of decentralized AI and blockchain. [00:08:00] AI Agents: Why the future of apps is agentic, and what most people don't yet understand about AI agents[00:11:00] Gaia Nodes: How Gaia enables anyone to own, host, and serve AI models without relying on centralized APIs. [00:14:00] Enterprise Data: Why 80% of the world's useful data lives off-chain—and how Gaia helps unlock it. [00:17:00] Current Use Cases: Matt shares examples from DeFi, Fitch Ratings, and other niche knowledge bases powered by Gaia. [00:20:00] Monetizing Knowledge: Gaia's domain system and how developers can turn knowledge into APIs for agents to query. [00:22:00] Challenges with Agents: The three major problems—hallucination, agentic complexity, and trust—and how Web3 solves them. [00:25:00] Web3 + AI Synergy: Why reputation, wallets, and governance unlock a new kind of agent-native internet.[00:28:00] Future of Agents: Speculating on where agent economies are heading—citizenship, sovereignty, and governance. [00:31:00] Day 1 of the AI Internet: Why agents will dominate the internet before they ever walk like humans. [00:34:00] Gaia's Ask: Gaia is live and open-source. Matt shares how developers can deploy nodes, build on top, and collaborate. [00:36:00] Wrap-Up: Sam closes the conversation and shares where listeners can connect and get involved with Gaia.Connecthttps://www.gaianet.ai/https://x.com/Gaianet_AIhttps://www.linkedin.com/in/matthewdavidwright/https://x.com/mateo_venturesDisclaimerNothing mentioned in this podcast is investment advice and please do your own research. Finally, it would mean a lot if you can leave a review of this podcast on Apple Podcasts or Spotify and share this podcast with a friend.Be a guest on the podcast or contact us - https://www.web3pod.xyz/
Code mit Impact und Meeresschutz digital: Der Einsatz von Software bei Sea Shepherd DeutschlandIn dieser Episode tauchen wir in die Welt des Meeresschutzes ein. Florian Stadler, seit 15 Jahren aktiv und Kampagnenleiter bei Sea Shepherd Deutschland, gibt uns Einblicke, wie Software beim Meeresschutz angewandt wird, um verlorene Fischernetze (sogenannte Geisternetze) aufzuspüren und zu bergen.Wir sprechen darüber, wie mithilfe Sonar-Scans und manueller Interpretation und (teils öffentlicher) Datenbanken der Meeresboden in der Ostsee systematisch untersucht wird, um illegale Fangmethoden und Umweltschäden aufzudecken. Dabei beleuchten wir auch Herausforderungen wie Schiffs-Ortungen, Bereiche von Cyber Security, wie z. B. AIS-Spoofing, den Datenaustausch mit anderen Organisationen, Infrastruktur auf einem Schiff von Sea Shepherd, wie Software-Entwickler*innen beim Meeresschutz helfen können und den oft überraschenden Einsatz von pragmatischen Lösungen wie händisch gepflegte Excel-Listen, selbst erstellten Google Maps-Layern oder Bildmaterial von öffentlich zugänglichen Webcams. Die Grenzen zwischen Hightech und altbewährter Technik mit pragmatischen Ansätzen verschwimmen hier ganz wunderbar.Bonus: Excel vs. Hightech – Wie kann man mit simplen Tools und digitaler Navigation ganze Meeresgebiete effizient kartieren?Unsere aktuellen Werbepartner findest du auf https://engineeringkiosk.dev/partnersDas schnelle Feedback zur Episode:
Erweitere dein Wissen über Cybersicherheit mit Cybersecurity ist Chefsache!
Erweitere dein Wissen über Cybersicherheit mit Cybersecurity ist Chefsache!
Erweitere dein Wissen über Cybersicherheit mit Cybersecurity ist Chefsache!
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com In spy movies, the federal government has unlimited funds for intelligence. In fact, it is always at its fingertips, no matter where it is located. Would it be so? In the real world, agencies have budgets that limit their ability to do everything from reducing fraud to ensuring the safety of a supply chain. One way to leverage the funds allocated for this task is to use Open-Source Intelligence or OSINT. During today's interview, Jason English from Babel Street shares his thoughts on how OSINT should be a part of the matrix where federal agencies can get practical intelligence. He starts by defining OSINT, which includes search engines, social media, public relations, news sources, web scraping, data analysis, and, yes, the dark web. This information is freely available to everyone, which gives it distinctive advantages. First, classified information can be costly to obtain. Rather than limiting your information sources to one area, OSINT will provide a much wider range of sources quickly. Further, transparency is becoming a more prominent theme in technology—by definition, one can review the origin of any piece of information to assure its veracity. When it comes to collecting, analyzing, and disseminating information, OSINT provides benefits that answer many of today's federal agency requirements.
We wanted to know: How was USDoD, the hacker behind major data breaches, unmasked? On this episode, we trace his journey from infiltrating FBI-linked networks to leaking sensitive data, and hear from OSINT specialist and Predicta Lab CEO Baptiste Robert, who used open-source intelligence to follow USDoD's digital trail, revealing what law enforcement missed along the way. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Summary Eliot Higgins (X; Wikipedia) joins Andrew (X; LinkedIn) to discuss the work of Bellingcat. Eliot founded the open-source investigative website in 2014. What You'll Learn Intelligence Bellingcat's approach to “investigative journalism” The rise of OSINT as a tool of journalism Bellingcat's relationship with intelligence agencies Case studies from Bellingcat's past, including the Skripal Case and the MH17 flight investigation Reflections Leading by example Accessibility and accountability And much, much more … Quotes of the Week “When I first started doing this work ... I would present geolocation and stuff on stage. The reaction was like I was doing magic tricks, but my point was that. This isn't magic – This is something that you can do and recreate and understand.” - Eliot Higgins. Resources SURFACE SKIM *SpyCasts* Digital Innovation and the Next Frontier of Intelligence with Jennifer Ewbank (2024) The Future of OSINT and the Intelligence Community with Jason Barrett (2024) U.S. Army Open-Source Intelligence (OSINT) with Dennis Eger & Shawn Nilius (2024) Ukraine & Intelligence: One Year On with Shane Harris (2023) DEEPER DIVE Books OSINT Techniques: Resources for Uncovering Online Information, M. Bazzell (2023) Deep Dive: Exploring the Real-world Value of Open Source Intelligence, R. L. Baker (Wiley, 2023) We Are Bellingcat: The Online Sleuths Solving Global Crimes, E. Higgins (Bloomsbury, 2022) Primary Sources Map of Civilian Harm in Ukraine (2024) Death of Sinwar Report (2024) The IC OSINT Strategy 2024-2026 (2024) DoS Open Source Intelligence Strategy (2024) MH17 Investigation (2019) Skripal Report (2018) *Wildcard Resource* The fable of Belling the Cat The inspiration behind Bellingcat's name, the moral of this story is simple – It's one thing to suggest a solution or idea, but it's a whole other beast to actually take action. Learn more about your ad choices. Visit megaphone.fm/adchoices
Summary Jennifer Ewbank (LinkedIn) joins Andrew (X; LinkedIn) to discuss the integration of technology within intelligence. Jennifer recently retired from her role as Deputy Director of CIA for Digital Innovation. What You'll Learn Intelligence The qualities and skills of great digital leadership Risk management in intelligence The roles, responsibilities, and emotional toll of the Chief of Station The integration of technology across CIA operations Reflections Humility and lifelong learning Leadership in dynamic arenas And much, much more … Quotes of the Week “Intelligence isn't about knowing exactly what's going to happen … It's about delivering a decision advantage to our policymakers. Decision advantage doesn't mean that I can tell you precisely what's going to happen and when. You never have perfect information, and you have to be able to move still. You can't be paralyzed by a desire to seek that last detail when, particularly in digital tech space, like the world is moving rapidly all around you.” – Jennifer Ewbank. Resources SURFACE SKIM *SpyCasts* The Future of OSINT and the Intelligence Community with Jason Barrett (2024) Cybersecurity in The White House with Camille Stewart Gloster (2024) Espionage and the Metaverse with Cathy Hackl (2023) How Artificial Intelligence is Changing the Spy Game with Mike Susong (2023) DEEPER DIVE Primary Sources The IC OSINT Strategy (2024) 2024 Report on the Cybersecurity Posture of the United States (2024) National Cybersecurity Strategy (2023) Ethical Frameworks in Open Source Intelligence (2022) *Wildcard Resource* ChatGPT isn't the only AI tool in our toolboxes anymore. In this episode, Jennifer mentioned Osiris, an AI tool that helps Agency staff analyze and sort mass amounts of information. If you're feeling similarly overwhelmed at work and looking for your own AI assistant, check out this list of the best AI productivity tools and start making your life easier! Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of the RISKGAMING Podcast, host Danny Crichton sits down with columnist Michael Magnani to dissect the explosive rise of legalized sports betting in America and its far-reaching consequences. The conversation then pivots to broader geopolitical topics, including the role of open-source intelligence in modern warfare and how technology is changing the defense landscape. They wrap the episode up with a look at Japan's election results and the shifting political dynamics that could alter the balance of power in the Indo-Pacific.
