POPULARITY
Categories
Stefano Ritondale is the Chief Intel Officer for Artorias, a bespoke OSINT collection company that uses AI to democratize open source intelligence for the common person. Artorias has launched their new app SitRep available on both IOS and Android platforms. In this episode we get in to exactly what SitRep does and what's coming soon for both Artorias and the app! Also check out the Artorias podcast BLUF. You can find the podcast here https://podcasts.apple.com/us/podcast/bluf-artorias-podcast/id1776391188 Look for another upcoming episode with Stefano soon! You can find Artorias here https://www.artorias.com You can find the show sponsor Rally Point ST here https://rallypointst.com You can find this show's website here https://www.thedistinguishedsavage.com You can find more info on Mountain Readiness here https://www.mountainreadiness.com
As featured in Top Cyber News Magazine's 2022 40 Under 40, Thomas Marr is an experienced information security professional with a lengthy history of supporting organizations ranging from tech startups to Fortune 500 companies to the United States Department of Defense (DoD). Thomas is also a proud veteran of the United States Army where he served on active duty as a Military Intelligence Analyst, specializing in signals intelligence (SIGINT) and open source intelligence (OSINT).Thomas actively provides technical expertise to information security community projects as a Subject Matter Expert (SME) who evaluates industry-respected credentials on CompTIA's Certification Advisory Committee for Cybersecurity, as a technical reviewer for global technology book publisher Packt, and as a mentor to junior information security professionals in his free time.
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individuals in your investigation. Learn more at https://pipl.com/ama
Michael Idov, author of The Collaborators, joins Spybrary to discuss the spy novel everyone in our community is raving about. In this in-depth conversation, Michael shares how his Soviet upbringing, real-world intelligence events like the Ryanair Belarus 'hijacking' incident and Moscow taxi hacker chaos, and his love for British espionage fiction shaped his gripping debut spy novel. We also dive into his work on Deutschland 83, Deutschland 89, his admiration for OSINT warriors like Bellingcat, and his love letter to cities like Riga, Berlin, and London.
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач Дзеркало тижня, на Radio NV про наступ рашистів на Харківщину і Сумщину, що відомо про просування ворога в Сумській області, підготовку рашистів до широкомасштабного прориву, ситуацію на Дніпропетровщині, бої на Покровському напрямку.Ведуча – Юлія Петрова
Send us a textThe digital forensics world isn't slowing down — and neither are we. In this episode, we celebrate Heather's well-deserved recognition as Cellebrite's Mentor of the Year 2025. Naturally, there were a few speech mishaps and, somehow, a bear raiding Heather's bird feeder (yes, actual wildlife). But between the chaos, we get serious about the fast-changing landscape of digital evidence collection.We dig into Amazon's decision to remove the "do not send voice recordings" setting from Echo devices — meaning all voice requests now head straight to the cloud for AI training. It's part of a growing industry trend, raising huge privacy red flags. We also unpack a study showing AI search engines misattribute sources at rates over 60%, and discuss how leaning too hard on generative AI risks dulling the critical thinking that digital forensics demands.On the technical front, Christian Peter reveals that some forensic tools alter or delete unified logs during extraction — a serious concern for evidence integrity that can compromise investigations before they even begin. We also walk through a deep dive into Snapchat artifacts, showing how to connect media files to user actions and locations by following database breadcrumbs that automated tools tend to overlook.Through it all, one theme stays clear: while technology keeps racing ahead, the responsibility for getting it right stays firmly with the examiner. As one guest bluntly put it, "We might be the last generation of cognitive thinkers."Tune in for a sharp, insightful, and slightly unpredictable conversation at the intersection of bears, bytes, and the future of digital evidence.Notes:Mobile Forensics Are you nerd enough?https://www.msab.com/events-webinars/webinar-are-you-nerd-enough/New Podcasts!https://osintcocktail.com/https://www.youtube.com/@hexordiaAmazon "Do Not Send Voice Recordings" Privacy Featurehttps://www.usatoday.com/story/tech/2025/03/17/amazon-echo-alexa-reporting-privacy/82503576007/https://www.thesun.co.uk/tech/33907850/amazon-alexa-echo-do-not-send-voice-recordingsAI search engines cite incorrect news sources at an alarming 60% rate, study sayshttps://arstechnica.com/ai/2025/03/ai-search-engines-give-incorrect-answers-at-an-alarming-60-rate-study-says/The Slow Collapse of Critical Thinking in OSINT due to AIhttps://www.dutchosintguy.com/post/the-slow-collapse-of-critical-thinking-in-osint-due-to-aiNISThttps://www.nist.gov/news-events/news/2025/01/updated-guidelines-managing-misuse-risk-dual-use-foundation-modelsDon't lose your logbookhttps://www.linkedin.com/pulse/dont-lose-your-logbook-christian-peter-ebcjeNot All Encryption is created equalhttps://www.s-rminform.com/latest-thinking/cracking-the-vault-exposing-the-weaknesses-of-encrypted-apps
In einer zweiten Folge sprechen Gregor Münch und der Rechtsanwalt Martin Steiger über personenbezogene Daten, die frei zugänglich sind und oft nur noch erschlossen oder eingesehen werden müssen. Wo lassen sich Daten finden? Sie gehen diversen Datenquellen nach wie Handelsregisterämter, Grundbücher, eautoindex.ch oder bei Personenmeldeämtern. Vorgestellt wird auch die Wayback Machine von archive.org – ein Werkzeug, mit dem sich ältere Versionen von Websites wiederherstellen lassen. Zum Schluss diskutieren die beiden, was Chatbots wie ChatGPT im Rahmen von OSINT - Open Source Intelligence – leisten können und wo deren Grenzen liegen. Als Strafverteidiger erhält man Einblicke in die unglaublichsten Fälle und arbeitet eng mit sehr unterschiedlichen und spannenden Menschen zusammen. Im Podcast [Auf dem Weg als Anwält:in](https://www.duribonin.ch/podcast) versucht der Anwalt [Duri Bonin](https://www.duribonin.ch) gemeinsam mit seinen Gesprächspartnern (Beschuldigte, Verurteilte, Staatsanwälte, Strafverteidiger, Gutachter, Opfer, Unschuldige, Schuldige …) zu ergründen, wie diese ticken, was sie antreibt und wie sie das Rechtssystem erleben. Behandelt werden urmenschliche Themen. Bei genauerem Hinsehen findet man Antworten auf eigene Fragen des Lebens und der Gesellschaft. Podcastfolgen von Martin und Gregor: - [#689 Spurensuche im Netz: Die neue Macht von Open Source Intelligence (OSINT)](https://www.duribonin.ch/689-spurensuche-im-netz-die-neue-macht-von-open-source-intelligence-osint/) Die Podcasts "Auf dem Weg als Anwält:in" sind unter https://www.duribonin.ch/podcast/ oder auf allen üblichen Plattformen zu hören
