Open Source Intelligence (OSINT)

Slides:



Advertisements
Similar presentations
Open Source Intelligence (OSINT)
Advertisements

Real Time Information.
1 Lesson 15 Evaluating Electronic Information Computer Concepts BASICS 4 th Edition Wells.
Maximise Your Online Presence SEO & Social Media Strategies For Local Business Owners.
Open Source Intelligence (OSINT) OSINT and TRASHINT This presentation is the sole property of OSPA. Distribution is limited to OSPA members registered.
Social Media Intro to Business & Marketing. The most three most trusted forms of advertising are: Recommendations from people I know - 90% Consumer opinions.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
INFORMATION SCIENCE IN JOURNALISM Genna Gross. WHAT IS JOURNALISM?  The main aspect of journalism is knowing how to construct information.  Journalists.
Make It Easy For e-Buyers to Contact You Toll-free phone numbers Call centers Text messaging Instant chat 1.
Finding Credible Sources
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
American Media Unit. Print Media Newspapers, magazines, journals, news letters, etc. Oldest form of media Predate our nation The New York Times “Paper.
Objectives You will be able to… Define the essential vocabulary terms regarding the media. List at least 4 different types of media. Explain in at least.
LESSON 2: Internet, Computer Ethics and Security
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
Social Bookmarking with del.icio.us. What is del.icio.us? Social Software Store your bookmarks online Tag your bookmarks Share your bookmarks with others.
Current Information To help you find current news and information, many search engines and directories include a hyperlink to a "What's new" page. Many.
Operational Security Awareness
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Broadcast Journalism Chapters 16 & 17. Freedom of Information The 1966 Freedom of Information Act (FOIA). Also called the “sunshine laws,” the FOIA grants.
Evaluating Sources Garbage in, garbage out.. Reading Critically As an author, you have the responsibility of presenting authentic and valid evidence to.
BACHELOR IN ENGLISH AS A FOREING LANGUAGE Course: Technology in Teaching English as a Foreign Language technological resources in education Name: Yesid.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
PBL Project Based Learning. What is PBL? PBL is a model for classrooms that emphasizes long- term, interdisciplinary and student-centered activities.
Types and purposes of online communities. Types of websites within online communities blogs chat rooms forums social networking wikis.
O nline R eputation. Paris Brown She was 17 She was 17 From Kent From Kent She was Britain’s first youth crime commissioner She was Britain’s first.
MEDIA IN ADVERTISING - DIGITAL MEDIA - Topic 8 Introduction to Advertising.
Don McClain Real Estate Marketing Ideas Guaranteed To Close More Sales EZ House Buyers.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Public Relations & Social Media. Public Relations What is.
What does yours look like? Your Digital Footprint.
Why should Real Estate Agents have an Amazing Website?
Internet Business Associate v2.0
Creating your online identity
Where it is today and how it is used.
2nd GEO Data Providers workshop (20-21 April 2017, Florence, Italy)
Social Media Dominique Renault.
PRIMARY DATA vs SECONDARY DATA RESEARCH Lesson 23 June 2016
SEARCH ENGINE OPTIMIZATION
Bell Ringer List five reasons why you think that some new businesses have almost immediate success while others fail miserably.
Fair Use in the Classroom
Operations Security (OPSEC) For New Hires
BEST SEO COMPANY IN UDAIPUR
Evaluation of Research Methods
Library Web Portals: Reinventing Libraries for the Future
Web 2.0 and Internet Safety for Educators
Digital vs Analogue.
BLOOD DISORDER RESEARCH … using RHS Library Resources
Topic 5: Online Communities Press F5 to view!
Social Media Marketing: A Strategic Approach, 2e
SEARCH ENGINE OPTIMIZATION
Open Source Intelligence (OSINT)
Finding Sources Introduction Types of sources Locating sources
Using the Web for Teaching and Learning
Basic Research Terms Research—the process of finding information relevant to a particular topic Source—any medium that provides information relevant to.
Web 2.0 Technologies and Community Building Online by
Low Cost Media & Outreach Strategies
Media Awareness New and Social Media.
Resources and Strategies for Collaboration and Networking
Building Relationships One Tweet at a Time
Digital Stewardship Curriculum
How to Use Social Networking to Help Job Seekers
DITA.XML.ORG Home page Recent posts Upcoming events DITA Info
Lesson 2: Internet Communication
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
CYBERSAFETY & Personal information
Web Browsers Sarah Bradley.
AN INTRODUCTION TO JOURNALISM
Digital Identity Digital Identity is the concept of adopting an online presence or networked identity in cyberspace by an individual or an organization.
Presentation transcript:

Open Source Intelligence (OSINT) Introduction to OSINT http://www.opsecacademy.org

What is OSINT? OSINT: Open Source Intelligence; publicly available information. i.e., information that any member of the public could lawfully obtain by request or observation, as well as other unclassified information that has limited public distribution or access. OSINT represents a constant threat to any organization or mission, and can account for up to 80% of actionable intelligence, which is generally not protected and not classified. In most cases, it’s legal to obtain information in this way. This means that despite the high potential for harm, this critical information may be obtained at little or no risk to the intruder.