Former Spark host Nora Young is part of CBC's new Visual Investigations unit, a team that aims to publish stories examining disinformation, like AI deepfakes. With fabricated content becoming more sophisticated, she talks to Matt Galloway about the methods available to debunk them — including open source intelligence.
How is open-source data being used to uncover threats to human security, and what ethical challenges do practitioners face when working with open-source intelligence? In this episode, we delve into these questions with Henrietta Wilson, Visiting Research Fellow at the Centre for Science & Security Studies, King's College London. Henrietta, co-editor of the recently published book ‘Open-Source Investigations in the Age of Google', unpacks how digital tools have transformed the way we uncover, verify, and interpret publicly available data. This shift has opened new avenues for global justice, transparency, and accountability, but it also raises significant ethical challenges that require careful navigation. Liked the episode? Join Henrietta and the book's co-authors at King's College London for a captivating talk on open-source investigations on 1 October 2024! Sign up here: https://www.kcl.ac.uk/events/open-source-investigations-in-the-age-of-google
Summary Jason Barrett (LinkedIn) joins Andrew (X; LinkedIn) to discuss the integration of open-source intelligence into the American Intelligence Community. Jason is the first-ever OSINT Executive. What You'll Learn Intelligence Historical examples of OSINT The evolution of Open Source Intelligence The challenges and unique opportunities OSINT presents The future of OSINT within the Intelligence Community Reflections Trust and transparency Efficiency in intelligence gathering And much, much more … Quotes of the Week “We're living in an age when credibility and trust is really important to build. This is an opportunity for the IC to really build that trust, I think in important ways. So, it's an area I think you will see more of us being more transparent in our work.” – Jason Barrett. Resources SURFACE SKIM *SpyCasts* U.S. Army Open-Source Intelligence (OSINT) with Dennis Eger & Shawn Nilius (2024) Cybersecurity in The White House with Camille Stewart Gloster (2024) David Petraeus on Ukraine & Intelligence with the former CIA Director & 4* General (2023) Irregular Warfare & Intelligence with IWC Director Dennis Walters (2023) DEEPER DIVE Books OSINT Techniques: Resources for Uncovering Online Information, M. Bazzell (2023) Deep Dive: Exploring the Real-world Value of Open Source Intelligence, R. L. Baker (Wiley, 2023) Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence, N. A. Hassan & R. Hijazi (Apress, 2018) Primary Sources The IC OSINT Strategy 2024-2026 (2024) DoS Open Source Intelligence Strategy (2024) Ethical Frameworks in Open-Source Intelligence (2022) Open-Source Intelligence, Department of the Army (2012) Department of Defense OSINT Instruction (2010) *Wildcard Resource* You've probably practiced OSINT techniques many times before – Think, Facebook stalking your old college friends to see what they're up to. Many video games also involve the usage of open-source collection techniques: Return of the Obra Dinn (2018) is one such critically acclaimed video game. The game, set on an early 19th-century ship, challenges its player to solve the mystery of what happened to the crew onboard by piecing together scraps of information from journal entries and related documents. Learn more about your ad choices. Visit megaphone.fm/adchoices
Essential Safety Insights for Families In this episode of The Secure Dad Podcast, Andy discusses strategies for protecting your family with guest PJ Agness. PJ is the founder of Archangel Protective Intelligence, shares his journey into self-defense inspired by 80s cartoons and emphasizes the importance of proactive safety measures for children. They explore spy skills kids should learn, such as situational awareness and effective communication, and delve into the use of open source intelligence (OSINT) for maintaining family safety. For more from PJ Agness: www.pjagness.com Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Defend your home with FlipLok. Listeners get 20% off when using discount code SECUREDAD at checkout. 00:00 Introduction 03:11 Interview with PJ Agnes: Self-Defense Journey 07:18 Teaching Kids Self-Defense Skills 11:35 Spy Skills for Everyday Safety 16:24 Open Source Intelligence (OSINT) for Families 23:49 Future Trends in Open Source Intelligence 29:26 Conclusion and Final Thoughts The information, opinions, and recommendations presented in this Podcast are for general information only and any reliance on the information provided in this Podcast is done at your own risk. The views and opinions expressed by guests are those of the authors and do not necessarily reflect the official policy or position of The Secure Dad, LLC. The Secure Dad® is a registered trademark of The Secure Dad, LLC.
