Presentation on theme: "Open Source Intelligence (OSINT)"— Presentation transcript:
1Open Source Intelligence (OSINT) Introduction to OSINTThis presentation is the sole property of OSPA. Distribution is limited to OSPA members registered in theOSPA OPSEC Academy
2What is OSINT?OSINT: Open Source Intelligence; publicly available information. i.e., information that any member of the public could lawfully obtain by request or observation, as well as other unclassified information that has limited public distribution or access.OSINT represents a constant threat to any organization or mission, and can account for up to 80% of actionable intelligence, which is generally not protected and not classified.In most cases, it’s legal to obtain information in this way. This means that despite the high potential for harm, this critical information may be obtained at little or no risk to the intruder.
3Definitions:Open Source Data (OSD): the raw print, broadcast or information in any other form from a primary source. This can include photographs, tape recordings, satellite imagery, personal letters, online postings, etc.Open Source Information (OSIF): Generic information generally intended for wide dissemination that combines multiple pieces of data using some level of validation. Examples include books, newspapers and news reports.Validated Open Source Intelligence (OSINT-V): Information to which a high degree of certainty can be attributed. This includes two categories:Information which comes from an established reliable source and/or can be validated by comparing to other dataInformation which can be established as valid in its native format. i.e., news reports showing a state leader’s speech. This, of course, must consider the possibility of manipulation or forgery.
4OSINT Sources Media Internet Geographic Observation Academia Intelligence can be gathered from a broad range of publically available sources.MediaTelevision, radio, newspaper, magazinesInternetSearch enginesGoogle, Bing, YahooUser-generated contentBlogs, forums, social-networking, wikisRSS feedsPeer to Peer (P2P)GeographicMaps and environmental and navigational dataObservationCamera, video recorder, reportingAcademiaExperts, research, conferences
5OSINT Sources Government at all levels Intelligence can be gathered from a broad range of publically available sources.Government at all levelsFOIABuilding permitsPatent officesPaid Services and Public RecordsCredit reportsPeople searchesReal Estate recordsMilitary recordsAssociation directoriesBusiness RecordsSEC filingsLegal activitiesPress releases
6What is the value of OSINT? OSINT has incredible value, both positive and negative to the originator or dedicated recipient of the information:Journalists and researchers use OSINT to generate a story or obtain greater information on a subject. The US Library of Congress collects vast amounts of this type of data.OSINT gives context to classified information. Generally, only select information meets the criteria for classification, with unclassified sources of information filling the gaps.OSINT gives adversarial forces a starting point and additional resources necessary to leverage further attacks or exploitation.OSINT reveals the intent of friendly or adversarial forces.OSINT reveals current status, capabilities or other contemporary information.
7Who collects and uses OSINT? Military, friendly and enemyBusinessLaw EnforcementGovernmentCriminalsSpies
8Who collects and uses OSINT? “Intelligence units mine the benefits of public sources”-Government Computer News, March 17, 2006“Man uses Facebook to help police catch criminal”-ABC News, March 20, 2010“Could Twitter robbers get to you?”-NBC News, June 3, 2009
9Who collects and uses OSINT? “Is your sensitive company info being leaked on LinkedIn?”-Washington Times, April 18, 2006“CIA mines ‘rich’ content from blogs”-ComputerWorld, May 19, 2011“Spy Agencies Turn to Newspapers, NPR and Wikipedia for Information”- US News, September 12, 2008
10OSINT The InternetIn the modern context, it’s tempting to think of OSINT as “the Internet”. While the advent of the internet has brought new opportunities to analysts and adversaries alike, OSINT has been a problem for the intelligence community for years before the advent of the modern Internet. Examples of resources that are of value to an adversary and predate the internet are:Job announcementsPublic records, like building permitsPersonal records, like credit reportsNews and periodicals, like press releases, radio, television, etc
11iChangesThe Internet, and related technologies have, however, added to the already immense quantity of critical information that may be obtained by the public. For example:Chatrooms, forums, file sharingCompany information in whois, online filings, etcWebpages, blogsOnline news
12Why create such information? Generating information is the natural result of doing business. Much of the information that may be beneficial to an adversary is created for a legitimate purpose, such as business filings or press releases.The important thing to consider is how this information can provide clues to identify targets, activities, real-time operations and more. When it’s necessary to create and share information, only the information that’s necessary to be shared should be included, and even that must be evaluated for its potential impact.I’m online, therefore I am.-Descartes
13See for yourself Consider how easy it is to find information about yourself. If you were an adversary,perhaps a business competitor, burglar, foreignmilitary, or something else entirely, what couldyou learn from your physical and online presence?Personal:Search white pagesSearch social networks:Search for your address in GoogleType in your address into Google Maps, and zoom in to street viewSearch in your refuse bins- what are you throwing away?What are you saying in chat rooms or forums?Business:Check your press releases and job listings. Have you listed your network security equipment in job descriptions?Search refuse bins for sensitive memos, employee directories, etcWhat is revealed on your company webpage?