Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence

Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence

By Daniel Clemens | Dec 6, 2023 7:45:00 AM

[First printed in the December 2023 edition of Security Technology]

Leveraging AI and ML in OSINT: The Significance, Limitations, and Unique Advantages to Human Investigators

Leveraging AI and ML in OSINT: The Significance, Limitations, and Unique Advantages to Human Investigators

By Nico Dekens / Nov 29, 2023 7:53:00 AM

Artificial Intelligence (AI) and Machine Learning (ML) excel in processing vast amounts of data swiftly. During open-source intelligence (OSINT) investigations, you almost always gather information...

Unleashing the Power of Social Media Analysis Tools in Investigations

Unleashing the Power of Social Media Analysis Tools in Investigations

By Admin / Nov 6, 2023 7:45:00 AM

[Originally on Kaseware.com] In this fast-paced digital age, utilizing data from social media platforms has become essential for uncovering crucial information in investigations. Digital footprints...

ShadowDragon Becomes Platinum Sponsor of the OSINT Foundation

ShadowDragon Becomes Platinum Sponsor of the OSINT Foundation

By Admin / Oct 18, 2023 10:15:00 AM

[Original announcement from OSINT Foundation] The OSINT Foundation is pleased to announce that ShadowDragon has partnered with us as a Platinum Level Sponsor. The OSINT Foundation is the professional...

ShadowDragon Commentary: How to Scale Investigations Using Open-Source Intelligence

ShadowDragon Commentary: How to Scale Investigations Using Open-Source Intelligence

By Daniel Clemens / Oct 13, 2023 7:00:00 AM

Recently, ShadowDragon CEO, Daniel Clemens, contributed an article to Security Management Magazine for their October 2023 organized crime issue. In the piece, he offers firsthand insights into how...

ShadowDragon OSINT Podcast Recap: Season 2, Episode 4

ShadowDragon OSINT Podcast Recap: Season 2, Episode 4

By Daniel Clemens / Aug 29, 2023 10:08:48 AM

In the fourth episode of season 2 of the ShadowDragon podcast, CEO Daniel Clemens, CTO Elliott Anderson, and Director of Intelligence and Innovation Collection Nico Dekens (aka Dutch OSINT Guy) sat...

How OSINT Differs from Traditional Cyber Threat Intelligence?

How OSINT Differs from Traditional Cyber Threat Intelligence?

By Admin / Jul 25, 2023 8:30:00 AM

While there may be some minor overlap, there are major distinctions between traditional Cyber Threat Intelligence (CTI) and the more advanced Open Source Intelligence (OSINT). The efficiency,...

ShadowDragon Named 2023 Technology Pioneer by World Economic Forum

ShadowDragon Named 2023 Technology Pioneer by World Economic Forum

By Admin / Jun 23, 2023 12:42:26 PM

Pioneer of “OSINT for good” helps businesses, law enforcement and governments effectively investigate and analyze open source and publicly available information to solve challenging criminal cases

OSINT Investigator Training 101: Building a Foundation for Success

OSINT Investigator Training 101: Building a Foundation for Success

By Olivia Gransback / Jun 20, 2023 4:17:04 PM

Today’s investigators and analysts using online sources to investigate cases are often so focused on where to click, that they don’t even realize what their tools are doing in the background of their...

Reflections on RSA Conference 2023: OSINT and Beyond

Reflections on RSA Conference 2023: OSINT and Beyond

By Daniel Clemens / Jun 5, 2023 10:19:39 AM

Now a few weeks removed and recovered from the chaos of the RSA Conference, I wanted to share my thoughts on the 2023 event (the bad and the good). As we look ahead to the rest of the year, the event...

OSINT Methods To Investigate Suspected AI Generated Content

OSINT Methods To Investigate Suspected AI Generated Content

By Nico Dekens / May 19, 2023 7:45:00 AM

The proliferation of content generated by artificial intelligence (AI) is just beginning. Recent years haveseen online accounts, run by bots, create fake news articles, divisive social media posts,...