How can open source intelligence (OSINT) revolutionize your business strategies? Join us as we uncover the world of online intelligence with Cynthia Hetherington, the Founder and CEO of the Hetherington Group, who transitioned from being a public librarian to an intelligence expert. This episode of Women Leaders on the Move reveals how OSINT is the secret weapon behind successful business intelligence, from managing global vaccine distribution to optimizing supply chains.Our conversation with Cynthia Hetherington explores the multifaceted impact of OSINT in today's business landscape. We discuss how artificial intelligence is transforming search engines and how recognizing disinformation is crucial for navigating the digital world. For women entrepreneurs and small business owners, Cynthia emphasizes the "trust but verify" strategy, underscoring the importance of conducting thorough background checks to protect and strengthen business relationships.Key Takeaways:Understand the impact of OSINT on business intelligence and supply chain management.Learn how AI is changing search engines and the importance of recognizing disinformation.Discover the "trust but verify" strategy crucial for women entrepreneurs and small business owners.Embrace authenticity and persistence to stand out in a competitive job market.Gain insights into ethical and legal nuances of online research, especially for professionals transitioning from law enforcement to business roles.Quotes:"Google's never been here to be an intelligence apparatus. Google is here to sell us things in our general location. You need to know when you're being manipulated and when you aren't.""Trust, but verify. Your reputation, your product, and your livelihood count on it.""Awareness is the one thing that everybody wants and needs. You need to understand the threat against you."Don't miss this episode filled with practical tips and inspirational stories to guide your journey in mastering online intelligence and achieving business success. Keep shining your light bright. The world needs you.Thank you Cynthia for being our featured guest today!About Our Featured Guest:Cynthia Hetherington, MLS, MSM, CFE, CII, OSC is the Founder and CEO of Hetherington Group, a consulting, publishing, managed services, and training firm that leads in due diligence, corporate intelligence, and cyber investigations. Throughout her career, she has assisted clients on thousands of cases using online open sources and databases as well as executing boots-on-the-ground operations. Cynthia provides specialized training for investigative professionals through the OSINT Academy, and has authored many industry-leading books on conducting cyber investigations. Cynthia Hetherington on LinkedInhttps://hetheringtongroup.com/ Book: OSINT: The Authoritative Guide to Due Diligence.Connect with Host Natalie Benamou, Founder HerCsuite®Natalie Benamou is the host of "Women Leaders on the Move '' and the Founder of HerCsuite®, a powerful women's network providing connect circles for women's careers and businesses. She is dedicated to making it easier for women to achieve success in all aspects of their lives. Natalie is also the Founder and President of HER HEALTHX, a nonprofit focused on improving health outcomes for women.Natalie Benamou on LinkedInHerCsuite® on LinkedInThis show is sponsored by HerCsuite® Boards Retreat. Fast Track Your Board Readiness in only 2 ½ days. Exciting News! Coming soon- we are launching a new membership on our network platform for Women Leaders on the Move. Meet Guests from this show, network with amazing women and have monthly office hours with host Natalie Benamou. Join the waitlist.
Big shoutout to KASM for sponsoring this video. KASM workspaces supports the OSINT Community Efforts by providing the following products: Kasm Community Edition: https://kasmweb.com/community-edition Kasm Cloud OSINT: https://kasmweb.com/cloud-personal Kasm Workspaces OSINT Platform for Professionals/: https://kasmweb.com/osint Kasm Infrastructure/Apps for OSINT Collection: https://registry.kasmweb.com/1.0/ // MJ Banias' SOCIALS // LinkedIn: / mjbanias Cloak and Dagger Podcast (Spotify): https://open.spotify.com/show/6mT8zDM... The Debrief: https://thedebrief.org/podcasts/ Instagram: / mjbanias X: https://x.com/mjbanias Website: https://www.bullshithunting.com/ // Ritu Gill' SOCIALS // LinkedIn: / ritugill-osinttechniques OSINT Techniques website: https://www.osinttechniques.com/ Instagram: https://www.osinttechniques.com/ X: https://x.com/osinttechniques YouTube: / @forensicosint Forensic OSINT website: https://www.forensicosint.com/ TikTok: / osint.techniques // Rae Baker's SOCIALS // Website: https://www.raebaker.net/ LinkedIn: linkedin.com/in/raebakerosint X: https://x.com/wondersmith_rae // Eliot Higgins' SOCIALS // Bellingcat website: https://www.bellingcat.com/author/eli... X: https://x.com/eliothiggins // Books // The UFO People: A Curious Culture by MJ Banias: USA: https://amzn.to/3xP5Jme UK: https://amzn.to/4cOrzoK Deep Dive: Exploring the Real-world Value of Open Source Intelligence by Rae Baker and Micah Hoffman: USA: https://amzn.to/3xFN9gv UK: https://amzn.to/3zJSy6z We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News by Eliot Higgins: USA: https://amzn.to/3RXNa64 UK: https://amzn.to/4cvYP4B // YouTube video REFERENCE // Top 10 FREE OSINT tools (with demos): • Top 10 FREE OSINT tools (with demos) ... Deep Dive OSINT: • Deep Dive OSINT (Hacking, Shodan and ... Best Hacking Python Book: • Best Hacking Python Book? She Hacked Me: • She hacked me! // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:41 - Sponsored Section: KASM Workspaces demo 06:26 - Intro 06:46 - MJ's Journey in OSINT 11:14 - Starting an OSINT Company 11:55 - Teaching Background 12:34 - Years in OSINT 13:19 - Advice for People Starting Out 15:44 - What It Means to Do OSINT 16:54 - Recommended Tools for OSINT 19:03 - Meet Ritu Gil 19:09 - Characteristics of a Good OSINT Investigator 20:03 - Knowing When to Give Up 20:43 - Soft Skills vs Technical Skills 22:17 - Ritu's Advice on How to Get Started 23:24 - Are There Jobs in OSINT? 24:39 - Forensic OSINT Demo 26:41 - Tinder Vulnerabilities 30:51 - Next Guest Intro 32:04 - Rae Baker 32:33 - Tools Rae Uses 34:11 - From Graphic Design to OSINT 37:56 - Volunteering to Learn 39:10 - Next Guest Intro 40:10 - Eliot Higgins 40:19 - Eliot's Background into OSINT 41:44 - Bellingcat 44:27 - No Degree Needed to Start 45:37 - Useful Tools to Use 47:19 - Advice for People Starting Out 48:36 - Communities to Join 51:50 - Recommended Books 53:03 - How MJ Got the Job 55:53 - MJ Shares an OSINT Story 01:02:44 - Importance of a Team 01:08:15 - Conclusion 01:10:34 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