Ryan McBeth is an influential YouTuber, Author, triathlete, Army veteran and programmer. Ryan makes educational and OSINT videos, that look at the war in Ukraine from a military perspective. Today we'll be talking about the two side's strategies in the war, tactics, equipment, morale, and training. ----------LINKS:https://www.youtube.com/@RyanMcBethProgramming @RyanMcBethProgramming https://www.ryanmcbeth.com/https://ryanmcbeth.substack.com/https://www.instagram.com/therealryanmcbeth/?hl=en----------Easter Pysanky: Silicon Curtain - https://car4ukraine.com/campaigns/easter-pysanky-silicon-curtainCar for Ukraine has joined forces with a group of influencers, creators, and news observers during this special Easter season. In peaceful times, we might gift a basket of pysanky (hand-painted eggs), but now, we aim to deliver a basket of trucks to our warriors.This time, our main focus is on the Seraphims of the 104th Brigade and Chimera of HUR (Main Directorate of Intelligence), highly effective units that: - disrupt enemy logistics - detect and strike command centers - carry out precision operations against high-value enemy targetshttps://car4ukraine.com/campaigns/easter-pysanky-silicon-curtain----------SILICON CURTAIN FILM FUNDRAISERA project to make a documentary film in Ukraine, to raise awareness of Ukraine's struggle and in supporting a team running aid convoys to Ukraine's front-line towns.https://buymeacoffee.com/siliconcurtain/extras----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2025 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur first live events this year in Lviv and Kyiv were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. We may add more venues to the program, depending on the success of the fundraising campaign. https://buymeacoffee.com/siliconcurtain/extrasWe need to scale up our support for Ukraine, and these events are designed to have a major impact. Your support in making it happen is greatly appreciated. All events will be recorded professionally and published for free on the Silicon Curtain channel. Where possible, we will also live-stream events.https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------TRUSTED CHARITIES ON THE GROUND:Save Ukrainehttps://www.saveukraineua.org/Superhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Come Back Alivehttps://savelife.in.ua/en/Chefs For Ukraine - World Central Kitchenhttps://wck.org/relief/activation-chefs-for-ukraineUNITED24 - An initiative of President Zelenskyyhttps://u24.gov.ua/Serhiy Prytula Charity Foundationhttps://prytulafoundation.orgNGO “Herojam Slava”https://heroiamslava.org/kharpp - Reconstruction project supporting communities in Kharkiv and Przemyślhttps://kharpp.com/NOR DOG Animal Rescuehttps://www.nor-dog.org/home/----------PLATFORMS:Twitter: https://twitter.com/CurtainSiliconInstagram: https://www.instagram.com/siliconcurtain/Podcast: https://open.spotify.com/show/4thRZj6NO7y93zG11JMtqmLinkedin: https://www.linkedin.com/in/finkjonathan/Patreon: https://www.patreon.com/siliconcurtain----------Welcome to the Silicon Curtain podcast. Please like and subscribe if you like the content we produce. It will really help to increase the popularity of our content in YouTube's algorithm. Our material is now being made available on popular podcasting platforms as well, such as Spotify and Apple Podcasts.
Empowering Family Safety with Open Source Intelligence In this episode of The Secure Family Podcast, host Andy Murphy welcomes Ricky Alonzo, an open source intelligence expert also known as Rickynomics. The discussion centers on empowering parents to protect their families through informed decision-making and the use of open source intelligence (OSINT). Ricky shares his journey and expertise and explains how OSINT can be used to safeguard family safety, conduct background checks, and understand potential threats. He also shares how to protect your home's title from being taken from you. Ricky gives valuable advice on how parents can assess potential threats their children might face online and offers strategies to decentralize personal information to make it harder for malicious actors to exploit. The episode is a comprehensive guide to using intelligence skills to enhance family security in today's digital age. For more from Ricky Alonzo: https://institutionoftheamericas.com/ Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Level Up your parenting with my ebook about protecting your kids while gaming online. Connect
Could your company be the next target for corporate espionage, where trade secrets and competitive advantages hang in the balance? As corporate spies evolve their methods to outpace defenses, the risks have never been greater. In this gripping first episode of our All Source series, we're joined by Michael Orlando, Senior Director of Global Security at Micron Technology, and Jason Lee, Industry Practice Lead at Moody's, for an eye-opening exploration of the covert world of corporate espionage. Together, they peel back the layers of this hidden threats, diving into critical questions like: Why is corporate espionage a growing risk in today's interconnected world? What signals might indicate your organization is being targeted? What drives bad actors to exploit companies, and how are their methods becoming more sophisticated? How are tools like OSINT (Open Source Intelligence) being used to investigate and combat espionage? How are governments and regulators tackling this issue?How will emerging technologies like AI reshape the future of corporate intelligence and defense? If you're interested in learning more, check out the resources below: Federal Bureau of InvestigationThe National Counterintelligence and Security CenterU.S. Department of Defense Cybersecurity and Infrastructure Security AgencyTo learn more about Moody's please visit our website or get in touch; we would love to hear from you.
Willkommen in der schönen neuen Welt der offenen Quellen: In dieser Folge von OSINT Studio diskutieren Matthias Wilson und Samuel Lolagar, wie sich Open Source Intelligence im Spannungsfeld zwischen Technologie, Verantwortung und gesellschaftlichem Wandel verändert. Was bedeutet es, wenn KI-generierte Inhalte kritisches Denken verdrängen, wenn Fake-Identitäten authentischer wirken als echte Menschen und wenn Aufklärung zur Selbstinszenierung wird?Wir sprechen über die zunehmende Rolle von Chatbots in der Propaganda, die Gefahr durch überambitionierte Laienanalysen, die ethischen Grenzen von OSINT4Good-Initiativen und die Frage, warum Tool-Kompetenz nicht Analysekompetenz ersetzt. Auch investigative Recherchen wie die Enthüllungen rund um internationale Scam-Netzwerke, das digitale Erbe von Kriminellen oder Datenpannen auf höchster sicherheitspolitischer Ebene kommen zur Sprache.Linkshttps://www.dutchosintguy.com/post/the-slow-collapse-of-critical-thinking-in-osint-due-to-aihttps://www.linkedin.com/pulse/so-you-think-can-drive-osint-matthias-wilson-mjgbf https://www.linkedin.com/posts/imavropoulos_socialengineering-securityawareness-activity-7312816130404835329-pxQWhttps://www.occrp.org/en/project/scam-empire/scam-empire-inside-a-merciless-international-investment-scam https://www.spiegel.de/ausland/chatgpt-und-perplexity-ai-russland-manipuliert-westliche-chatbots-fuer-seine-propaganda-a-7e276236-cac3-4f35-8ad4-40eaba1c8caf https://www.linkedin.com/posts/osintteam_how-do-you-pick-the-best-tool-for-your-project-activity-7312097811641114624-O9Phhttps://www.linkedin.com/pulse/osint4good-gone-bad-matthias-wilson-ehmtf/https://www.spiegel.de/panorama/bildung/usa-hunderte-gaststudierende-zur-ausreise-aufgefordert-a-afbba62a-111c-49d6-bfa2-93c6e1e29d5b https://www.wired.com/2017/02/guide-getting-past-customs-digital-privacy-intact/https://www.nytimes.com/interactive/2025/03/26/us/pedophile-hunting-violence.html https://www.bellingcat.com/news/2025/03/22/nowhere-to-run-the-online-footprint-of-an-alleged-kinahan-cartel-associatehttps://www.heise.de/news/Datenschutz-bedroht-viele-Wetter-Webcams-in-Oesterreich-10301464.htmlhttps://www.spiegel.de/international/world/pete-hegseth-mike-waltz-tulsi-gabbard-private-data-and-passwords-of-senior-u-s-security-officials-found-online-a-14221f90-e5c2-48e5-bc63-10b705521fb7https://netzwerkrecherche.org/international/guide-investigativjournalismus/ Feedback & Anregungen an feedback@osint.studio© 2025 Samuel Lolagar & Matthias Wilson
