OSINT Blog

Tracking Illegal Horse Poaching With Satellite Imagery, Public Records, and Crowdsourcing

A series of gruesome killings at the end of 2019 shook horse owners in Florida: Three horses were stolen and brutally butchered--most likely for consumption--in the state in less than two weeks. Owners had to fear that their animals would be next, and they wondered who the perpetrators were.

Continue Reading

A Fraud with Your Name on It: The Use and Abuse of OSINT in Identity Fraud

Identity fraud is on the rise. The digital shift of the pandemic has affected virtually every activity and sector: including financial crime, and the malicious theft of personal information. This is a problem not just for individuals but for businesses too. Employees’ “personal” information often includes data used to access internal systems, company…

Continue Reading

Hunting for Open Secrets: How OSINT Can Help You Intercept a Scandal

For centuries, access to information was limited by human, geographic, and technological limitations. Corruption was typically a conversation behind closed doors. Fast forward to the year 2021, and information is everywhere. That means the conversation is often closer - and more accessible - than you might think. Sometimes it’s held right in the middle…

Continue Reading

Justice in a Virtual World: Will a Post-Lockdown Move Online Make Justice More Accessible?

Even before Coronavirus struck, there were calls for greater online facilitation of legal processes. According to the Organisation for Economic Co-operation and Development (OECD), less than 50 percent of people live under the protection of the law. In contrast, more than 50 percent of people have access to the internet in one way or another. That’s to…

Continue Reading

How Forensic Architecture Uses 3D Reconstruction to Investigate Human Rights Violations and State Violence

The success of open source investigations often hinges on the availability of visual evidence like photos or videos found on social media, CCTV footage, or satellite imagery. But what can you do when that evidence isn't conclusive or simply not available?

Continue Reading

The Anatomy of Onshore Money Laundering

The use of legitimate “onshore” economies as a thoroughfare for international financial crime is surprisingly widespread. Whilst scrutiny has long targeted offshore tax havens and low-disclosure jurisdictions - and not without good reason - comparatively, little attention has been paid to fraudsters brazenly operating on home ground.

Continue Reading

Tracking Down Hackers With Passive DNS Data and SSL Certificates

In early February 2018, Bui Thanh Hieu received an email. It was an invitation to an event he had been planning to attend. Bui Thanh Hieu, a Vietnamese dissident and blogger, living in Germany, knows he needs to be cautious. He nevertheless clicked the link in the email. It didn't look suspicious and seemed to come from a familiar email address.

Continue Reading

OSINT is the New Black Ops: Intelligence in a “Post-Truth” Information Age

Post-truth information inhabits the grey space between fact and fiction. It is where slippage between truth, “alt-facts”, opinions, and beliefs creates a treacherous informational landscape, and objective truth remains evasive. Such an environment spells trouble for any industry that depends on granular coverage of objective facts to make informed…

Continue Reading

Using Satellite Images and Machine Learning to Track Illegal Amber Mining in Ukraine

Ukraine’s northwest was once covered in lush pine forests. Now, much of the ground where these trees once stood has been turned into cratered, moon-like landscapes. The culprit: illegal miners who are digging up the earth searching for amber.

Continue Reading

From Checklist to Checkmate: How to Really Know Your Client

Does your customer know you better than you “Know Your Customer”? Over the past two decades, U.S. regulators have handed out billions of dollars in fines and deferred prosecution agreements (DPAs) for the facilitation of money laundering, sanctions evasion, or terrorist financing. But the $2 trillion worth of suspicious transactions detailed in last…

Continue Reading

Popular

Popular Tags

see all

Follow Us