FREEDOM - LIBERTY - HAPPINESS SUPPORT DOC MALIK To make sure you don't miss any episodes please subscribe to either: The paid Spotify subscription here: https://podcasters.spotify.com/pod/show/docmalik/subscribe The paid Substack subscription here: https://docmalik.substack.com/subscribe ABOUT THIS CONVERSATION: Michael is the founder and editor of Actionable Truth. Michael describes his process of awakening here - https://open.substack.com/pub/actionabletruth/p/my-personal-journey-to-awakening. I don't know how I stumbled across his substack, but I was drawn to an article he wrote titled The Truth about Controlled Opposition - https://open.substack.com/pub/actionabletruth/p/the-truth-about-controlled-opposition. Imagine my surprise, when trying to find Michael's contact details I discovered that he and Ursula (a supporter, former guest and now friend) knew each other, and are both on the team of Actionable Truth. https://www.actionabletruth.media/about. Michael has since become a good friend and I love our regular chats. Michael describes himself as an experienced technologist and digital marketer with background in Information Systems Engineering, Information Technology and Cyber Security. He is passionate about doing research and deep-diving into complex topics including Open-Source Intelligence, Geopolitics, Cybersecurity and Data analysis. Michael was born in what was then the USSR and moved to Israel at the age of 4. He has been living in Australia since 2002. In this conversation, we mainly talk about controlled opposition but cover some other topics as well. For further details visit my website www.docmalik.com or my substack www.docmalik.substack.com I hope you enjoy the episode. Much love Ahmad x Links Substack Michael Ginsburg Substack Website Actionable Truth IMPORTANT INFORMATION AFFILIATE CODES Hunter & Gather Foods Hunter & Gather Foods Use DOC15 to get 15% OFF your first purchase with Hunter & Gather Foods, and DOC10 for 10% off all further purchases. IMPORTANT NOTICE Following my cancellation for standing up for medical ethics and freedom, my surgical career has been ruined. I am now totally dependent on the support of my listeners, YOU. If you value my podcasts, please support the show so that I can continue to speak up by choosing one or both of the following options - Buy me a coffee If you want to make a one-off donation. Join my Substack To access additional content, you can upgrade to paid from just £5.50 a month Doc Malik Merch Store Check out my amazing freedom merch To sponsor the Doc Malik Podcast contact us at hello@docmalik.com
Summary Dennis Eger (LinkedIn) and Shawn Nilius (LinkedIn) join Andrew (X; LinkedIn) to discuss open-source intelligence. Combined, the two have over six decades of service to the U.S. Army. What You'll Learn Intelligence What is Open-Source Intelligence How the US Army utilizes and collects OSINT OSINT across the Intelligence Community How OSINT has impacted the War in Ukraine Reflections The power of information and how you use it Cyber ethics And much, much more … Quotes of the Week “If [civilians are] taking a video and posting it, they become in the cycle … The amount of things that people do on the internet that leaves their data or their information out there – Their data becomes big part of the intelligence cycle and they probably don't even know that they're doing it.” – Dennis Eger. Resources SURFACE SKIM *SpyCasts* My Life in American Intelligence with Barry Zulauf (2023) Intelligence, Special Operations, and Strategy with Michael Vickers (2023) Ukraine & the Alliance with NATO's Assistant Secretary General for Intelligence David Cattler (2023) Irregular Warfare & Intelligence with IWC Director Dennis Walters (2023) *Beginner Resources* A Brief History of the US Army, R. Guina, The Military Wallet (2024) [Short article] What is Open-Source Intelligence? OSINT Dojo, YouTube (2023) [7 min. video] A Brief History of Open Source Intelligence, C. Colquhoun, Bellingcat (2016) [Short article] DEEPER DIVE Books OSINT Techniques: Resources for Uncovering Online Information, M. Bazzell (2023) Deep Dive: Exploring the Real-world Value of Open Source Intelligence, R. L. Baker (Wiley, 2023) Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence, N. A. Hassan & R. Hijazi (Apress, 2018) Primary Sources The IC OSINT Strategy (2024) Invasion of Ukraine on Google Maps (2022) Ethical Frameworks in Open-Source Intelligence (2022) Open-Source Intelligence, Department of the Army (2012) Intelligence Reform and Terrorism Prevention Act (2004) *Wildcard Resource* While OSINT may seem like the new kid on the intelligence block, its foundations have actually been around perhaps longer than any other -INT. During the Civil War, the Bureau of Military Information collected open-source information from Southern newspapers to track the Confederate army. Check out this letter from Abraham Lincoln citing intelligence gathered on the location of Southern troops. Learn more about your ad choices. Visit megaphone.fm/adchoices
Dive into the world of open-source intelligence (OSINT) in this episode, where we uncover how ordinary citizens use publicly available data to unravel some of the most complex global mysteries. From tracking conflicts in real-time to exposing the truth behind high-profile incidents like the downing of Malaysia Airlines flight MH17, discover how OSINT is revolutionizing the field of investigative journalism and transforming how we perceive and verify information.Advertising Inquiries: https://redcircle.com/brands
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individuals in your investigation. Learn more at https://pipl.com/ama
In this episode of The Cybersecurity Defenders Podcast, we take a close look at Open Source Intelligence with Mishaal Khan, Cybersecurity Practice Lead at Mindsight.Misshal is a jack of all trades and master of some! With a profound knack for thinking like the bad guys, Misshal harnesses his extensive knowledge—from the nitty-gritty of bits and bytes to intricate business processes. As a techie, Ethical Hacker, OSINT enthusiast, and Social Engineer, he leverages his diverse skillset to help organizations fortify their defenses and tackle real-world security challenges. You can find out more about his book, The Phantom CISO, on his website, here.And you can learn more about Operation Privacy here.
Leaders of top U.S. intelligence agencies have signed onto a plan to centralize and take better advantage of open source intelligence, or OSINT. The new OSINT strategy aims to make open-source an “the INT of first resort.” Those words, in the title of the strategy, are a tacit recognition that spy agencies have traditionally favored gaining intelligence from highly secretive sources – human intelligence, spy satellites, and electronic signals – rather than open-source data. I spoke with Jason Barrett, the open-source intelligence executive at the Office of the Director of National Intelligence, and Randy Nixon, the director of the open source enterprise within the CIA's Directorate of Digital Innovation, about the strategy's goals. They include centralizing OSINT data across the IC, cultivating a world-class OSINT workforce, and harnessing new AI and machine learning tools. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Leaders of top U.S. intelligence agencies have signed onto a plan to centralize and take better advantage of open source intelligence, or OSINT. The new OSINT strategy aims to make open-source an “the INT of first resort.” Those words, in the title of the strategy, are a tacit recognition that spy agencies have traditionally favored gaining intelligence from highly secretive sources – human intelligence, spy satellites, and electronic signals – rather than open-source data. I spoke with Jason Barrett, the open-source intelligence executive at the Office of the Director of National Intelligence, and Randy Nixon, the director of the open source enterprise within the CIA's Directorate of Digital Innovation, about the strategy's goals. They include centralizing OSINT data across the IC, cultivating a world-class OSINT workforce, and harnessing new AI and machine learning tools.