The intelligence community relies on more than satellites and secretive human sources. Under a one year old open source intelligence strategy, or OSINT, spy agencies are adding more and more public and commercial data. Well now, the Office of the Director of National Intelligence is making sure agencies include OSINT in their programs and budgets. Federal News Network's Justin Doubleday got the rundown from the ICS OSINT executive Jason Barrett. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Thema in diesem Podcast ist OSINT - Open Source Intelligence. Gemeint ist die Beschaffung, Auswertung und Nutzung öffentlich zugänglicher Informationen. Oft fehlt es Strafverteidigerinnen an Geld für private Ermittlungen. Gerade bei amtlicher Verteidigung werden solche Auslagen meist nicht vergütet. OSINT kann hier helfen: man muss nur wissen, wo die Informationen schlummern. Gregor Münch nähert sich mit dem Rechtsanwalt Martin Steiger dem Thema an, indem sie sich zuerst einmal fragen, was nicht erlaubt ist: Darf ich bspw. Passwörter geleakter Datenbanken nutzen? Wie ist es, wenn man ohne eigenes Zutun mitlesen kann – wie es kürzlich dem US-Journalisten Jeffrey Goldberg passiert ist? Goldberg, Chefredaktor des Magazins The Atlantic, wurde versehentlich in einen Gruppenchat auf Signal eingeladen, in dem Mitglieder der US-Regierung militärische Angriffe im Jemen planten. Er konnte sensible Informationen in Echtzeit mitlesen – darunter Details zu Zielen, eingesetzten Waffen und dem Zeitplan. Und was gilt, wenn man gegenüber Behörden falsche Angaben macht, etwa um einen Interessennachweis vorzutäuschen? Als Strafverteidiger erhält man Einblicke in die unglaublichsten Fälle und arbeitet eng mit sehr unterschiedlichen und spannenden Menschen zusammen. Im Podcast [Auf dem Weg als Anwält:in](https://www.duribonin.ch/podcast) versucht der Anwalt [Duri Bonin](https://www.duribonin.ch) gemeinsam mit seinen Gesprächspartnern (Beschuldigte, Verurteilte, Staatsanwälte, Strafverteidiger, Gutachter, Opfer, Unschuldige, Schuldige …) zu ergründen, wie diese ticken, was sie antreibt und wie sie das Rechtssystem erleben. Behandelt werden urmenschliche Themen. Bei genauerem Hinsehen findet man Antworten auf eigene Fragen des Lebens und der Gesellschaft. Links zu diesem Podcast: - Zu unserem Gast [Martin Steiger](https://www.linkedin.com/in/martinsteiger/), [Anwalt](https://steigerlegal.ch) und [Unternehmer](https://martinsteiger.ch/) für Recht im digitalen Raum, sowie Sprecher der [Digitalen Gesellschaft](https://www.digitale-gesellschaft.ch/uber-uns/kurzvorstellung-personen/) - Martin publiziert regelmässig auf [chaos.social](https://chaos.social/@martinsteiger), [bsky](https://bsky.app/profile/martinsteiger.ch) und führt spannende Gespräche in seinem Podcast [Datenschutz-Plaudereien](https://podcast.datenschutzpartner.ch) - [Bundesgesetz über den Nachrichtendienst](https://www.fedlex.admin.ch/eli/cc/2017/494/de#art_13) (Nachrichtendienstgesetz, NDG) - [Rechtmässigkeit von Open Source-Ermittlungen durch Strafverfolgungsbehörden](https://eizpublishing.ch/ausgabe/risiko-recht-ausgabe-1-2024/), [Monika Simmler](https://www.linkedin.com/in/monika-simmler-525ba815a/) / [Giulia Canova](https://www.linkedin.com/in/giulia-canova-a71138180/) in Risiko & Recht – Ausgabe 1 / 2024 - strafprozess.ch zu [Google Dorking](https://www.strafprozess.ch/google-dorking/) - Anwaltskanzlei von [Gregor Münch](https://www.d32.ch/personen) - Anwaltskanzlei von [Duri Bonin](https://www.duribonin.ch) - Titelbild [bydanay](https://www.instagram.com/bydanay/) - Das Buch zum Podcast: [In schwierigem Gelände — Gespräche über Strafverfolgung, Strafverteidigung & Urteilsfindung](https://www.duribonin.ch/shop/) Die Podcasts "Auf dem Weg als Anwält:in" sind unter https://www.duribonin.ch/podcast/ oder auf allen üblichen Plattformen zu hören
In this podcast culture expert Satgin Hamrah joins Harry Kemsley and Sean Corbett to discuss why understanding culture is crucial in providing context to your intelligence. They explore how ingrained cultural nuances and historical ties influence global security trends, decisions, and behaviours, and why grasping the subtleties of culture is essential for effective engagement and decision making in the defence intelligence community.
REPLAY (Original Air Date May 27, 2024) *Please note that this episode contains discussions regarding abuse that some may find disturbing. Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Join Chris as he discusses topics and news pertaining to the world of Social Engineering. Today, Chris is joined by Nadja El Fertasi. Nadja is a leading figure in fostering emotional resilience within the digital age. Her comprehensive expertise spans crisis management, strategic stakeholder communication, and emotional intelligence, creating a unified approach to enhance the human side of digital advancements. Having spent nearly two decades at NATO, including a significant role in the NATO Communications and Information Agency focusing on Digital Transformation & Cybersecurity, Nadja has been a pivotal figure in strategic engagement and communications. This role highlighted her commitment to navigating and leading through the complexities of cybersecurity and digital transformation. With over 15 years dedicated to cybersecurity at NATO, Nadja has emerged as a respected expert in her field. Her contribution to the cybersecurity community was acknowledged in "Hacking Gender Barriers: Europe's Top Cyberwomen," by the Women4Cyber foundation, which recognized her as one of Europe's influential figures in cybersecurity. Today, Nadja is the voice behind the EQ Elevator Podcast, where she assists businesses in cultivating leadership that's resilient and equipped for the digital age's challenges. Her work is dedicated to shaping a safer, more emotionally intelligent digital landscape, where individuals and organizations can thrive amidst technological disruptions. [May 27, 2024] 00:00 - Intro 00:19 - 2024 State of Vishing Report 01:01 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:11 - Nadja El Fertasi Intro 05:02 - The Importance of Sharing 07:14 - Romance Scam: Nadja's Story 13:51 - The Other Side 15:59 - The Red Flags 19:13 - A Gift and a Curse 23:22 - Taking Responsibility 25:24 - Love, Not Romance 27:05 - Navigating the Apps 32:28 - Reality Check 37:27 - Being Human 39:39 - Learning From "No" 41:28 - Where to Report 42:25 - Wrap Up 43:58 - Find Nadja El Fertasi Online - LinkedIn: in/nadja-elfertasi - Instagram: @nadjafertasi 45:17 - Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy
Nell'era in cui Internet ha reso accessibili a chiunque una quantità pressoché infinita di dati e informazioni, svelare segreti, anticipare mosse di persone o intere organizzazioni, condurre investigazioni private o analisi di mercato sono diventate pratiche non solo comuni, ma facilmente realizzabili da chiunque abbia le capacità e gli strumenti adatti. Tutto questo attraverso l'Open Source Intelligence (OSINT), la disciplina che trasforma in attività di Intelligence la miriade di informazioni pubbliche che ogni giorno lasciamo online. Ma cos'è precisamente questa disciplina? Come funziona e a cosa serve? Quali sono i benefici, ma anche i pericoli che comporta? In questa puntata esploriamo il mondo dell'Intelligence nell'era dei dati aperti.Nella sezione delle notizie parliamo dell'installazione delle prime telecamere di riconoscimento facciale live permanenti nel Regno Unito, di un innovativo ponte neurale sviluppato in Cina per le lesioni spinali e del nuovo generatore di immagini di OpenAI che sostituirà DALL-E in ChatGPT.--Indice--00:00 - Introduzione01:01 - Londra installa telecamere di riconoscimento facciale (BiometricUpdate.com, Davide Fasoli)02:17 - Il ponte neurale cinese per le lesioni spinali (DDay.it, Matteo Gallo)03:44 - Il nuovo generatore di immagini di OpenAI (OpenAI.com, Luca Martinelli)05:32 - L'Open Source Intelligence nell'era digitale (Luca Martinelli)16:05 - Conclusione--Contatti--• www.dentrolatecnologia.it• Instagram (@dentrolatecnologia)• Telegram (@dentrolatecnologia)• YouTube (@dentrolatecnologia)• redazione@dentrolatecnologia.it--Brani--• Ecstasy by Rabbit Theft• Found You by Time To Talk, Avaya & RYVM
