There is a lot out there in terms of public conversations. People use the Internet to communicate everything, even beyond the boundaries of what is often acceptable in regular society. OSINT investigators will want to capture all conversations and interactions surrounding an event for a threat actor they are investigating.
The investigative process requires the right lens, and you need to know where to start looking. OSINT techniques uncover information about malicious threat actors, possible threats, or crimes that have occurred in the conversations and breadcrumbs that people leave behind on the Internet in the commission of, or in relation to, the acts.
What was once the domain of highly specialized teams even half a decade ago, the collection and utilization of OSINT data as a function of security is now becoming a critical component of overall threat intelligence for both corporate and cybersecurity teams. With this rise in priority has come the expansion of teams and an influx of new OSINT practitioners.
All organizations conduct some form of due diligence. It enables decision-makers to identify relationships that will serve in the best interests of their shareholders, customers, employees, and brand. Incorporating OSINT into your due diligence process will be key to getting the information you need.
The COVID-19 pandemic has resulted in a renewed surge of cyber attacks and exploits. Open-source intelligence holds keys to investigating these types of emerging cyber threats.
An industry that was formerly the concern of physical security now requires a converged security approach. The convergence of cyber and physical security will allow security teams to have better communication and broaden their scope of intelligence that couldn’t be otherwise accomplished by operating in silos.
The Dark Web has had an indelible impact on corporate security. As the convergence of physical and digital worlds generate…
Official reports from the CDC and WHO only told part of the story. Using the Media Sonar platform, we used a simple set of queries to quickly identify any newly reported cases as they were discovered. This information helped fill any gaps and delays in official reporting and helped to provide an early warning of new cases in North America.
What does situational awareness have to do with facility protection? Facility protection involves protecting physical spaces. This is traditionally accomplished by controlling access and monitoring the physical space for threats. Security personnel observe people, and their behaviors, to inform what actions need to be taken at any given moment. The responses tend to be more reactive than proactive because you must rely on what you see to dictate what to do.
For physical security professionals managing safety and security risks to locations and facilities, this might involve access control, camera systems, or even drones. But consider this: The Internet is undeniably where people go to communicate. An offensive approach using Internet chatter and data from social media, news, blogs, and the Dark Web is necessary to mitigate risks to human lives and protect brand interests.