https://youtu.be/VaUsJvUMUgEhttps://open.lbry.com/@NaomiBrockwell:4/OSINT-photos:8Every picture and video you post spills secrets about you, maybe even revealing where you live. The process of connecting all these dots of our online activities is a practice known as Open Source Intelligence, or OSINT. It's the practice of using all the information available online such as public records, reviews we write, email addresses, usernames, location check ins, and social media, to link together the breadcrumbs of someone's digital life. Jose Monkey has 1.7 million TikTok followers, and shows us how he finds people's exact location just by using OSINT on their videos. We teach you best practices for posting photos and videos online, and how to make sure that you're not giving away more information than you intend.00:00 Every Pic You Post Spills Secrets01:11 OSINT: Breadcrumbs of your digital life02:22 Finding people's EXACT location from videos02:54 Tools to track people05:45 Tips to Protect Yourself When Posting09:23 Beware of the Culture of Oversharing09:55 ConclusionThe practice of using OSINT to piece together our online trail is incredibly powerful, and can lead curious minds right to our digital doorsteps.Special Thanks to Jose Monkey for his delightful expertise and contribution to this piece!You can find his channels here:https://www.youtube.com/channel/UCOZnlN6M4FVIm0_fbrEjUYQhttps://www.tiktok.com/@the_josemonkeyHow to remove metadata from photos:https://youtu.be/OSln3MliFyABrought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
Today, we discuss the deceptive world of the "Financial Hardship Department Scam," where unsuspecting Americans are tricked into revealing personal data with the false promise of government aid. Explore the intricacies of this scam and how to protect yourself from becoming a victim. This episode also sheds light on the alarming strategies of Russian Sandworm hackers and global brute-force attacks targeting VPN and SSH services, revealing a complex cybersecurity landscape. Original URLs: Financial Hardship Department Scam: https://cyberguy.com/privacy/the-unsubscribe-email-scam-is-targeting-americans/, https://malwaretips.com/blogs/financial-hardship-department-email-scam-explained/ Russian Sandworm Hackers: https://www.bleepingcomputer.com/news/security/russian-sandworm-hackers-pose-as-hacktivists-in-water-utility-breaches/ Cisco Warning on Brute-Force Attacks: https://thehackernews.com/2024/04/cisco-warns-of-global-surge-in-brute.html Follow us on Instagram: https://www.instagram.com/the_daily_decrypt/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags for the Episode: Financial Hardship Department Scam, cybersecurity, Russian Sandworm hackers, brute-force attacks, VPN, SSH, email scams, government subsidies scam, cyber threats, cyber protection, Mandiant, Cisco Search Phrases: How to protect against Financial Hardship Department Scam What is the Financial Hardship Department Scam Russian Sandworm hackers in US utilities Cisco alert on brute-force attacks Cybersecurity threats in 2024 Email scams involving government aid Preventing cyber attacks on VPN and SSH How Russian hackers disguise as hacktivists Identifying and preventing email scams Latest cybersecurity reports from Cisco and Mandiant Transcript Apr18 Americans are being targeted by a sophisticated scam from the Financial Hardship Department, which promises government subsidies and stimulus checks as a facade to steal personal information and money. Stick around cause we're gonna give them a call. Russian sandworm hackers, disguised as hacktivist groups, have infiltrated water utilities in the United States and Europe, executing sophisticated cyberattacks that manipulate public narratives in favor of Russia according to recent findings by Mandiant. And finally, Cisco has issued an alert on a sharp rise in global brute force attacks targeting VPN and SSH services, revealing a sophisticated threat landscape that exploits Tor exit nodes and various anonymizing proxies since March 18th of 2024. What steps can organizations take to protect their networks from these global brute force attacks? So in recent news, a concerning scam from the Financial Hardship Department is targeting Americans across the country. This was actually brought to my attention from my mother. She reported something suspicious to her IT department, which is me. She received an email with the subject that was her full name, and inside the email was a very compelling argument. That she was entitled to some sort of student loan forgiveness plan, and the money is available right away. And this specific scam isn't necessarily breaking news, but this type of scam, this category of scam, is very effective and very prevalent. And this is because of a thing called OSINT, or Open Source Intelligence, where people can use information they find online about you in order to get you to do things. So, if someone wrote you an email And they knew exactly how much student debt you had, and they knew your full name, and they knew you ran to school. You might be more enticed to give them a call, respond to the email, or even click a link. If you're interested in seeing this email and walking through all of the key indicators that this is not a legit email, and it is in fact a scam, I'm going to be posting a reel a little bit later today on our Instagram that we'll have the email and we're going to go through each one of the indicators that this is a scam so that you can help protect yourself against this scam. But just a high level, the email came from someone at hotmail. com. Nobody with any clout is going to email you from a personal email address. Step one. All right. Number two, there's a sense of urgency. It says that you have a case open, but for only one more day. So give us a call back at this number. And just for fun, I went ahead and gave this number a call using my google voice number and was ready to record it and talk to them and see what they were gonna try to get out of me and maybe give them some fake information. The email was received yesterday and since then the number has been decommissioned. Calling the scammer. Bummer. There are also some weird formatting issues with this email. And then at the bottom, it says you opted into advertising services, provides an address, and then it provides a URL to unsubscribe. This specific email is formatted so poorly that the URL doesn't even become clickable. But they're trying to get you on two directions here. They're trying to get you to call and give up your information. And they're trying to get you to click this unsubscribe link. Now that kind of gets your wheels turning, doesn't it? Most emails have unsubscribe links, and most of them are from emails you might not even recognize. You just want to get them out of your inbox. Now trust me, I am all for inbox sanitization and organization, but clicking unsubscribe links as a habit is a bad one. Clicking any links in an email is a bad habit. And yes, unsubscribe is URL that could take you wherever you want. And usually, when you're about to click it, you're kind of in a hurry, you're not really checking, you're not thinking about it. So attackers know this, and they're going to send you something you really don't want, and they're going to provide a link to unsubscribe. Probably don't click it. Instead, send it to spam. Send it to junk. Train your inbox to send that somewhere else where you don't have to worry about it. Even if the unsubscribe link isn't malicious, it can serve a different purpose. It can let attackers or scammers know that that email address is active. And might actually ramp up the amount of spam, scam emails, or newsletters you may get because people are interested in buying your email address if they know it's an active email address. So now you've just confirmed it, they might go sell it to some other people. It might actually increase the amount of spam you get. There is a service called unroll. me that can help consolidate and manage email subscriptions efficiently. It allows you to view all your subscriptions in one place and makes it easy to unsubscribe from them. Another thing you can do is use alias emails. So if you're an iPhone user, The iPhone will often prompt you to mask your email address. It's a good idea because you can delete that email address at any time. If you start getting spam from it, you can also use tools like fast mail or start mail, and just generate a new email address that forwards to your normal email address. This will also help protect you and your privacy online because they're not just mapping one email address to your identity. Now they have to map tons and tons to keep track of you. So it'll help reduce trackers on Google. It'll help reduce. The efficacy of certain attacks when your password is breached on the dark web. So for more tips and tricks, and for a further analysis on these scam emails, be Instagram later today. Cybersecurity firm Mandiant has exposed how the notorious Sandworm hacking group linked to Russian military intelligence, has camouflaged its cyberattacks by masquerading as hacktivist groups. The Russian ensemble, known by aliases such as Black Energy, Seashell Blizzard, and Voodoo Bear, has been active since 2009, and their operations are accredited to Unit 74455 of Russian's GRU. Mandian's latest findings suggest that Sandworm operates under several online personas to launch data leaks and disrupt operations. Notably, three hacktivist branded telegram channels named Zaxnet Team, Cyber Army of Russia Reborn, and SolSopec, that's Russian, have been instrumental in disseminating pro Russian narratives and misleading the audience about the origin of the cyberattacks. These personas act independently, yet share a common goal of aligning their activities with Russian interests. So, before we move on, just a quick note on hacktivism. There are a few main motivators for attackers when placing an attack. Money, power, fame. And activism is a pretty