Entrevista con Jesser Ferreira, un experto en OSINT (Inteligencia de Fuentes Abiertas). La conversación explora qué es OSINT, su creciente popularidad en ciberseguridad tanto para la ofensiva como la defensa, y su aplicación por empresas y fuerzas de seguridad. Se destaca la importancia de la inteligencia de fuentes abiertas y se mencionan ejemplos concretos de su uso, incluyendo casos impactantes presentados en el evento "Osintomático". Ferreira subraya que, más allá de las herramientas, la clave para el OSINT reside en la explotación de la información que las personas comparten inadvertidamente. Se recomienda su libro y la asistencia a eventos relacionados para comprender mejor esta disciplina. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
Interview with Jezer Ferreira, an expert in OSINT (Open Source Intelligence). The conversation explores what OSINT is, its growing popularity in cybersecurity for both offensive and defensive purposes, and its application by companies and security forces. The importance of open source intelligence is highlighted, and specific examples of its use are mentioned, including impactful cases presented at the "Osintomático" event. Ferreira emphasizes that, beyond tools, the key to OSINT lies in the exploitation of information that people inadvertently share. His book and attendance at related events are recommended to better understand this discipline. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
Este episodio aborda la fusión de amenazas físicas y digitales, destacando cómo los ataques pueden originarse en el mundo real para explotar vulnerabilidades en línea. Se discuten noticias recientes sobre malware distribuido a través de convertidores de archivos gratuitos y campañas de phishing mediante anuncios falsos. El programa también explora la creciente importancia de la inteligencia de fuentes abiertas (OSINT) en la ciberseguridad, junto con la compra multimillonaria de la empresa de seguridad en la nube WHS por parte de Google, lo que subraya el enfoque en la protección de entornos en la nube. Finalmente, se examina la ingeniería social como vector de ataque y se ofrecen consejos para prevenir ciberestafas en la vida cotidiana. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
This week, Kelly sits down with Dana Timmerman, a seasoned private investigator and OSINT (Open Source Intelligence) expert, to explore the critical thinking skills behind fraud investigations. Dana dives into cases and how deep social media and asset analysis can expose deception. He shares his personal journey into the world of investigations - fueled by a life-changing experience searching for his daughter. From ethical dilemmas to bias awareness, Dana breaks down the mindset investigators need to navigate complex cases. He also discusses the growing role of AI in OSINT and draws on insights from experts to refine investigative techniques.
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Dr. Josh “Bugsy” Segal asks the provocative question: Are We Losing the War? Josh discusses the importance of understanding the impact of the nation's investments in soft power assets and programs, emphasizing the need for a strategic approach and a broader national security context. He expresses concerns about the challenges in reaching the desired audience for information operations and the need for the US to adapt and innovate in the face of increasing influence from China and Russia. Lastly, the discussion touches on the current administration's agenda of cutting costs, the threat posed by adversaries, and the importance of nurturing relationships–particularly in the context of disinformation and subversive narratives. Recording Date: 19 Feb 2025 Resources: Cognitive Crucible Podcast Episodes Mentioned #213 Sviatoslav Hnizdovskyi on Countering Authoritarian Influence #192 Josh "Bugsy" Segal on the American Maginot Line #124 Dean Cheng on China, Space, and Information Operations #24 John Davis on Modern Warfare, Teamwork, and Commercial Cognitive Security Deft9 Solutions Russia's GRU Unit 29155 The DOGE website Link to full show notes and resources Guest Bio: Dr. Joshua “Bugsy” Segal is the Co-Founder & Vice President for Strategy and Innovation at Deft9 Solutions. A veteran of over 30 years in national security policy, strategy and operations, and intelligence, both military and civilian, Dr. Segal is an internationally recognized expert in arms control, countering foreign malign influence, and counter-WMD. Dr. Segal spent over a decade as a member of U.S. multilateral arms control delegations in Geneva, Vienna, and The Hague, including the negotiations to finalize the 1993 Chemical Weapons Convention and establish the Organization for the Prohibition of Chemical Weapons. After leaving the federal government and then retiring from the military, Dr. Segal serves as an advisor to senior DoD leaders on operations in the information environment and teaches OSINT tradecraft. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Chris Greenway discusses the origins and evolution of BBC Monitoring, a service that gathers news from various sources. BBC Monitoring began in the 1930s as a response to the BBC's external broadcasts, with the initial focus on Arabic, Spanish, and Portuguese languages. The British government showed interest in monitoring, leading to a partnership with the BBC. By the height of World War II, the service had expanded to a thousand people and developed a relationship with American partners. Chris also discusses the significant role of open-source intelligence (OSINT) as well as products and services offered by BBC Monitoring. Recording Date: 17 Feb 2025 Research Question: Chris Greenway suggests an interested student or researcher take part in a narrative assessment: have a look at Sputnik, or RT. What narrative are they trying to project to you? And can you “reverse engineer” those narratives to reveal the objective of the Russian government? Resources: Cognitive Crucible Podcast Episodes Mentioned #148 Kalev Leetaru on GDELT BBC Monitoring Sefton Delmer Black boomerang by Sefton Delmer Link to full show notes and resources Guest Bio: Chris Greenway has worked for BBC Monitoring (BBCM) since 1981, helping the organisation's users to understand the world and threats to international stability through coverage of global media. Joining the service in the shortwave era, he first worked at its signals-receiving station, providing colleagues with feeds from radio stations and news agencies around the world. Two years later he joined the editorial teams who compiled the regional editions of Monitoring's daily newspaper, the Summary of World Broadcasts, working on the Soviet, East European, Middle East and Africa desks. That led to a total of eight years of postings to BBCM's outstation in Nairobi, monitoring Africa, interspersed with duties back at BBCM's UK HQ where he held various editorial and management posts. Since 2006, he has been part of a team coordinating the organisation's daily global operations and output. Chris combines his work with a personal interest in the history of, and current developments in, broadcasting, media monitoring and international information warfare. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
How does a man living in England trace the history of Compton, California and the evolution of gangs across the country? And then evolve to tracking financial crimes? By using his OSINT skills! In this episode, Brett Redman the Head of Intelligence at Blackdot Solutions takes us through where he started with tracking this information and also some
A guerra na Ucrânia é a primeira grande guerra da história transmitida quase em tempo real. Imagens de satélite, vídeos de drones e celulares moldam nossa visão do conflito. Mas será que estamos realmente entendendo o que vemos? Neste vídeo, explico como a ascensão do OSINT (inteligência de fonte aberta) mudou para sempre a forma como acompanhamos guerras e crises ao redor do mundo — e como essa enxurrada de dados pode tanto informar quanto desinformar. Além disso, falo sobre como isso afeta o cenário geopolítico atual, com exemplos práticos, incluindo a Síria e o uso recente de mísseis russos. Quer acompanhar geopolítica de verdade? Então é preciso contexto. Aperte o play!
