The Journey of Petterson 130

woundtaste0's blog

header photo

Osint Research

Qwarie specialises in Social Media research, which is performed in full compliance with the GDPR, DPA 2018 and other pertinent legislation. Humans need to view the output of automated tools to know whether the collected data is reliable and trustworthy; they also need to compare it with some classified data (this is applicable for some military and commercial information) to assure its reliability and relevance.
It's eerily easy to create a social media account that looks like it belongs to someone else and fool the internet with it. For example, President OSINT Donald Trump rose to power in no small part through the help of his verified and extremely active Twitter account, @RealDonaldTrump.

Pune, Maharashtra, February 28, 2020 (Wiredrelease) Market Research Future published a research report on Open Source Intelligence (OSINT) Market Research Report-Global Forecast to 2023”-Market Analysis, Scope, Stake, Progress, Trends and Forecast to 2023.
Protective Intelligence Network research and gather information for you using state of the art technological solution, and particular searching techniques, providing verifications, security due diligences, reputational analysis and investigative reports.
Advancements in analytics, like developments in big data analytics, text analytics, web analytics, and social media analytics, are likely to gain traction for more revenue generation for the Open Source Intelligence Market Expansion of open source public database at a rapid rate and increase in cyber security threat are other factors propelling the open source intelligence market growth.

The real world use for this Facebook analysis has come in handy for cases where people have been impersonated online with false accounts and for cases where a subject created multiple accounts and I needed to map out potential account involvement based on an activity or event that had occurred at a certain point in time.
Google, Yandex, Bing, and Exalead are search engines that are used in backend as a source, while Shodan is also a search engine but not the conventional one and we already discussed a bit about it earlier and we will discuss in detail about the same in this chapter later.

Many vertical sectors also have information sharing and analysis centers (ISACs), which are excellent sources of information, as are sector-independent fora like Facebook's ThreatExchange and AlienVault's Open Threat Exchange The IBM X-Force Exchange also provides an extensive threat database that is searchable by a range of parameters, including application name, IP and URL.
Whatever your goals, open source intelligence can be tremendously valuable for all security disciplines Ultimately, though, finding the right combination of tools and techniques for your specific needs will take time, as well as a degree of trial and error.

In particular, Mike Bazell hosts an amazing website and podcast about OSINT that constantly points to new and innovative investigation techniques, and both Twitter and Github are full of new OSINT tools being developed and released by the OSINT community.
The OSINT involves data accumulation from an array of information available publicly on various platforms, however, the entire process involves substantial investment and expertise in the automation and information extraction process. Yes, sign me up for TII's Online Research and Intelligence Newsletter.

Go Back