popular one. So to help give an idea of what a hacktivist organization would be like, it's maybe a pro Ukraine organization that's working to spread the truth about what's going on in a foreign war, and so they might be trying to actually hack the Russian government to help Ukraine, or something like that. Their motivation is not money, so they're not out there trying to get credentials to their bank accounts and stuff like that. They're trying to work towards their organization's mission, which is to spread the truth about foreign wars in favor of a certain country. So these Russian attackers that are responsible for many attacks on U. S. critical infrastructure, especially water utilities, are gaining footholds by pretending to be a hacktivist group. Maybe they're pro Russia, maybe they're pro Ukraine. They're doing what they can to try to sway public opinion in Russia's favor, which involves all sorts of propaganda that I'm not even aware of. But Mandiant's report extends beyond the facade of hacktivism. They have traced back multiple cyber incidents to Sandworm, including attacks on water utilities in the U. S. and Poland, and hydroelectric facilities in France. The authenticity of these intrusion remains under investigation, but confirmation of related malfunctions by U. S. utility officials lends proof. Furthermore, Sandworm's influence operations are designed to bolster Russian wartime objectives by seeding misinformation and creating an illusion of widespread support for the war. The sophistication of these tactics illustrates a strategic shift from direct sabotage in Ukraine, where they targeted critical infrastructure like state networks and the power grid, to a more nuanced cyber espionage and intrusion. influence operations. Mandiant also highlights APT44's activities over the past year including targeting NATO countries electoral systems and engaging in intelligence collection to aid Russian military efforts. The threat posed by APT44 is severe, with ongoing operations focused on Ukraine and an elevated risk of interference in upcoming national elections and significant political events worldwide. So this election season, especially in the United States, is going to be absolutely crazy. The simplicity of access that these foreign, quote, hacktivists or propaganda pushers have over the United States is huge. It's palpable. They can just create TikToks about something you're interested in, which is Ukraine and the things that are happening in this foreign war, and you share it, and the more it gets shared, the more validity it accumulates in people's eyes. And this rapid consumption of social media has almost completely forgotten about citing sources or doing any sort of further research into what you just saw on a 60 second video clip. So I encourage you personally to, I mean, first of all, don't spend too much time on social media. If you get, if you catch yourself doom scrolling, try to get off and go on a walk. And second of all, think about everything you watch as if it were a lie. How could this video be lying to you right now? How could this video be stretching the truth? You know, are these videos actually shot where they are? Are they in front of a green screen? What sources do these people have? to claim what they're saying. Is what they're saying promoting a specific narrative? Maybe for Russia, maybe for Ukraine. And if so, that increases the likelihood that what they're saying is stretched or slightly untrue. So just as we have to look at every email with a lot of scrutiny, make sure we don't click any bad links, we also have to look at everything we consume because our brains are very vulnerable to what we see. And the internet right now is just pushing what we already believe, further enforcing our misbeliefs. There's been a notable spike in brute force attacks globally, as reported by Cisco. Specifically targeting devices such as VPNs, or virtual private networks, web application authentication interfaces, and SSH services. Cisco Talos experts pinpointed that these attacks have been originating from Tor exit nodes and various anonymizing tunnels and proxies since at least March 18th of 2024. The implication of these attacks are serious, potentially leading to unauthorized network access, account lockouts, or even denial of service conditions. A range of devices have come under siege, including popular VPN solutions like Cisco Secure Firewall VPN, Checkpoint, Fortinet, SonicWall, along with RD web services and brands such as Mikrotik, Draytek, and Ubiquiti. Stomp's foot on Ubiquiti. Cisco Talos has identified that the brute forcing attempts not only utilize generic credentials, but Also valid usernames tied to specific organizations, indicating a methodical approach to this cybersecurity threat. The attack traffic, as analyzed, predominantly flows through known proxy services such as TOR, VPNgate, IPDEA proxy, BigMama proxy, SpaceProxies, NexusProxy, ProxyRack, etc. And details on the IP addresses and the credentials used in these attacks have been compiled and made accessible for the concerned parties to bolster their defenses. So check out the show notes if you want more IOCs of this, so that you can maybe set up some signature detections or behavior detections, etc. In parallel to these brute force incidents, Cisco has raised alarms about password spray attacks, etc. targeting remote access VPN services as well. This trend was highlighted alongside a recent disclosure from Fortinet FortiGuard labs reporting the exploitation of a patched vulnerability in TP Link Archer AX21 routers by DDoS botnet malware facilities. Which brings us back to our SoHo days, right? If you're running one of these routers, make sure it's patched. Make sure your home router is up to date. You don't want to be getting DDoS'd by a botnet. Or you don't want to be part of the botnet that does the de tossing, excuse me. Security researchers, Cara Lin and Vincent Lee from FortiGuard Labs underscore the continuous threat posed by botnets, which exploit IOT vulnerabilities relentlessly. They strongly advise users to remain vigilant against DDoS botnets and to apply patches promptly. Cisco has provided several recommendations to mitigate the risks associated with these type of cyberattacks. These include enabling logging, okay, securing default remote access VPN profiles, and blocking connection attempts from identified malicious sources. Specific guidance involves implementing interface level ACLs using the shun command and configuring control plane ACLs to further fortify network defenses against unauthorized access attempts. Moreover, Cisco suggests considering additional hardening implementations for RAVPN, such as adopting certificate based authentication to enhance the security posture against these ongoing cyber threats. So I will definitely be taking a. Much deeper look at these IOCs for my own personal network, because yeah, this can apply to enterprises and this can apply to tech enthusiasts who set up VPNs to access their own home network. So let's, uh, not to point any fingers at myself, but that's definitely something I want to avoid being compromised. So if you're hearing this, IOCs in the show notes and let's stay ahead of this. And that's all we got for you today. Tomorrow, we're going to be releasing just a discussion episode about the key takeaways from HackspaceCon, which occurred last weekend. The two co hosts from this podcast were lucky enough to be able to attend and boy, were we inspired. So if you're interested in hacking satellites or what kind of vulnerabilities satellites have. Or other things that I never considered from a non space background. Be sure to check that episode out tomorrow.
GUEST: Anastasiia Marushevska - Communications expert, speaker, writer, and traveller. ---------- About the report: This analytical report is dedicated to reviewing the origin and modifications of the Russian history-based propaganda that aims to legitimise the full-scale invasion of Ukraine. The research provides a comprehensive analysis of the Russian historical myths that seek to distort Ukrainian history from the middle ages to the ongoing all-out war, covering Russia's claim for Ukraine's mediaeval heritage and false primacy in establishing the Orthodox Christianity in Eastern Europe, the myth of 'reunification' of Russian and Ukrainian nations, the history-based propaganda concerning Russia-occupied territories of Ukraine, the World War Two-related propaganda and instances of disinformation related to the ongoing invasion of Ukraine. Relying on methods of scientific analysis, source verification, analytical interpretation and Open Source Intelligence, the report accompanies the historical review of the analysed myths with the respective ideological implication and sources the research with specific examples of their use in Russian propaganda. ---------- LINKS: https://www.pr.army/ https://www.ukrainer.net/en/ https://deportation.org.ua/ https://www.linkedin.com/company/pr-army/ https://www.linkedin.com/company/ukrainer/ https://www.linkedin.com/company/where-are-our-people/ https://www.nato.int/cps/en/natohq/115204.htm ---------- WATCH NEXT: Oleksandr Kraiev https://youtu.be/tbucZuR6CqI Eugen Fedchenko https://youtu.be/YDi5IKtlv1M Valeria Kovtun https://youtu.be/l7zw1L12ZVg Oleksandra Tsekhanovska https://youtu.be/sgwt2XwIS3k Olga Tokariuk https://youtu.be/b6Y0lHUqpeo ---------- PLATFORMS: Twitter: https://twitter.com/CurtainSilicon Instagram: https://www.instagram.com/siliconcurtain/ Podcast: https://open.spotify.com/show/4thRZj6NO7y93zG11JMtqm Linkedin: https://www.linkedin.com/in/finkjonathan/ Patreon: https://www.patreon.com/siliconcurtain ---------- Welcome to the Silicon Curtain podcast. Please like and subscribe if you like the content we produce. It will really help to increase the popularity of our content in YouTube's algorithm. Our material is now being made available on popular podcasting platforms as well, such as Spotify and Apple Podcasts.