株式会社スリーシェイクは3月11日、同社の統合セキュリティプラットフォーム「Securify」にOSINT機能を追加すると発表した。既存のSecurifyユーザーは、追加費用なしでOSINT機能を利用できる。
Brett Granberg is a co-founder and CEO of Vannevar Labs, a startup building AI for defense.We dive into Brett's journey as a defense investor and startup founder, and the challenges and opportunities he sees in defense tech right now. He breaks down the differences between hardware and software development, the evolving DoD acquisition process, and how to know when a defense startup has achieved product-market fit. Plus, we discuss the biggest thing Brett looks for in interviews and what it takes to succeed in a startup environment.Outline1:30 The genesis of Vannevar04:38 What have you changed your mind about?06:49 Knowing when to adjust course10:09 Building products with urgency12:42 Doubling down on existing products vs. exploring new bets17:27 Hardware vs. software in defense19:19 DeepSeek and what LLMs mean for defense tech25:27 DoD acquisition evolution28:01 The defense tech market31:48 The next decade33:40 Building a company culture that withstands growth35:38 Personal reflections37:31 Unexpected predictors of success39:07 Lessons for future founders40:58 Opportunities at Vannevar
In 2021, the ASIS Foundation published research about how social media and artificial intelligence can be leveraged to proactively identify new security issues. Now, we check in with one of those researchers—Chelsea Binns from the John Jay College of Criminal Justice—to see what has changed in the field, the ethics of researching social media, and what's she's looking at now. This episode is brought to you by the ASIS Foundation. Find out more here: https://www.asisonline.org/get-involved/asis-foundation/ Additional Resources Read the 2021 research, Using Social Media to Gather Security Intelligence, and other ASIS Foundation research online here: https://www.asisonline.org/get-involved/asis-foundation/asis-foundation-research/ Learn how OSINT and social media intelligence can become actionable in this Security Technology article: https://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/stopping-an-active-shooter-with-osint/ More and more people get their news from social media. But when algorithms are designed to capture attention—even with traumatic content—what does this mean for protests and de-escalation? https://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/social-media-crisis-response/ Online chatter and conspiracy theories can rapidly affect your organization's reputation security. Learn more here: https://www.asisonline.org/security-management-magazine/articles/2023/02/reputation-security/redesigning-pandoras-box/ Improving social media governance is crucial for organizations to effectively manage their online presence. Find out more with Security Technology: https://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/managing-digital-risk-with-social-media-governance/ Hone your situational awareness skills with this Security Management article: https://www.asisonline.org/security-management-magazine/articles/2022/09/how-to-improve-your-situational-awareness/
El Hospital Clínic de Barcelona sufrió un ataque ransomware el 5 de marzo de 2023. Dos años después su actual CISO, Alejandro Nieto, nos cuenta cómo lo vivieron y cómo respondieron a un ciberataque que bloqueó uno de los centros hospitalarios de referencia en España. ¿Qué impacto ha tenido este caso en la gestión de la ciberseguridad de esta y otras infraestructuras críticas? Charlamos con Jezer Ferreira, uno de los mayores expertos OSINT para conocer cómo los datos de fuentes abiertas, disponibles en internet y repositorios públicos, pueden ayudar a tirar del hilo para identificar a ciberdelincuentes y prevenir nuevos incidentes de seguridad. Además, repasamos las principales conclusiones y recomendaciones que deja el Informe de Tendencias de Ciberseguridad 2025 de Sofistic con su Country Manager en Costa Rica, Jazmin Lobo. Con ella conoceremos la nueva estrategia del cibercrimen y el panorama actual de amenazas y vulnerabilidades. Suscríbete a nuestro newsletter y podrás escuchar los nuevos episodios en primicia y conocer contenido extra relacionado
Episode: 00257 Released on March 10, 2025 Description: In this episode of Analyst Talk with Jason Elder, expert Jan Mondale discusses another Open Secret in the world of open-source intelligence (OSINT) with expert Jan Mondale. From the basics of Google and Bing searches to advanced tips for finding hidden information online, Jan breaks down the art of effective searching. We explore Boolean operators, the power of search shortcuts, and why it sometimes pays to think like a "Google dork." Whether you're an investigative support analyst or just looking to sharpen your search skills, this episode is packed with actionable advice. Tune in to learn how to uncover open secrets like a pro! [Note: Description produced by ChatGPT.] Get to know more about Jan by listening to his episode on Analyst Talk With Jason Elder: https://www.leapodcasts.com/e/atwje-jan-mondale-inquiring-minds/ CHALLENGE: There are Easter eggs in one of the tables of the Excel chapter that Jason wrote for the IACA textbook. First-person to email us at leapodcasts@gmail.com about what the Easter eggs are will receive a $75 gift card from us. Happy hunting! *** Episode 7 Analysis - IACA Conference Preview - Rethinking Thought https://youtu.be/YC_b8GWofDk *** Related Links: Jan's Online Search document: https://mcdn.podbean.com/mf/web/437i47bpbj5n8wzh/OS02_Online_Search8tf85.pdf Association(s) Mentioned: Vendor(s) Mentioned: Contact: https://www.linkedin.com/in/janmondale/ Transcript: https://mcdn.podbean.com/mf/web/5ruixn7e7crti923/OS02_transcript.pdf Podcast Writer: Podcast Researcher: Theme Song: Written and Recorded by The Rough & Tumble. Find more of their music at www.theroughandtumble.com. Logo: Designed by Kyle McMullen. Please visit www.moderntype.com for any printable business forms and planners. Podcast Email: leapodcasts@gmail.com Podcast Webpage: www.leapodcasts.com Podcast Twitter: @leapodcasts
When hiring new employees, particularly in today's digital age, executives face the daunting challenge of ensuring they bring trustworthy and competent individuals into their organizations. The risk of hiring someone with a questionable background or misrepresented qualifications can lead to significant organizational damage, from financial loss to reputational harm. This is especially critical for female executives who may be more empathetic in their decision-making process, potentially leading them to overlook red flags. One can overcome these challenges by leveraging thorough background checks, trusting one's instincts while staying objective, and utilizing professional resources to ensure safe and effective hiring practices. Cynthia Hetherington, MLS, MSM, CFE, CII, OSC is the Founder and CEO of Hetherington Group, a consulting, publishing, managed services, and training firm that leads in due diligence, corporate intelligence, and cyber investigations. Throughout her career, she has assisted clients on thousands of cases using online open sources and databases as well as executing boots-on-the-ground operations. She provides specialized training for investigative professionals through the OSINT Academy, and has authored many industry-leading books on conducting cyber investigations, including her latest, OSINT: The Authoritative Guide to Due Diligence: Essential Resources for Critical Business Intelligence, 3rdEdition. In this episode, Cynthia discusses the importance of conducting thorough background checks when hiring, emphasizing the need to use licensed professionals for accurate and comprehensive information. She highlights the role of intuition in the hiring process, advising executives to trust their gut feelings while also considering candidates' qualifications and histories. What you will learn from this episode: Learn valuable advice on hiring practices, background checks, and how to protect your business and personal interests. Find out practical and actionable tips for navigating the complexities of hiring both in a corporate setting and for household help and understanding state laws. Discover specific strategies and support to help businesswomen succeed and make informed decisions in their professional and personal lives. “You can trust your gut, but