ShadowDragon OSINT Podcast Recap: Season 2, Episode 3

ShadowDragon OSINT Podcast Recap: Season 2, Episode 3

By Daniel Clemens / May 5, 2023 11:59:43 AM

In the third episode of season 2 of the ShadowDragon podcast, CEO Daniel Clemens and Director of Intelligence and Innovation Collection (aka Dutch OSINT Guy) Nico Dekens sat down for a one-on-one...

ShadowDragon Commentary: OSINT vs Classified Secrets

ShadowDragon Commentary: OSINT vs Classified Secrets

By Daniel Clemens / Apr 11, 2023 4:40:00 PM

In a recentopinion piece for The Cipher Brief, Gregory Sims, former CIA Clandestine Service for over thirty years, including multiple field tours as Chief and Deputy Chief of CIA stations, shared his...

The Impact of Bad Energy Policy on Cybercrime

The Impact of Bad Energy Policy on Cybercrime

By Daniel Clemens / Mar 29, 2023 8:30:00 AM

Daniel Clemens, Founder & CEO, ShadowDragon Is climate change the cause of higher energy prices? Likely not. That being said, there is common confusion surrounding energy policy and basic economics....

Sportradar Case Study: Deep Background Checks, Organizational Integrity, and Fraud Investigations

Sportradar Case Study: Deep Background Checks, Organizational Integrity, and Fraud Investigations

By Admin / Mar 20, 2023 7:30:00 AM

Investigating integrity and criminality in commerce is a daunting task that requires access to vast amounts of information and complex organizational analysis. The scale rises considerably when...

OSINT Observations from ShadowDragon Experts: Moldova

OSINT Observations from ShadowDragon Experts: Moldova

By Nico Dekens / Mar 15, 2023 6:25:33 PM

Nico Dekens, Director of Intelligence and Innovation Collection, ShadowDragon

ShadowDragon OSINT Experts Share Tips for Keeping Children Safe Online

ShadowDragon OSINT Experts Share Tips for Keeping Children Safe Online

By Elliott Anderson / Mar 6, 2023 2:42:47 PM

ShadowDragon OSINT Podcast Recap: Season 2, Episode 2

ShadowDragon OSINT Podcast Recap: Season 2, Episode 2

By Daniel Clemens / Mar 3, 2023 12:30:00 PM

In the second episode of season 2 of the ShadowDragon podcast, CEO Daniel Clemens, CTO Elliott Anderson, and Director of Intelligence and Innovation Collection (aka Dutch OSINT Guy) Nico Dekens sat...

ShadowDragon’s Partner Ecosystem Enhancements Increase Access to OSINT for Modern Investigations

ShadowDragon’s Partner Ecosystem Enhancements Increase Access to OSINT for Modern Investigations

By Admin / Feb 9, 2023 9:00:00 AM

Global Ecosystem Includes The Largest Set Of Open Source Intelligence Partnerships In The Industry

Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger

Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger

By Daniel Clemens / Jan 11, 2023 2:38:21 PM

After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which is ongoing)...

ShadowDragon CEO and Founder Daniel Clemens Joins OSMOSIS Board of Directors

ShadowDragon CEO and Founder Daniel Clemens Joins OSMOSIS Board of Directors

By Admin / Jan 4, 2023 8:59:04 AM

Jan. 4, 2023 - ShadowDragon™, a provider of open source intelligence (OSINT), unique datasets and APIs that reduce the friction of sourcing, collecting, and sorting publicly available information in...

ShadowDragon OSINT Podcast Recap: Season 2, Episode 1

ShadowDragon OSINT Podcast Recap: Season 2, Episode 1

By Daniel Clemens / Dec 22, 2022 11:15:00 AM

Season 2 of the ShadowDragon podcast is here! In the first episode, CEO Daniel Clemens and CTO Elliott Anderson were joined by the Dutch OSINT guy, Nico Dekens.

Siren Forms Strategic Partnership with ShadowDragon

Siren Forms Strategic Partnership with ShadowDragon

By Admin / Oct 27, 2022 4:00:00 AM

Market Leading Technologies Combine to Provide Powerful Investigative Solution

ShadowDragon Combines Capabilities with Chorus Intelligence

ShadowDragon Combines Capabilities with Chorus Intelligence

By Admin / Sep 15, 2022 10:00:00 AM

September 15, 2022 – Virginia Beach, VA – Chorus Intelligence (“Chorus”) has powered up their digital intelligence platform by embedding SocialNet from ShadowDragon within it. This combined...

