Open Source Intelligence (OSINT)

Slides:



Advertisements
Similar presentations
Lecture 2 - Revenue Models
Advertisements

Final Project Instructor: Nguyen Anh Tu Students: Tran Tien Tai Tran Tien Tai Tran Ngoc Mai Tran Ngoc Mai Tu Kim Tuan Tu Kim Tuan Nguyen Ngoc Phuong Nguyen.
New Media for Agricultural Communications. RSS RSS is a family of web feed formats used to publish frequently updated content such as blog entries, news.
UKOLN is supported by: Using Blogs, Micro-blogs and Social Networks Effectively Within Your Library: Introduction Brian Kelly / Marieke Guy UKOLN University.
Use, Copyright, and Ownership Notice (This slide may be deleted when using this presentation in a classroom course.) This course is the property of International.
December 3, 2009 Alan Knecht President/Founder Knechtology Inc. Search Engine Optimization & PR.
VSS Communications Industry Forecast Now with Data and Analysis by Both Revenue Stream Sector & Industry Sector It’s my pleasure to be able.
Real Time Information.
By Gavin & Saeed. Live broadcast on TV (BBC, CNN, E!, etc…) Official website ( Blogs Social networks (Facebook,
UKOLN is supported by: Using Blogs Effectively Within Your Organisation: Introduction A Half-Day Workshop Brian Kelly UKOLN University of Bath Bath, UK.
“How Can Research Help Me?” Please make SURE your notes are similar to what I have written in mine.
1 Lesson 15 Evaluating Electronic Information Computer Concepts BASICS 4 th Edition Wells.
Databases vs the Internet Coconino Community College Revised August 2010.
What Anyone Can Know The Privacy Risks of Social Networking Sites. Thelma Ameyaw TEL2813.
Tweet That Town! How to Turn the Twitter Lackluster in Local Government into Vibrant Online Community Building Dr. Marcus Messner Virginia.
Maximise Your Online Presence SEO & Social Media Strategies For Local Business Owners.
Open Source Intelligence (OSINT) OSINT and TRASHINT This presentation is the sole property of OSPA. Distribution is limited to OSPA members registered.
Social Media Intro to Business & Marketing. The most three most trusted forms of advertising are: Recommendations from people I know - 90% Consumer opinions.
Databases Chapter 11.
INTRODUCTION In this presentation definition of ICT and its impacts-economic and social are discussed briefly. The topic of “ICT in education” is dealt.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Computer Ethics Using Internet efficiently and productively Plagiarism, Internet addiction, Game addiction.
INFORMATION SCIENCE IN JOURNALISM Genna Gross. WHAT IS JOURNALISM?  The main aspect of journalism is knowing how to construct information.  Journalists.
SOCIAL MEDIA FOR BUSINESS reqSmart. Some Facts about Social Media - I Years to reach 50 million users. Radio – 38 years Television – 13 years Internet.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Paul Mundy and Bob Huggan 1 Websites.
1 Moderator: Thomas N. Shorter, Godfrey & Kahn, S.C. Panelists: Nancy Davis, Ministry Health Care Lee Kadel, Wheaton Franciscan Healthcare Ralph Topinka,
AVI/Psych 358/IE 340: Human Factors Web 2.0 November
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Knowing Your Facebook From Your Flickr Dan O’ Neill – -
Make It Easy For e-Buyers to Contact You Toll-free phone numbers Call centers Text messaging Instant chat 1.
Tablet Camp 2015 Resource Guide for Students at Klein ISD 1:1 Campuses.
Internet Skills The World Wide Web (Web) consists of billions of interconnected pages of information from a wide variety of sources. In this section: Web.
Finding Credible Sources
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
The Read Write Web Chapter One Presentation By Shontae Dandridge October 20, 2011.
Delivering Your Messages in Today’s Online Environment American Library Association, PR Forum Kevin T. Kirkpatrick Executive Vice President Sunday, July.
Podcasting Nick Weare Radio and Recorded Sound Specialist National Film and Sound Archive.
American Media Unit. Print Media Newspapers, magazines, journals, news letters, etc. Oldest form of media Predate our nation The New York Times “Paper.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Presented at the 4 th Annual VCARA Conference Digital Stewardship & Knowledge Dissemination in the 21st Century May 2013 SLIS Island – Second Life By Sarah.
Objectives You will be able to… Define the essential vocabulary terms regarding the media. List at least 4 different types of media. Explain in at least.
LESSON 2: Internet, Computer Ethics and Security
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
Facebook is national security threat. A new list of rules announced Thursday aims to prevent soldiers and Defense Ministry employees from revealing classified.
Provided by OSPA ( Vulnerabilities and Indicators The OPSEC Process, step 3 Presented by: (Presenter’s Name)
OCLC Online Computer Library Center 1 Social Media and Advocacy.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
Are you a Digital Native?
Social Bookmarking with del.icio.us. What is del.icio.us? Social Software Store your bookmarks online Tag your bookmarks Share your bookmarks with others.
Picking The Right Networks and Tools for the Job.
Public Relations & Social Media
Current Information To help you find current news and information, many search engines and directories include a hyperlink to a "What's new" page. Many.
Optimizing today's websites using tomorrow's technologies.
Operational Security Awareness
Web 2.0: Making the Web Work for You, Illustrated Unit A: Research 2.0.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Broadcast Journalism Chapters 16 & 17. Freedom of Information The 1966 Freedom of Information Act (FOIA). Also called the “sunshine laws,” the FOIA grants.
Using Web 2.0 Applications as Information Awareness Tools Jay Bhatt and Dana Denick – Hagerty Library, Drexel University Smita Chandra – Indian Institute.
BACHELOR IN ENGLISH AS A FOREING LANGUAGE Course: Technology in Teaching English as a Foreign Language technological resources in education Name: Yesid.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
PATLIB2009: building on best practices 23 June 2016Karen Blakeman Photo taken by podoboqhttp://
PBL Project Based Learning. What is PBL? PBL is a model for classrooms that emphasizes long- term, interdisciplinary and student-centered activities.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
Resources and Strategies for Collaboration and Networking
Operations Security (OPSEC): A Force Multiplier
Web Browsers Sarah Bradley.
Presentation transcript:

Open Source Intelligence (OSINT) Introduction to OSINT This presentation is the sole property of OSPA. Distribution is limited to OSPA members registered in the OSPA OPSEC Academy http://www.opsecacademy.org

What is OSINT? OSINT: Open Source Intelligence; publicly available information. i.e., information that any member of the public could lawfully obtain by request or observation, as well as other unclassified information that has limited public distribution or access. OSINT represents a constant threat to any organization or mission, and can account for up to 80% of actionable intelligence, which is generally not protected and not classified. In most cases, it’s legal to obtain information in this way. This means that despite the high potential for harm, this critical information may be obtained at little or no risk to the intruder.

Definitions: Open Source Data (OSD): the raw print, broadcast or information in any other form from a primary source. This can include photographs, tape recordings, satellite imagery, personal letters, online postings, etc. Open Source Information (OSIF): Generic information generally intended for wide dissemination that combines multiple pieces of data using some level of validation. Examples include books, newspapers and news reports. Validated Open Source Intelligence (OSINT-V): Information to which a high degree of certainty can be attributed. This includes two categories: Information which comes from an established reliable source and/or can be validated by comparing to other data Information which can be established as valid in its native format. i.e., news reports showing a state leader’s speech. This, of course, must consider the possibility of manipulation or forgery.

OSINT Sources Media Internet Geographic Observation Academia Intelligence can be gathered from a broad range of publically available sources. Media Television, radio, newspaper, magazines Internet Search engines Google, Bing, Yahoo User-generated content Blogs, forums, social-networking, wikis RSS feeds Peer to Peer (P2P) Geographic Maps and environmental and navigational data Observation Camera, video recorder, reporting Academia Experts, research, conferences

OSINT Sources Government at all levels Intelligence can be gathered from a broad range of publically available sources. Government at all levels FOIA Building permits Patent offices Paid Services and Public Records Credit reports People searches Real Estate records Military records Association directories Business Records SEC filings Legal activities Press releases

What is the value of OSINT? OSINT has incredible value, both positive and negative to the originator or dedicated recipient of the information: Journalists and researchers use OSINT to generate a story or obtain greater information on a subject. The US Library of Congress collects vast amounts of this type of data. OSINT gives context to classified information. Generally, only select information meets the criteria for classification, with unclassified sources of information filling the gaps. OSINT gives adversarial forces a starting point and additional resources necessary to leverage further attacks or exploitation. OSINT reveals the intent of friendly or adversarial forces. OSINT reveals current status, capabilities or other contemporary information.

Who collects and uses OSINT? Military, friendly and enemy Business Law Enforcement Government Criminals Spies

Who collects and uses OSINT? “Intelligence units mine the benefits of public sources” -Government Computer News, March 17, 2006 “Man uses Facebook to help police catch criminal” -ABC News, March 20, 2010 “Could Twitter robbers get to you?” -NBC News, June 3, 2009

Who collects and uses OSINT? “Is your sensitive company info being leaked on LinkedIn?” -Washington Times, April 18, 2006 “CIA mines ‘rich’ content from blogs” -ComputerWorld, May 19, 2011 “Spy Agencies Turn to Newspapers, NPR and Wikipedia for Information” - US News, September 12, 2008

OSINT The Internet In the modern context, it’s tempting to think of OSINT as “the Internet”. While the advent of the internet has brought new opportunities to analysts and adversaries alike, OSINT has been a problem for the intelligence community for years before the advent of the modern Internet. Examples of resources that are of value to an adversary and predate the internet are: Job announcements Public records, like building permits Personal records, like credit reports News and periodicals, like press releases, radio, television, etc

iChanges The Internet, and related technologies have, however, added to the already immense quantity of critical information that may be obtained by the public. For example: Chatrooms, forums, file sharing Company information in whois, online filings, etc Webpages, blogs Online news

Why create such information? Generating information is the natural result of doing business. Much of the information that may be beneficial to an adversary is created for a legitimate purpose, such as business filings or press releases. The important thing to consider is how this information can provide clues to identify targets, activities, real-time operations and more. When it’s necessary to create and share information, only the information that’s necessary to be shared should be included, and even that must be evaluated for its potential impact. I’m online, therefore I am. -Descartes

See for yourself Consider how easy it is to find information about yourself. If you were an adversary, perhaps a business competitor, burglar, foreign military, or something else entirely, what could you learn from your physical and online presence? Personal: Search white pages http://www.whitepages.com Search social networks: http://www.wink.com Search for your email address in Google Type in your address into Google Maps, and zoom in to street view Search in your refuse bins- what are you throwing away? What are you saying in chat rooms or forums? Business: Check your press releases and job listings. Have you listed your network security equipment in job descriptions? Search refuse bins for sensitive memos, employee directories, etc What is revealed on your company webpage?