don't follow your heart.” - Cynthia Hetherington Valuable Free Resources: Have questions? Chat with Cynthia here: The Hetherington Group Topics Covered: 02:04 - What does this acronym OSINT stand for 02:28 - Her journey from a librarian into the intelligence space 03:02 - Importance of finding individuals who can match the pace and demands of the role rather than just being empathetic to personal circumstances 04:09 - Why choosing a candidate based on likability rather than skills led to a poor hiring decision 05:35 - The need to prioritize your instincts and thorough background checks over empathetic feelings 07:31 - What you need to know about the hiring process and valuable resources to help you find licensed firms doing background checks 11:20 - How to deal with a candidate's past questionable behavior found on social media 13:54 - Opt for practical considerations and intelligence in hiring decisions versus strictly adhering to legal requirements not aligning with real-world risks faced by businesswomen 16:05 - Advice on using professional help for accurate information and reputation management 18:41 - Navigating interstate laws when hiring 20:26 - How the laws of the company's home state are primarily operative when conducting background screenings and hiring 21:34 - Q: What's for free out there and how could we do this ourselves? A: I like to go through and review their LinkedIn profile; it's a social media profile that's open and accessible to everyone. Key Takeaways: “If you have a sense that the individual you're talking to might present really well, but there's just something that just doesn't feel right, go with that.” - Cynthia Hetherington “At the core of what I do is, we're here to make the world a safer place. We're not going to compromise that because of whatever the statements of legislators who are not having the same issues or concerns that these business women are having.” - Cynthia Hetherington “Let's try to help each other out and empower each other to be the best executives we can by using intelligence. And not straight up jurisprudence to guide us at every turn.” - Cynthia Hetherington Ways to Connect with Cynthia Hetherington: Website: https://hetheringtongroup.com/ LinkedIn: https://www.linkedin.com/in/cynthiahetherington/ Ways to Connect with Sarah E. Brown: Website: https://www.sarahebrown.com LinkedIn: https://www.linkedin.com/in/sarahebrownphd Facebook: https://www.facebook.com/DrSarahEBrown To speak with her: bookachatwithsarahebrown.com
The intelligence community is often misunderstood, shrouded in secrecy, and clouded by misinformation. In this solo episode, A.J. Nash pulls back the curtain on how intelligence actually works, breaking down the 18 agencies that make up the U.S. intelligence community, their legal limitations, and the oversight that keeps them in check. He explains the different types of intelligence—SIGINT, HUMINT, OSINT, and more—highlighting their roles in national security. A.J. also addresses the myths surrounding intelligence work, including claims of government surveillance, political weaponization, and conspiracy theories. He details how intelligence professionals are trained to be objective, follow strict oversight, and operate within legal frameworks. With firsthand experience, he challenges misconceptions and explains why the reality of intelligence work is far less sinister than the public is often led to believe.Finally, A.J. discusses the impact of political rhetoric on intelligence agencies, emphasizing the importance of separating fact from fiction. He urges listeners to approach claims about intelligence abuse with scrutiny and to recognize the dedication of those working behind the scenes to protect national security.Send us a textSupport the show
Podcast: PrOTect It All (LS 25 · TOP 10% what is this?)Episode: The Intersection of AI, OT, and Cybersecurity with Sulaiman AlhasawiPub date: 2025-03-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow is joined by Sulaiman Alhasawi, a cybersecurity expert based in Kuwait. Sulaiman shares his journey into OT security, beginning with his PhD research in Liverpool and leading to his creation of ICSrank.com, a search engine for OT devices. The discussion gets into individuals' unique cybersecurity paths, emphasizing the importance of learning from diverse experiences. They explore the challenges asset owners face in understanding vulnerabilities, the role of AI in cybersecurity, and the international perspective on OT security. Throughout the episode, Aaron and Sulaiman highlight the significance of community, knowledge sharing, and taking actionable steps to improve cybersecurity posture in critical infrastructure. Whether you're an industry veteran or a newcomer, this episode is packed with insights and practical advice to help you protect it all. Key Moments: 01:10 Sharing Diverse Experiences 05:44 Simplifying Asset Management Challenges 08:15 Action Transforms Ideas to Value 11:44 Unexpected Targets in Cyber Attacks 13:20 "Obscurity Isn't Security" 16:50 Simplifying Cybersecurity Communication 21:12 Unintended Internet Exposure Risks 24:49 Podcasting for Community Impact 28:53 OT's Vital Role in Hospitals 32:26 Diverse Experiences in Power Plants 35:54 OT Data Integration Priorities 36:55 Prioritizing Safety Over Immediate Updates 42:10 Global Business Resource Allocation Challenges 46:08 Finding Our Podcast & Resources 47:25 Global Unity in Shared Struggles About The Guest : Sulaiman Alhasawi is an active researcher in ICS/OT cybersecurity, with a PhD specializing in securing critical infrastructure. He is the founder of ICSrank.com, a platform dedicated to discovering and assessing security risks in Industrial Control Systems (ICS), Operational Technology (OT), and Industrial IoT. As the host of the ICS Arabia Podcast, Sulaiman brings together global experts to discuss cutting-edge topics in OT security, bridging the gap between research, industry, and real-world cyber threats. His latest research, "How to Find Water Systems on the Internet", was featured in SecurityWeek magazine, shedding light on OSINT techniques used to uncover vulnerable water infrastructure. (Read it here: https://zerontek.com/zt/2024/09/30/how-to-find-water-systems-on-the-internet-a-guide-to-ics-ot-osint/) Follow Sulaiman for insights on ICS/OT security, threat intelligence, and ethical hacking: ICSrank Website: ICSrank.com ICS Arabia Podcast (X): https://www.youtube.com/@icsarabiapodcast Twitter (X): @alhasawi Linkedin : https://www.linkedin.com/in/alhasawi Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4 The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Stefano Ritondale is a veteran US Army Armor Officer who then got in to Military Intelligence. Currently he is the Chief Intel Officer for the defense company Artorias, a company that utilizes Open Source Intel [OSINT] from many sources such as social media, news outlets, bloggers, and other online resources using AI and analysts they can provide very near real time OSINT intel directly to your phone through an app soon available to anyone. Events such as Geopolitics, Armed Conflict, Event Security, or Weather Events can all be monitored an an app, curated to your specific needs for about $10 a month. Artorias has basically democratized OSINT intel. Stefano is also a Subject Matter Expert on Mexican Cartels. Artorias also has a podcast called BLUF: Artorias Podcast, where they talk about recent events in the world and the intel they gather. You can find the Artorias website here https://www.artorias.com You can find the BLUF Artorias Podcast here https://podcasts.apple.com/us/podcast/bluf-artorias-podcast/id1776391188 You can find The Dsitinguished Savage Podcast website here https://www.thedistinguishedsavage.com You can find the show sponsor Absolute Security and Lock here http://absolutesecurityandlock.com This podcast is for informational and entertainment purposes only. Content is provided "as is" without warranty. We are not liable for damages from its use. Guest opinions are their own and don't reflect host/producer/or sponsors views. All content is copyrighted and protected by law. This podcast does not provide professional, medical, legal, or financial advice. Consult qualified experts for your specific situation. © [2025] [The Distinguished Savage, Savage Concepts LLC]. All Rights Reserved.
