Open Source Intelligence (OSINT) OSINT and TRASHINT This presentation is the sole property of OSPA. Distribution is limited to OSPA members registered.

Slides:



Advertisements
Similar presentations
Acquire foundational knowledge of marketing-information management to understand its nature and scope Marketing Indicator 1.05.
Advertisements

Chapter 12 The Revenue Cycle: Sales to Cash Collections Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 12-1.
Open Source Intelligence (OSINT)
Customer Relation Management System Multi Environment Solutions.
Practice Explorer Hearing Health Care Practice Management Program Contact Us (888)
The Revenue Cycle: Sales to Cash Collections
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Improving Your Business Processes Process Improvement = Profit and Growth Management Software Solutions We help businesses manage for success Cleveland.
Chapter 12 The Revenue Cycle: Sales to Cash Collections Copyright © 2012 Pearson Education 12-1.
Purchasing & SCM.
Lecture 6 Functional Business Systems. Objectives Functional Business Systems: –Marketing Systems –Manufacturing Systems –Human Resource Systems –Accounting.
Managing Records in SharePoint Step 1: Develop Retention Rules that Work.
Functional areas Retail Business.
Introduction to SAP R/3.
SAP R/3 Materials Management Module
Institute Management System Multi Environment Solutions.
TRANSACTION PROCESSING SYSTEM (TPS)
Consumer Credit Chapter 11.
Auditing Purchases, Trade Payables and Payroll
SMALL BUSINESS RESOURCE GUIDE CHECKLIST FOR GOING INTO BUSINESS.
Being a Business Owner Section 4.2.
STOCK CONTROL SOFTWARE. INTRODUCTION Stock Control Software is an integrated accounting system which takes care of all business needs. It incorporates.
Following the terrorist attack on September 11, 2001 the President declared a national emergency … Secretary of Defense Donald Rumsfeld cautioned on the.
Financial Management Financial Planning
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
AXLR8.com Ltd Theatre Management Systems Steve Tiller.
1 Designing Substantive Procedures The auditor “must plan and perform the audit to reduce the audit risk to an acceptably low level that is consistent.
Operational Security PCC. VII-F.1.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Fees, Hourly Rates and Invoices. What is an Hourly Rate? The rate of pay per hour for a job being performed. An ‘ hourly ’ worker may be assigned to various.
OH 9-1 Protecting Revenue 10 OH 9-1. OH 9-2 Learning Objectives After completing this chapter, you should be able to: Identify and explain the three parts.
Section 28.1 Marketing Information Systems
WEEK 1 INTRODUCTION Interpret Financial Information.
Marketing Goods and Services
Major Information Flows in the Production Process
Provided by OSPA ( Vulnerabilities and Indicators The OPSEC Process, step 3 Presented by: (Presenter’s Name)
Marketing Math Chapter 16. Functions of a cash register Record sales Record sales Store cash and sales documents Store cash and sales documents Provide.
Section 1 Company Description Description of Business  Where located  Previous owner/business information  Product suppliers.
You. are at risk for the fastest growing crimes crime.
KETARI MERAH. Our Members KETARI MERAH VISION Produce visionary entrepreneurs to contribute to national development. Maximize profitability without compromising.
BUSINESS DOCUMENTS OBJECTIVES What is a business document
Operational Security Awareness
© 2011 CenturyLink, Inc. All Rights Reserved. Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance.
Issue documents by local purchasing dept. security check Document control & issuing slip Unpacking, counting and put in suitable palletes Local Purchasing.
Checking Inventory. Fax IBM PC Mac II PC & Mac Mainframe (UVX 2000) Manual labor Mainframe, Pencil.
CHAPTER 12 FINANCIAL MANAGEMENT Financial Planning FINANCIAL PLANNING Ongoing Operations Revenue – all income that a business receives over a period.
Provided by OSPA ( Operations Security (OPSEC)
Computer Studies Today Chapter 2 1 » Payroll system » Mailing list system » Ticketing system » Point-of-sale system » Electronic funds transfer system.
Report on Financial Activity BSBFIA402A. Reasons for Keeping Financial Records Management and Control of the business to ensure long term solvency and.
Unit 6 – Chapter 5.  Describe the Sarbanes-Oxley Act of 2002 and its impact on internal controls and financial reporting.
CHAPTER 11 COMPUTERISED ACCOUNTING SYSTEMS. OBJECTIVE TEST 1.What assets make up the cash and cash equivalents line item on the SFP? 2.What statement.
Introducing Rockton Connect Accounting inside Microsoft Dynamics CRM The powerful, flexible, easy-to-use, secure, customizable,
 TATA CONSULTANCY SERVICES MM - INVOICE VERIFICATION.
Reducing the Risk of Litigation. Coach Warn athletes of potential dangers involved in sport Supervise regularly and attentively Prepare and condition.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Presented by PERUMALSAMY M ,RAJESH R ERP Sales & Distribution Module.
Financial Statements for Business Planning
Operations Management
Operations Security (OPSEC) For New Hires
Intercompany Project Time and Expenses Scenario Overview
The Revenue Cycle: Sales to Cash Collections
Electronic Records The Systems Concept
ELEMENTARY BUSINESS PROCESS MODELING :
Command Indoctrination Operations Security DD MMM YY
ERM Systems.
12-2 Financial Records and Financial Statements
Overall Classification of this Briefing is UNCLASSIFIED
TRANSACTION CYCLES Third Lecture
What affects our business from the outside?
Command Indoctrination Operations Security DD MMM YY
Presentation transcript:

