OSINT Blog
OSINT Live Speaker Spotlight: Cynthia Hetherington
Cynthia Hetherington will speaking at this year’s OSINT Live and will be sharing some of his OSINT wisdom. In this article, we're shining the spotlight on Cynthia to enable attendees to learn more about Cynthia and the topic she's presenting at OSINT Live. Who is Cynthia Hetherington? Cynthia Hetherington, MLS, MSM, CFE, CII is the founder and…
Continue ReadingOSINT Live Speaker Spotlight: Chris Poulter
Chris Poulter will speaking at this year’s OSINT Live and will be sharing some of his OSINT wisdom. In this article, we're shining the spotlight on Chris to enable attendees to learn more about Chris and the topic he's presenting at OSINT Live. Who is Chris Poulter? Chris is the Founder & CEO of OSINT Combine who provide intelligence training &…
Continue ReadingHandling the Test Purchasing Process during OSINT Investigations
Investigators, working on behalf of law enforcement and private companies, monitor digital marketplaces to identify and remove IP infringements, stolen goods, or prohibited goods. Often, identifying an illicit good online is insufficient to support a prosecution. Determining if a good is illicit, legitimate, or fake, requires an investigator to see it…
Continue ReadingIntelligence Function Architecture: A Blueprint for Building and Scaling an Effective Intelligence Unit
Intelligence has been used throughout history to gain an advantage over adversaries.
Continue ReadingEnhancing Financial Crime Controls with OSINT
The United Nations Office on Drugs and Crime estimates that between 2-5% of the global GDP is laundered globally in one year, totaling $2 trillion US dollars. Financial institutions are bound by laws and regulations intended to stop criminals from disguising illegally obtained funds as legitimate income to combat this criminality.
Continue ReadingOSINT for Charities and Non-Profits
Non-profits and Charities can utilize OSINT to secure their people and organization and support investigations. Donation funded, charities and non-profits often have to rely on limited resources to conduct investigations and monitor threats.
Continue ReadingBrowser Extensions for OSINT Investigation
Browser Add-ons can be of great help to OSINT investigators in simplifying and automating tasks. We’ve collated a list of some of the browser add-ons that the Skopenow’s team uses most frequently during internet investigations.
Continue ReadingLeveraging OSINT for Corporate Security
To successfully protect people and assets, corporations must contend with several crime types, including theft of property, money, and data, intellectual property breaches, fraud, and cyber-attacks.
Continue ReadingThe Lego Method: An Investigator's Process for Enhancing OSINT
My bewildered colleague, who wanted to observe a digital investigation, struggled to comprehend my focus on the Facebook profile of a seemingly unimportant woman. I found her by reversing the phone number of a current tenant living where the subject allegedly resided. However, no obvious links between the two individuals existed: major age gap,…
Continue ReadingGoogle Dorks for OSINT Investigations
Dorking is a technique that uses advanced search operators within Google Search and other search engines to find information. Primarily used to locate security holes in the configuration and computer code within websites, Dorks can also provide investigators with opportunities to enhance intelligence gathering during OSINT investigations.
Continue Reading