Dmitry Danilov, aka Soxoj is an OSINT investigator and CPO for Social Links. In this episode, we talk about his Substack where he shares his methodology and his incredibly helpful "4P Method" of doing investigations. We also talked about some of the tools he works with and created, which you can find in his github: https://github.com/soxoj https://soxoj.com/ https://t.me/soxoj_insides https://github.com/soxoj/maigret Presentation at LeHack: https://www.youtube.com/watch?v=0yQRf0Mx-hc https://sociallinks.io/products/sl-crimewall
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com In spy movies, the federal government has unlimited funds for intelligence. In fact, it is always at its fingertips, no matter where it is located. Would it be so? In the real world, agencies have budgets that limit their ability to do everything from reducing fraud to ensuring the safety of a supply chain. One way to leverage the funds allocated for this task is to use Open-Source Intelligence or OSINT. During today's interview, Jason English from Babel Street shares his thoughts on how OSINT should be a part of the matrix where federal agencies can get practical intelligence. He starts by defining OSINT, which includes search engines, social media, public relations, news sources, web scraping, data analysis, and, yes, the dark web. This information is freely available to everyone, which gives it distinctive advantages. First, classified information can be costly to obtain. Rather than limiting your information sources to one area, OSINT will provide a much wider range of sources quickly. Further, transparency is becoming a more prominent theme in technology—by definition, one can review the origin of any piece of information to assure its veracity. When it comes to collecting, analyzing, and disseminating information, OSINT provides benefits that answer many of today's federal agency requirements.
An exponential growth in data has coincided with the era of exponential risk - what does this mean for anti-financial crime and risk professionals? With ever increasing amounts of unstructured data and information at their fingertips, how can professional investigators implement sophisticated open-source intelligence (OSINT) investigations to make informed decisions?In this episode of KYC Decoded, we welcome the CEO of Blackdot Solutions and former forensic investigator, Stuart Clarke. Stuart breaks down what is needed for high-functioning OSINT investigations in an enlightening conversation with host, Alex Pillow. Together they explore questions like:How do we extract real insights from unstructured data?What is the methodology for running an investigation?How can leaders deploy the right balance of data, technology, and human investigators, when conducting OSINT investigations?What makes OSINT investigations difficult for practitioners in the private sector vs public sector?What is the impact of advanced OSINT?How much of an OSINT investigation can (and should) be automated?What are the legal and ethical guardrails around the use of open source data?If you are keen to learn more, check out the resources below:Blackdot Solutions, The OSINT handbookMoody's Maxsight™ InvestigationsPlease also visit our website and get in touch; we would love to hear from you.
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Elise Eldridge and Anna Seitz to discuss the most recent notable developments across the threat landscape. The threat actor, also known as Sandworm or APT44, has also been observed resuming the use of the wrappers WalnutWipe and SharpWipe, and expanded the use of the Prickly Pear malware downloader. The team highlights the geopolitical implications of these attacks, particularly in the context of Russia's influence on energy and global events. Sherrod also touches on the history of wipers in cyber operations and transitions to a discussion with Elise about trends in North Korean cyber activity, emphasizing Microsoft's ongoing efforts to analyze and mitigate these threats. In this episode you'll learn: Why recent attacks have targeted the European energy sector How Seashell Blizzard's attacks in 2024 involved spear-phishing campaigns Why North Korean hackers infiltrate companies through remote IT job programs Some questions we ask: How has Seashell Blizzard returned to using wipers, and what might explain this shift? After sending out crafted spear-phishing emails, what happens next in the attack chain? How might global geopolitics impact Seashell Blizzard's campaigns? Resources: View Elise Eldridge LinkedIn View Anna Seitz on LinkedIn View Sherrod DeGrippo on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
In this week's episode we dive deep into both the psychological and privacy implications of social media apps. I reflect on my observations during recent travels, and explore how social media platforms are distorting human connections while simultaneously collecting vast amounts of personal data.The episode also tackles the technical aspects of email systems to the limitations of encrypted messaging apps, providing practical advice for maintaining privacy.In this week's episode:Listener Questions - Deep dive into pfSense vs OPNsense, mobile VPN usage, and dealing with license plate readersSocial Media Privacy - Analysis of social media's psychological impact and privacy issues with data collection practicesProper Account Deletion - Step-by-step guide for securely deleting social media accountsSock Puppet Accounts - Maintaining anonymous online identitiesEmail Privacy - Historical perspective and current state of email securityWhatsApp Security - A discussion on encryption and device securityShow Links:Support the Show on Patreon - https://patreon.com/TheLockdownGrapheneOS - https://grapheneos.orgThe Neuroscience of Engagement - https://medium.com/design-bootcamp/the-neuroscience-of-engagement-b50531a9313b"The right information at the right time is deadlier than any weapon."- Dolores Abernathy (Westworld)
My OSINT Training is a company created by Griffin (@hatless1der) Glynn and Micah (@webbreacher) Hoffman. Their goal was to create affordable high quality OSINT training, and they'll be offering that at the Layer 8 Conference in June! You can sign up today for their class! In this episode, we also spoke about the National Child Protection Task Force (NCPTF) and how Micah and Griffin conduct investigations along with how others can help and how ethics play a huge part in their investigations. Griffin also runs a hugely popular page of OSINT tools at The Ultimate OSINT Collection
Join James as he sits down with Mishaal Khan, a seasoned cybersecurity expert with over 20 years of experience in outsmarting attackers. From his early days hacking PC games to his current mission of safeguarding high-profile individuals, Mishaal offers fascinating insights into the world of open-source intelligence (OSINT) and social engineering. Discover how he's intentionally erased his digital footprint, including keeping his own photos offline, hear the intriguing story of how he exposed cheaters using fake e-greeting cards, and learn why you should proactively "stalk yourself" to secure your personal data before someone else does.
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Caitlin Hopkins, Diana Duvieilh, and Anna Seitz to discuss the latest trends in cybersecurity threats. The team explores OSINT observations around Remote Monitoring and Management (RMM) tools like Screen Connect by nation-state actors and reveals how they are used to deploy malware like AsyncRAT, ransomware, and execute phishing scams. They also uncover alarming tactics, such as North Korean IT workers posing as legitimate coders to infiltrate organizations, who steal cryptocurrency and use it to fund their regime. Since 2017 they have contributed to the theft of more than $3 billion. In this episode you'll learn: The role of tech support scam websites in tricking victims into allowing remote access How cybercriminal and nation-state actors are increasingly exploiting remote monitoring Why the financial services sector is a major target for cyberattacks Some questions we ask: What is Screen Connect, and why is it attractive to threat actors? How long have RMM tools been used in C2 frameworks? Why are remote management tools being used in command-and-control systems? Resources: View Caitlin Hopkins on LinkedIn View Diana Duvieilh on LinkedIn View Anna Seitz on LinkedIn View Sherrod DeGrippo on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
This week on The Lockdown, The Practical Privacy & Security Podcast, we're kicking off the new year with reflections, updates, and a deep dive into key privacy issues that are shaping 2025. From privacy settings on iOS and GrapheneOS, to AI assistants and their potential privacy pitfalls, this episode covers practical advice, insights, and solutions for everyday users. Additionally, I explore new state-level privacy laws across the U.S. and what they mean for both businesses and individuals.In this week's episode:Reflecting on personal privacy practices and professional projects.A look at U.S. state privacy regulations taking effect in 2025.Privacy and security implications of voice assistants like Siri, Alexa, and Google Assistant.Detailed privacy settings for iOS and why GrapheneOS is the better alternative.AI assistants like ChatGPT and Claude, and their risks.Privacy concerns with vehicles, focusing on data leaks and constant surveillance.The intersection of cybersecurity and OSINT in modern attacks.Show Links:Apple offers $95 million in Siri privacy violation settlementAmazon to pay $31 million in privacy violation penalties for Alexa voice assistant and Ring cameraNulide / FindMyDevice · GitLabBritish journalist could face years in prison for refusing to hand over his passwords to the police - Il Fatto QuotidianoVolkswagen EV data leak exposes personal information of 3.3 million peopleTesla data helped police after Las Vegas truck explosion, but experts have wider privacy concernsSupport this show: https://www.patreon.com/c/TheLockdownOfficial website: https://psysecure.com/podcast/"If you want to keep a secret, you must also hide it from yourself."-George OrwellPodcast music: The R3cluse
Get your ticket to the Layer 8 Conference on June 14, in Boston! In this episode, we're joined by Nico Dekens, aka Dutch_OSINTGuy where he talks about lessons in OSINT including the value of operational security, ethics and classes he teaches. He also tells us about his 5W1H method of performing an investigation. We also discussed some blog posts he wrote for ShadowDragon, including one about OSINT on people in heightened emotional states.