Open Source Intelligence (OSINT) OSINT and TRASHINT This presentation is the sole property of OSPA. Distribution is limited to OSPA members registered in the OSPA OPSEC Academy

TRASHINT: “Trash Intelligence”; Intelligence that is collected from refuse containers, to include recycling, dumpsters and other refuse bins. Often referred to as “Dumpster Diving”, but can include any form of refuse collection.

While local laws may vary, TRASHINT is an easy and often legal way to obtain critical information about a target, which may include private parties, businesses, military or government entities. Recycling, in particular, may be outsourced, even to other countries. There are multiple opportunities for sensitive information to be intercepted after being discarded: In containersIn transitAt destination (trash dump, recycling facility)

A specific document or item, in itself, may not be significant, but when joined with other pieces of information, it could be extremely damaging. For example, finding a single invoice in the trash wouldn’t necessarily reveal a complete customer list to a business competitor, but several weeks, months or years worth may. Similarly, a single cafeteria inventory may not reveal anything of value, but by establishing a pattern of lunch orders, an adversary may be able to identify a major activity by noting a spike in orders.

Potential harm to private individuals includes, but is certainly not limited to: Phone bills Credit card receipts and other financial records Personal correspondence Vacation plans (printed receipts, ticket confirmations, etc) Family records and other information Employment information Receipts from recent major purchases Digital media (CD’s, etc) School records Information that could reveal regular schedules, such as church fliers, sporting event schedules, etc Risks to private individuals

Potential harm to businesses includes, but is certainly not limited to: Customer invoices, packing lists and order confirmations allowing a customer and price list to be determined Purchase orders, revealing suppliers and prices paid Employee and payroll records, potentially exposing sensitive personal information Memos and printed s Internal employee directories Marketing and development plans Sales, accounts receivable and accounts payable reports Internal white papers and reports Risks to businesses

Potential harm to military and government includes, but is certainly not limited to: Deployment rosters and schedules Maintenance records, showing current deficiencies and increased schedules Pre-deployment or exercise deliveries and deliverables Unit strength information Internal memos and training schedules Employee and/or Soldier/Sailor/Airman personal information Documents showing intent or capabilities Risks to Military and Government

Conduct periodic inspections of outgoing trash and recycle containers Provide awareness training for personnel, highlighting the TRASHINT threat Provide periodic reminders, including posters, labels, etc Provide high-quality shredders that destroy the documents to such a level as commensurate with the sensitivity of the data. If necessary, consider the use of a document destruction service, which often utilize mobile, high-volume shredders Securely store sensitive information pending destruction Countermeasures