I recently spoke at the Triangle Content Creators Meetup in Raleigh, NC, about using OSINT techniques to locate and research your next guest. OSINT stands for Open Source Intelligence. As a journalist, I've teamed up with brilliant hackers like Mishaal Khan and Michael Bazzell to uncover new information about my subjects. In this talk, I explain how Alan Logan and I exposed Frank Abagnale and how Mishaal Khan and I investigated the Stalker case. I thought you might find this interesting. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Today, I am joined by Matt Williams to talk about Open Source Intelligence, getting better information and opting out of the fear-based news cycle while maintaining situational awareness. Featured Event: SelfRelianceFestival.com/Webinar Sponsor 1: EMP Shield, Coupon Code LFTN Sponsor 2: DiscountMylarBags.com Show Resources https://www.knightsbridge.ltd/ https://www.twitter.com/kbr_intel Global Hotspot Report and Briefing - $14.95 (email only 5 days a week)/$24.95 (with weekly 60-90m briefing call) Coupon Code LFTN for a free month to try it out!! Matt Williams is the head of intelligence operations for Knightsbridge Research, Ltd., an open-source intelligence (OSINT) company focused on global hotspots. He spent over a decade in Wall Street research and financial operations, later moving to an executive position at a midsized Texas firm. He's learned and applied these techniques in both personal and professional instances for over 20 years. Matt works from his ranch in North Texas raising cattle, gardening, and watching tornados from the front porch. Make it a great week GUYS! Don't forget about the cookbook, Cook With What You Have by Nicole Sauce and Mama Sauce. Community Mewe Group: https://mewe.com/join/lftn Telegram Group: https://t.me/LFTNGroup Odysee: https://odysee.com/$/invite/@livingfree:b Advisory Board The Booze Whisperer The Tactical Redneck Chef Brett Samantha the Savings Ninja Resources Membership Sign Up Holler Roast Coffee Harvest Right Affiliate Link
Rae, aka @Wondersmith_Rae is back! After chatting about maritime OSINT in episode 75, Rae came back to discuss her book "Deep Dive - Exploring the Real World Value of Open Source Intelligence" and to talk about what skills or mindset is important in the OSINT world. We also talked about how to practice your OSINT skills in a realistic way by using Kase Scenarios, a learning site she built along with Espen Ringstad.
Host Bidemi Ologunde spoke with Ileana Damaso for the second time on TBP. Ileana is an open-source intelligence (OSINT) aficionado and the conversation touched on ways to stay safe online and on social media, as well as how she uses OSINT to assist with Amber Alerts investigations and other cyber investigations. She was previously a guest on TBP (Episode 145 - May 4, 2022).Support the show
Our guest host Stephanie Usry Bellistri sits down with Aaron Brown, associate founder at 2430 -- a nonprofit dedicated to defending American innovation, industry, and critical technology against foreign adversaries. Aaron has over two decades of experience in law enforcement, Army Special Operations, and national security, including as a senior operations officer and field leader at the Central Intelligence Agency. Aaron is a proven problem solver and innovator, with experience leading complex, dynamic, and multimillion dollar intelligence missions across the globe, in war zones, austere environments, throughout the Near East, Eastern Europe, and Asia.Aaron is a recognized expert in the exponential risk of surveillance technology. He has advised numerous intelligence community programs about such risks and developed advanced solutions for this rapidly growing threat–hundreds have attended his sensitive talks on technology, including CIA executives and senior leaders from the Special Operations community. Aaron‘s final role at CIA was as Deputy Chief of Operations for Southeast Asia, where he gained deep regional expertise.
Constellations, a New Space and Satellite Innovation Podcast
On the Constellations Podcast, we'll discuss the DoD using commercial space capabilities, from launch to ISR data. During this episode, Dave Gauthier, Chief Strategy Officer, GXO, Inc., will discuss the challenges of DoD acquisition methods, the shift towards information services and leaning on the commercial industry for the critical advantage. The Space Force Commercial Services Office looking at bringing capabilities in as fast as their ready and incentivizing industry to work with the government to address the risks and options companies face. In this episode, David explains the power of electro-optical, including innovative solutions going beyond what the human eye can see, and provides example applications such as aggregating optical imagery with other forms of data such as remote sensing to gain better insight.
L'OSINT est partout. Dans les conflits, la lutte contre les fake news, la guerre économique. OSINT, signifie Open Source Intelligence autrement dit renseignement basé sur des sources ouvertes. C'est une discipline qui explose : elle a ses formations, ses spécialités et ses praticiens reconnus. Dans cet épisode de Control-F, Alexis Pinon, qui dirige la cellule OSINT chez Forward - grand cabinet d'intelligence économique - nous démontre l'efficacité du renseignement ouvert.Retrouvez tous les détails de l'épisode ici, écoutez les autres épisodes de Control F et inscrivez-vous à notre newsletter. L'équipe : Écriture et présentation : Frédéric FillouxMontage et réalisation : Jules Krot Musique et habillage : Emmanuel Herschon / Studio Torrent Crédits image : Anne-Laure Chapelain et L'Express Logo : Anne-Laure Chapelain / Thibaut Zschiesche Pour nous écrire : laloupe@lexpress.fr Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
Day 599.Today, we bring you news of Putin's visit to China and look at how Russia is using a ghost fleet in the Black Sea to circumvent regulations on maritime transit through the Bosporus in a time of war. Contributors:Dominic Nicholls (Host, Associate Editor, Defence). @DomNicholls on Twitter.Francis Dearnley (Assistant Comment Editor). @FrancisDearnley on Twitter.Jack Crawford (Research Analyst from RUSI's Open Source Intelligence and Analysis group). @Rusi_org on Twitter.Explore more: Rusi: rusi.orgFind out more: Subscribe to The Telegraph: telegraph.co.uk/ukrainethelatestEmail: ukrainepod@telegraph.co.ukSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Open-source intelligence (OSINT) and satellite imagery have changed the way civil organizations understand and evaluate nuclear arsenals and delivery systems — and the way governments interact with a changing balance of transparency and secrecy. Join us as we break down new developments in OSINT technology, how OSINT analysis can be used in nuclear weapons verification and the challenges ahead in regulating its use. Host Farah Sonde speaks to Decker Eveleth, Graduate Research Assistant at the James Martin Center for Nonproliferation Studies; Marcy Fowler, Research and Analysis Manager for Open Nuclear Network; Matt Korda, Senior Research Fellow for the Nuclear Information Project at the Federation of American Scientists; and Dave Schmerler, Senior Research Associate at the James Martin Center for Nonproliferation Studies. Music from www.bensound.com Show Notes: The Glory of Youth (Chinese Rocket Force TV Show) trailer: https://youtu.be/yXhIbqaMkCU?si=6m0GlALSyWf_BYpA Open Nuclear Network's Korean Peninsula Analysis Centre: https://analysis.opennuclear.org/
If you've been listening to this show for a while, you'll know that we've touched on the topic of Open Source Intelligence (otherwise known as OSINT) several times. It is an area of information security that penetration testing that's been getting quite a bit of attention over the past several years. When you think about the digital world we live in, where we have a proliferation of personal, organizational, and governmental data on the internet...and the simple fact that data likes to leak…we can safely predict that OSINT investigation techniques will continue to be in demand. On this episode, Perry sits down with Rae Baker. Rae is the author of the book Deep Dive: Exploring the Real-world Value of Open Source Intelligence, which was released in April of this year from Wiley publishing. In this discussion with Rae, you'll hear a bit about her career pivot to OSINT specialist from being a graphic designer, how creativity fuels her job, advice for aspiring cybersecurity and OSINT professionals, and a lot more. Guest: Rae Baker (LinkedIn) (Twitter) (Website) Books and References: Deep Dive: Exploring the Real-world Value of Open Source Intelligence, by Rae Baker (Amazon Associate link) Kase Scenarios: https://kasescenarios.com/ The OSINT Curious project TraceLabs YouTube Playlist from the 2022 SANS OSINT Summit YouTube video by The Cyber Mentor: Learn OSINT in 4.5 Hours Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html Perry's Books (Amazon Associate Links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com