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач Дзеркало тижня, на Radio NV про сценарії розвитку подій в Україні, в разі обмеження або припинення військової допомоги, після приходу Трампа, на скільки вистачить тієї допомоги, яку погодив Байден, на скільки затримують США обіцяну допомогу, від чого залежала кількість допомоги від Америки, про імпотентність американських політиків, а також про те, чим може себе забезпечити Україна самостійно.Ведуча – Євгенія Гончарук
Harry Kemsley and Sean Corbett are joined by Claire Fuchs, an analyst on the Janes Geoeconomic Influence and Threat Intelligence (GITI) team, to discuss why the nuances of language and linguistics are important to the interpretation of open-source intelligence (OSINT). As a speaker of nine languages Claire explores the need to approach language with caution and the limitations of artificial intelligence (AI) in interpreting and translating language.
Featuring:* Errika Celsy, Director of Educational Technology at Cave Creek Unified School District* Aaron Jones, Analyst at Chandler Police Department* Sandeep Desai, Information Security Officer at Arizona Department of EducationIn this episode, you'll learn:* How Cave Creek School District reduced phishing rates from 15% to 5% through security awareness training and creative incentives* Why cybersecurity risk should be viewed through a business lens rather than just a technical perspective* How law enforcement can leverage open-source intelligence (OSINT) to assist investigations* The importance of the "60/40 Rule" when hiring cybersecurity talent* Strategies for empowering women in technology through programs like "Cyber Squad" and "Girls Get IT"This isn't just a conversation—it's a playbook for building tomorrow's cybersecurity workforce. Don't miss these actionable insights from Arizona's top minds.Timestamps* (00:54) Guest Introductions & Personal Backgrounds* (04:00) TechTales Newsletter: Gamifying Security Awareness* (07:00) Last Bell's Security Corner & Business Risk Alignment* (11:30) Digital Safety Best Practices* (12:00) Digital Citizenship Education at Cave Creek* (14:45) Building the Cybersecurity Talent Pipeline* (18:00) OSINT & Modern Law Enforcement* (23:00) Power of Mentorship in Career Development* (28:45) Girls in Cyber & Women in Technology* (31:45) Final Advice: The 60/40 Rule & Career GrowthLinks Mentioned* Manda's Macs catered at the 2024 Phoenix Live Podcast Tour. Go support a small business in Phoenix, AZ* Nearpod* Shodan* ISACA Phoenix Chapter* Arizona Cyber Command Center* Girls in Cyber Initiative* Glendale Community CollegeWhenever you're ready, there are 4 ways you can connect with TechTables:1. The TechTables Newsletter: Join our thriving community of senior technology leaders by subscribing to the TechTables Newsletter. Gain early access to the latest episodes, industry insights, and exclusive event updates.2.
In episode #183, I sit down with Errika Celsy, Aaron Jones, and Sandeep Desai to uncover Arizona's untold story of creating a cybersecurity leadership pipeline—a playbook for shaping the workforce of tomorrow. Featuring: - Errika Celsy, Director of Educational Technology at Cave Creek Unified School District - Aaron Jones, Analyst at Chandler Police Department - Sandeep Desai, Information Security Officer at Arizona Department of Education In this episode, you'll learn: - How Cave Creek School District reduced phishing rates from 15% to 5% through security awareness training and creative incentives. - Why cybersecurity risk should be viewed through a business lens rather than just a technical perspective. - How law enforcement can leverage open-source intelligence (OSINT) to assist investigations. - The importance of the “60/40 Rule” when hiring cybersecurity talent. - Strategies for empowering women in technology through programs like “Cyber Squad” and “Girls Get IT.” This isn't just a conversation—it's a playbook for building tomorrow's cybersecurity workforce. Don't miss these actionable insights from Arizona's top minds. *** Read the full transcript on https://www.techtables.com/podcast/183/errika-celsy-aaron-jones-sandeep-desai *** Whenever you're ready, there are 4 ways you can connect with TechTables: 1.
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач Дзеркало тижня, на Radio NV про удар по терміналу нафтопродуктів в російському місті Орел, що саме атакувало обʼєкт, про ситуацію на фронті, зокрема на Покровському напрямку, бої в Торецьку, новини з Часового Яру, та участь військових з КНДР в боях на Курщині.Ведуча – Тетяна Іванська
It's been just over 100 days since Kamala Harris officially replaced Joe Biden at the top of the ticket, but it feels like an eternity. With just four days until the most consequential presidential election since 1860, Greg Olear talks to OSINT researcher ne plus ultra Gal Suburban about what to expect on Election Day–and, more ominously, what schemes may come in the weeks after the election is decided.Among the topics discussed: Elon Musk, Mike Flynn, JD Vance, Maria Butina, and more. Plus: a MAGA voting PSA.Follow Gal Suburban:https://x.com/5GW_HotTakes Subscribe to The Five 8:https://www.youtube.com/channel/UC0BRnRwe7yDZXIaF-QZfvhACheck out ROUGH BEAST, Greg's new book:https://www.amazon.com/dp/B0D47CMX17ROUGH BEAST is now available as an audiobook:https://www.audible.com/pd/Rough-Beast-Audiobook/B0D8K41S3T Would you like to tell us more about you? http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=short
Summary Eliot Higgins (X; Wikipedia) joins Andrew (X; LinkedIn) to discuss the work of Bellingcat. Eliot founded the open-source investigative website in 2014. What You'll Learn Intelligence Bellingcat's approach to “investigative journalism” The rise of OSINT as a tool of journalism Bellingcat's relationship with intelligence agencies Case studies from Bellingcat's past, including the Skripal Case and the MH17 flight investigation Reflections Leading by example Accessibility and accountability And much, much more … Quotes of the Week “When I first started doing this work ... I would present geolocation and stuff on stage. The reaction was like I was doing magic tricks, but my point was that. This isn't magic – This is something that you can do and recreate and understand.” - Eliot Higgins. Resources SURFACE SKIM *SpyCasts* Digital Innovation and the Next Frontier of Intelligence with Jennifer Ewbank (2024) The Future of OSINT and the Intelligence Community with Jason Barrett (2024) U.S. Army Open-Source Intelligence (OSINT) with Dennis Eger & Shawn Nilius (2024) Ukraine & Intelligence: One Year On with Shane Harris (2023) DEEPER DIVE Books OSINT Techniques: Resources for Uncovering Online Information, M. Bazzell (2023) Deep Dive: Exploring the Real-world Value of Open Source Intelligence, R. L. Baker (Wiley, 2023) We Are Bellingcat: The Online Sleuths Solving Global Crimes, E. Higgins (Bloomsbury, 2022) Primary Sources Map of Civilian Harm in Ukraine (2024) Death of Sinwar Report (2024) The IC OSINT Strategy 2024-2026 (2024) DoS Open Source Intelligence Strategy (2024) MH17 Investigation (2019) Skripal Report (2018) *Wildcard Resource* The fable of Belling the Cat The inspiration behind Bellingcat's name, the moral of this story is simple – It's one thing to suggest a solution or idea, but it's a whole other beast to actually take action. Learn more about your ad choices. Visit megaphone.fm/adchoices