Definitions: Open Source Data (OSD): the raw print, broadcast or information in any other form from a primary source. This can include photographs, tape recordings, satellite imagery, personal letters, online postings, etc. Open Source Information (OSIF): Generic information generally intended for wide dissemination that combines multiple pieces of data using some level of validation. Examples include books, newspapers and news reports. Validated Open Source Intelligence (OSINT-V): Information to which a high degree of certainty can be attributed. This includes two categories: Information which comes from an established reliable source and/or can be validated by comparing to other data Information which can be established as valid in its native format. i.e., news reports showing a state leader’s speech. This, of course, must consider the possibility of manipulation or forgery.

OSINT Sources Media Internet Geographic Observation Academia Intelligence can be gathered from a broad range of publically available sources. Media Television, radio, newspaper, magazines Internet Search engines Google, Bing, Yahoo User-generated content Blogs, forums, social-networking, wikis RSS feeds Peer to Peer (P2P) Geographic Maps and environmental and navigational data Observation Camera, video recorder, reporting Academia Experts, research, conferences

OSINT Sources Government at all levels Intelligence can be gathered from a broad range of publically available sources. Government at all levels FOIA Building permits Patent offices Paid Services and Public Records Credit reports People searches Real Estate records Military records Association directories Business Records SEC filings Legal activities Press releases

What is the value of OSINT? OSINT has incredible value, both positive and negative to the originator or dedicated recipient of the information: Journalists and researchers use OSINT to generate a story or obtain greater information on a subject. The US Library of Congress collects vast amounts of this type of data. OSINT gives context to classified information. Generally, only select information meets the criteria for classification, with unclassified sources of information filling the gaps. OSINT gives adversarial forces a starting point and additional resources necessary to leverage further attacks or exploitation. OSINT reveals the intent of friendly or adversarial forces. OSINT reveals current status, capabilities or other contemporary information.

Who collects and uses OSINT? Military, friendly and enemy Business Law Enforcement Government Criminals Spies

Who collects and uses OSINT? “Intelligence units mine the benefits of public sources” -Government Computer News, March 17, 2006 “Man uses Facebook to help police catch criminal” -ABC News, March 20, 2010 “Could Twitter robbers get to you?” -NBC News, June 3, 2009

Who collects and uses OSINT? “Is your sensitive company info being leaked on LinkedIn?” -Washington Times, April 18, 2006 “CIA mines ‘rich’ content from blogs” -ComputerWorld, May 19, 2011 “Spy Agencies Turn to Newspapers, NPR and Wikipedia for Information” - US News, September 12, 2008

OSINT The Internet In the modern context, it’s tempting to think of OSINT as “the Internet”. While the advent of the internet has brought new opportunities to analysts and adversaries alike, OSINT has been a problem for the intelligence community for years before the advent of the modern Internet. Examples of resources that are of value to an adversary and predate the internet are: Job announcements Public records, like building permits Personal records, like credit reports News and periodicals, like press releases, radio, television, etc

iChanges The Internet, and related technologies have, however, added to the already immense quantity of critical information that may be obtained by the public. For example: Chatrooms, forums, file sharing Company information in whois, online filings, etc Webpages, blogs Online news

Why create such information? Generating information is the natural result of doing business. Much of the information that may be beneficial to an adversary is created for a legitimate purpose, such as business filings or press releases. The important thing to consider is how this information can provide clues to identify targets, activities, real-time operations and more. When it’s necessary to create and share information, only the information that’s necessary to be shared should be included, and even that must be evaluated for its potential impact. I’m online, therefore I am. -Descartes

See for yourself Consider how easy it is to find information about yourself. If you were an adversary, perhaps a business competitor, burglar, foreign military, or something else entirely, what could you learn from your physical and online presence? Personal: Search white pages http://www.whitepages.com Search social networks: http://www.wink.com Search for your email address in Google Type in your address into Google Maps, and zoom in to street view Search in your refuse bins- what are you throwing away? What are you saying in chat rooms or forums? Business: Check your press releases and job listings. Have you listed your network security equipment in job descriptions? Search refuse bins for sensitive memos, employee directories, etc What is revealed on your company webpage?