background preloader

Readings & Literature

Facebook Twitter

Osint/OSINT_2_2011.pdf. OSINT Tools: The Foundation for Social-engineering and Phishing Attacks. Have you ever wondered how someone sitting 7,300 miles away is able to easily penetrate an organization’s network? How someone who has never had legitimate access to a network can learn more about that organization than most of its own employees?

It’s actually pretty easy, given the right skill set and a lot of patience. I know cyberwarfare isn’t a new thing, but it’s still impressive to think that someone on the other side of the globe, a few continents away, is able to wreak so much havoc. I recently gave a presentation to a group on the topic of open-source intelligence (OSINT). Validación de fuentes OSINT en Internet. Sabemos que Internet es una “mina de oro” de información, que aplicándole las técnicas de análisis más adecuadas, nos puede permitir llegar a conclusiones bastante jugosas. Prueba de ello es el éxito que va adquiriendo cada vez más el OSINT (Open Source Intelligence). Ahora bien, puesto que los datos y la información de la que nos nutrimos viene de un medio bastante volátil y alimentado, en gran medida, por personas anónimas, asociaciones independientes, consumidores y demás organizaciones de las que podemos conocer poco o nada, conviene tener especial cuidado a la hora de procesarlas para un análisis de Inteligencia .

Entremos en materia: entiendo que no revelo nada nuevo cuando comento que detrás de toda publicación o comunicación hay un motivo y una serie de creencias que pueden estar, o no, sustentadas por algún tipo de ideología. Como siempre, hagámonos una serie de preguntas con algunos ejemplos: No se suele citar a la fuente de donde se ha extraído la información . Reexamining the Distinction Between Open Information and Secrets. Stephen C.

Reexamining the Distinction Between Open Information and Secrets

Mercado “Open sources often surpass classified information . . .” We need to rethink the distinction between open sources and secrets. Too many policymakers and intelligence officers mistake secrecy for intelligence and assume that information covertly acquired is superior to that obtained openly. Yet, the distinction between overt and covert sources is less clear than such thinking suggests. Mistaking Secrecy for Intelligence. Open Source Intelligence by Jeff Bardin. Posted by david b. on March 5, 2013 Jeff Bardin, the prominent cyber security professional and consultant with enormous background in intelligence, risk management and information security, shares his expertise at Hacktivity conference, delving into the methods and tools for open source cyber intelligence.

Open Source Intelligence by Jeff Bardin

Conference Host: It’s my honor to introduce to you our first speaker, our first “rock star”. His name is Jeff Bardin. Jeff was awarded for Excellence in the Field of Security at RSA Conference. And today he’s one of the most recognized experts of cyber crime and cyber security worldwide. Jeff Bardin: Morning! Anyway, today we’re going to talk about open source intelligence, and most of you here are looking at the cyber security arena from a hacking perspective – that’s why you’re here at Hacktivity. Since around 2005, I’ve been creating sock puppets, and most of my targets have been cyber Jihadist sites. Prevalent types of today’s cyber threats Instructive tips to get started. Past, Present and Future of OSINT. Images/rieas139.pdf. Knowledge Making Sense - Restricted OSINT (Open Source Intelligence) collection makes what? It is a plain fact that many government agencies both in the U.S. and around the world who restrict their employees from visiting social networking sites (SNS) through the use of a firewall filter.

Knowledge Making Sense - Restricted OSINT (Open Source Intelligence) collection makes what?

This is true for many major corporations. While some employees honor their organization's policy, many are turning to free proxy services in order to get their daily social networking fix on Twitter, Facebook,YouTube, etc. It is a widely accepted belief from OSINT (Open Source Intelligence) practitioners that these kind of restrictions ultimate effect will be to further isolate the intelligence agencies from the "real" or unclassified world.

In our daily operations, we use professional and social network sites to identify and reach out to individuals who may ultimately offer, and be willing to share their expertise, working knowledge and potential network in a collaborative manner to facilitate, promote and share other resources for potential opportunities or joint ventures. Tech Insight: Better Defense Through Open-Source Intelligence. Ahproject2012.files.wordpress.com/2013/01/1-s2-0-s1361372311700392-main.pdf.