OSINT Blog
Tracking Illegal Horse Poaching With Satellite Imagery, Public Records, and Crowdsourcing
A series of gruesome killings at the end of 2019 shook horse owners in Florida: Three horses were stolen and brutally butchered--most likely for consumption--in the state in less than two weeks. Owners had to fear that their animals would be next, and they wondered who the perpetrators were.
Continue ReadingA Fraud with Your Name on It: The Use and Abuse of OSINT in Identity Fraud
Identity fraud is on the rise. The digital shift of the pandemic has affected virtually every activity and sector: including financial crime, and the malicious theft of personal information. This is a problem not just for individuals but for businesses too. Employees’ “personal” information often includes data used to access internal systems, company…
Continue ReadingHunting for Open Secrets: How OSINT Can Help You Intercept a Scandal
For centuries, access to information was limited by human, geographic, and technological limitations. Corruption was typically a conversation behind closed doors. Fast forward to the year 2021, and information is everywhere. That means the conversation is often closer - and more accessible - than you might think. Sometimes it’s held right in the middle…
Continue ReadingJustice in a Virtual World: Will a Post-Lockdown Move Online Make Justice More Accessible?
Even before Coronavirus struck, there were calls for greater online facilitation of legal processes. According to the Organisation for Economic Co-operation and Development (OECD), less than 50 percent of people live under the protection of the law. In contrast, more than 50 percent of people have access to the internet in one way or another. That’s to…
Continue ReadingHow Forensic Architecture Uses 3D Reconstruction to Investigate Human Rights Violations and State Violence
The success of open source investigations often hinges on the availability of visual evidence like photos or videos found on social media, CCTV footage, or satellite imagery. But what can you do when that evidence isn't conclusive or simply not available?
Continue ReadingThe Anatomy of Onshore Money Laundering
The use of legitimate “onshore” economies as a thoroughfare for international financial crime is surprisingly widespread. Whilst scrutiny has long targeted offshore tax havens and low-disclosure jurisdictions - and not without good reason - comparatively, little attention has been paid to fraudsters brazenly operating on home ground.
Continue ReadingTracking Down Hackers With Passive DNS Data and SSL Certificates
In early February 2018, Bui Thanh Hieu received an email. It was an invitation to an event he had been planning to attend. Bui Thanh Hieu, a Vietnamese dissident and blogger, living in Germany, knows he needs to be cautious. He nevertheless clicked the link in the email. It didn't look suspicious and seemed to come from a familiar email address.
Continue ReadingOSINT is the New Black Ops: Intelligence in a “Post-Truth” Information Age
Post-truth information inhabits the grey space between fact and fiction. It is where slippage between truth, “alt-facts”, opinions, and beliefs creates a treacherous informational landscape, and objective truth remains evasive. Such an environment spells trouble for any industry that depends on granular coverage of objective facts to make informed…
Continue ReadingUsing Satellite Images and Machine Learning to Track Illegal Amber Mining in Ukraine
Ukraine’s northwest was once covered in lush pine forests. Now, much of the ground where these trees once stood has been turned into cratered, moon-like landscapes. The culprit: illegal miners who are digging up the earth searching for amber.
Continue ReadingFrom Checklist to Checkmate: How to Really Know Your Client
Does your customer know you better than you “Know Your Customer”? Over the past two decades, U.S. regulators have handed out billions of dollars in fines and deferred prosecution agreements (DPAs) for the facilitation of money laundering, sanctions evasion, or terrorist financing. But the $2 trillion worth of suspicious transactions detailed in last…
Continue Reading