OSINT Blog

The Chief Intelligence Officer

Cyber threats, capabilities and, intelligence abound and enterprises are staring down a hazy divide between their Corporate structure and those of government agencies and military agencies.

Continue Reading

Investigating Cryptocurrencies and Terrorist Financing

Last summer, the Justice Department dismantled financing campaigns in the government's largest-ever seizure of cryptocurrency in a terrorism context, seizing millions of dollars. The financing schemes involved some of the world's most notorious terrorist groups, namely, the al-Qassam Brigades, Hamas' military wing, al-Qaeda, and the Islamic State of…

Continue Reading

A Brief History of Predicting the Future

Where did OSINT come from, and where can it take us? Open Source Intelligence (OSINT) is a discipline in constant transformation. Although some form of intelligence has always been part of the decision maker's toolkit, it has constantly needed to adapt to match the dynamics and demands of society. Over time, it has evolved from a nebulous concept into…

Continue Reading

OSINT for Ghost Hunters: How to Find Someone Who Doesn’t Want to be Found

The digital environment gives twenty-first-century investigators a novel advantage. Virtually everyone now has a basic digital footprint that is hard to erase, making it difficult for the modern-day criminal to go full "Lord Lucan". And many fugitives from justice continue to sprinkle data across the open source internet with far less discretion than…

Continue Reading

Investigating Underground Wildlife Trade on Instagram

"We have something crazy about to happen," says celebrity YouTuber MoVlogs in a video before showing two white tiger cubs in the trunk of a car. Later the cubs can be seen in his home in Dubai and a backyard swimming pool, where he and family members play with them. The clip has close to three million views, and there are dozens, if not hundreds more…

Continue Reading

No Criminal Is an Island

From ISIS to Q-Anon, criminal networks, and financial frauds: large-scale violence and crime are rarely the work of isolated individuals. “Networked actors” like these are increasingly notorious for their widespread use of social media to communicate, recruit, disseminate ideology, and plan violent or criminal action. But their Twitter proficiency is a…

Continue Reading

Documenting Destruction in Myanmar's Rakhine State With Openly Available Satellite Imagery

Myanmar has been thrown into turmoil after the military seized power and detained the country's democratically elected leader Aung San Suu Kyi, and other members of her government at the beginning of February. Dozens of people have been arrested during country-wide protests, and several have been killed.

Continue Reading

Operational Security in the Battle for Press Freedom

Attacks on journalists are no longer the preserve of war zones and authoritarian states. Reports over the last year have indicated a worrying rise in attacks, not in areas of armed conflict, but across the world’s democracies including Europe and the United States. This trend is likely to continue amid a persistent global climate of civil unrest,…

Continue Reading

The Evidence Challenge

During 2020, financial and white-collar crime have reached record highs, while public prosecution has reached record lows. If the low prosecution rates of high-level executives after the last financial crisis are anything to go by, these statistics are unlikely to improve in the near future. With the right open source intelligence (OSINT) capabilities,…

Continue Reading

From The Age of Information to The Age of Intelligence

We live in a world where information is everywhere but rarely exploited to its full potential. The distinction between information and intelligence has long been established in specialist sectors. But in the broader world, and even within these sectors, the terms are often used interchangeably. As a result, vast amounts of valuable information are…

Continue Reading

Popular

Popular Tags

see all

Follow Us