Ukraine's Radical WarThanks to all of you that have listened to the first episode of Behind the Lines and to all of those of you that are joining this new podcast for the first time. We are taking a weekly look at a different aspect of current geopolitics. This week, it's how the information age has transformed warfare, and particularly how it has transformed warfare in Ukraine.Russia's war on Ukraine is the most online in history. The smartphone has become the way the war is recorded and transmitted, and it is the way we consume news of the war. But it is also a weapon. The smartphone has become part of the kill-chain, with Ukrainian civilians uploading targeting information via secure servers that are used by Ukrainian military to direct their artillery fires against the Russians. How do we understand this new kind of radical warfare?Dr Matthew Ford, an Associate Professor of War Studies at the Swedish Defence University, is currently writing the book War in the age of the Smartphone to be published by Hurst in 2024. Matthew is co author with Andrew Hoskins of Glasgow University of the book Radical War about how the digital age has revolutionised modern warfare. He used to be a strategic analyst at the Defence Science and Technology Laboratory (DSTL) and has recently been undertaking Open Source Intelligence work for the UK government on the Ukraine war. We discussed what is different about the Ukraine war, how the smartphone enlists civilians, both inside and outside Ukraine, and how it shapes how we talk about and understand that war.Matthew can be found on Twitter @warmatters and his book is available here: https://www.hurstpublishers.com/book/radical-war/You can find me on Twitter @snellarthur and you can find my Substack on some of these, and related issues here https://arthursnell.substack.com/Thanks again for listening to Behind the Lines. If you are enjoying it, please spread the word and give us a positive review. See you next time!Vyner Street Productions Hosted on Acast. See acast.com/privacy for more information.
Brady Africk was nearly a year into his role as a media relations associate at AEI when Russia's full-scale invasion of Ukraine took place. Feeling struck by the wrongness of the war, as he puts it on the podcast, he decided to harness his interest in the intersection between foreign policy and tech by publishing satellite imagery that tracked Russia's activities. Over a year later, Africk's maps have been featured in major news outlets and are now a monumental asset to the war—for fellow experts, personnel on the frontlines, and people simply following events from home. On this episode of The Eastern Front, Africk joins Giselle, Dalibor, and Iulia to discuss what satellite imagery has taught him about the battlefield, US support, and where Ukraine might be headed, as well as how open-source intelligence has changed people's understanding of the war—for better and for worse.Show notes: Sign up for The Eastern Front's bi-weekly newsletter here and follow us on Twitter here. "Ukraine Maps Show the Price of Allies' Hesitation" by Brady Africk.
Pete James is a retired law enforcement Officer with a 25-year career in the service. He is also a Navy veteran, computer forensics expert, privacy specialist, and a skilled Open-Source Intelligence investigator with experience investigating thousands of criminal, civil, and corporate cases. Pete also is the found of OfficerPrivacy.com, a company that removes officers' private information from data-broker websites to keep officers safe from those seeking to harm them. Follow Pete:Website: https://officerprivacy.com/homepageInstagram: @Officerprivacy The Be Effective Podcast with Adam Haidary, the CEO & founder of PolicePosts and Effective Fitness Training. Discussing everything from law enforcement, training, current critical incidents, and wherever the conversation goes.Instagram: @be_effectivepodcast@effective.fitnesstraining@policeposts@efcombativesEffective Fitness Combatives (EFC)Email: jay@effective.fitnessIG: @efcombativeswww.efcombatives.comWebsite: www.effective.fitnessEmail List: https://www.effective.fitness/policeposts-email-listSponsors:OfficerPrivacy.com: Anyone with an internet connection can quickly find your home address. Take action and protect you and your loved ones from Data Brokers and online databases by signing up with Officer Privacy today.https://officerprivacy.com/beeffectiveOfficerPrivacy.com has made it easy to delete your information from the internetEffective Fitness Training Program: (Effective Fitness)Effective Fitness Training {14 Day Free Trial} + CombativesUse code: “podcast” for 10% off for life
OSINT is the gathering and analysis of publicly available data from unlimited and all-encompassing sources. This new tool is shaping the frontlines of war, terror, and other geopolitical threats. Open Source Intelligence is a tool, and like any tool, its purpose and morality depend on how it's used. Analysts use open sources to find illegal activity and identify threats. Bad actors use it to plan and target networks through hacking and cyberterrorism. Ukraine has used geo-location from Russian soldiers sending pictures back home to figure out the location of Russian troops. Companies benefit from it in employee screening, research, and analytics. OSINT is changing the nature of geopolitical threats – and the defense against them. How will this powerful tool be used next? Altamar hosts Peter Schechter and Muni Jensen are joined by Arthur Bradley, Senior OSINT Analyst at Tech Against Terrorism. Altamar's ‘Téa's Take' by Téa Ivanovic examines how open sources have changed the way we all consume news. ----- Produced by Simpler Media
More: www.TheCarljacksonshow.com Facebook: https://www.facebook.com/carljacksonradio Twitter: https://twitter.com/carljacksonshow Parler: https://parler.com/carljacksonshow http://www.TheCarlJacksonPodcast.com See omnystudio.com/listener for privacy information.
On this episode of CyberWire-X, we dive into the essential role of open-source intelligence in identifying cyber and physical threats and reducing risk across your organization. The CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table members Dr. Georgianna Shea, CCTI and TCIL Chief Technologist at the Foundation for Defense of Democracies, and Bob Turner, Field CISO – Education at Fortinet. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor risk intelligence firm Flashpoint's Chief Intelligence Officer Tom Hofmann. They explore the foundational importance of open source intelligence, which includes social media platforms and geospatial data and insights. Plus, they explore real-life examples of how organizations, from governments to commercial enterprises, are leveraging open source intelligence and technology every day to protect their people, places, assets, and critical infrastructure.
Six months have passed since Russia invaded Ukraine. It is arguably the most transparent conflict ever, thanks to publicly available satellite data and social media. How has open-source intelligence (OSINT) shaped the war? The Economist's defence editor Shashank Joshi examines the technologies behind the OSINT revolution, and how this new era of openness is changing warfare. Alok Jha hosts.For full access to The Economist's print, digital and audio editions subscribe at economist.com/podcastoffer and sign up for our weekly science newsletter at economist.com/simplyscience. Our GDPR privacy policy was updated on August 8, 2022. Visit acast.com/privacy for more information.