ShadowDragon Expands Partnership Programs to Meet Global Demand for OSINT Collection

ShadowDragon Expands Partnership Programs to Meet Global Demand for OSINT Collection

By Admin / Sep 7, 2022 7:00:00 AM

Hoover, AL – As the sophistication of organized cyber threats increases, so does the need for cooperation to catch the perpetrators of these malicious acts. ShadowDragon™, a leading provider of cyber...

ShadowDragon Celebrates Fourth Year of Partnership with Kaseware

ShadowDragon Celebrates Fourth Year of Partnership with Kaseware

By Admin / Jul 8, 2022 8:20:06 AM

ShadowDragon and Kaseware are celebrating four years of partnership, a collaboration which has resulted in operational growth and advanced solutions for investigative case management and data...

Sverica Capital Management Announces Investment in ShadowDragon

Sverica Capital Management Announces Investment in ShadowDragon

By Admin / Dec 9, 2021 8:15:13 AM

San Francisco, California – December 6, 2021 – Sverica Capital Management LP (“Sverica”), a private equity investment firm, announced today that it has made a strategic investment in ShadowDragon...

SocialNet is now available on-demand through King & Union Avalon

SocialNet is now available on-demand through King & Union Avalon

By Admin / Mar 15, 2021 10:57:35 AM

ALEXANDRIA, VA, UNITED STATES, March 15, 2021 / -- Data and investigative platform companies King & Union and ShadowDragon today announced an integration agreement that gives cybersecurity analysts...

You want to build a Platform? ..What Platform Should I use?

You want to build a Platform? ..What Platform Should I use?

By Daniel Clemens / Aug 9, 2020 12:00:00 AM

The echo’s of investors had started the buzz of the need for new investigative / intelligence platforms a great deal more than there had been in the past few years. The buzz will only gain more...

PR: Italy’s Soft Strategy & ShadowDragon Partner providing Investigative training & advanced investigative capabilities.

PR: Italy’s Soft Strategy & ShadowDragon Partner providing Investigative training & advanced investigative capabilities.

By Daniel Clemens / Jun 22, 2020 12:00:00 AM

SoftStrategy and ShadowDragon Partnership Rome, Italy JUNE 22, 2020 – SoftStrategy and ShadowDragon partner together to provide advanced investigative training. As the world has become more...

Into the Dark Webs

Into the Dark Webs

By Brooks M / May 27, 2020 12:00:00 AM

## What is the DarkWeb The dark web sounds scary, but in reality, it is anything you cannot get to via Google, or that uses a masked IP address. The classification of the dark web is a subcategory...

Where does operational security begin?

Where does operational security begin?

By Elliott Anderson / May 20, 2020 12:00:00 AM

Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password habits....

Rate Limits in Data Visualization

Rate Limits in Data Visualization

By Josh C / May 13, 2020 12:00:00 AM

One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes than you are allowed to...

Becoming Dark Web Rambo

Becoming Dark Web Rambo

By Elliott Anderson / May 6, 2020 12:00:00 AM

There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space.I’ve met a huge swath of capable engineers and developers who can explain the technical...

Cutting your teeth on ShadowDragon’s advanced CTF

Cutting your teeth on ShadowDragon’s advanced CTF

By Elliott Anderson / Apr 29, 2020 12:00:00 AM

We’ve talked in recent weeks about the importance of training and the methodology behind it. Much of the OSINT work we do is focused on the social aspects and footprint of a target online. As most...

Hacking in the Middle East

Hacking in the Middle East

By Josh C / Apr 24, 2020 12:00:00 AM

In the past, we have looked into a hacker who comes from Iran by the name of Mrb3hz4d. Now if we take some of the information we saw from his defacement, we can create an extremely simple OIMonitor...

Additional Insights into Iranian Cyber Espionage | APT33

Additional Insights into Iranian Cyber Espionage | APT33

By Daniel Clemens / Apr 24, 2020 12:00:00 AM

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment...

Data vs. Intelligence

Data vs. Intelligence

By Josh C / Apr 22, 2020 12:00:00 AM

It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you can about the person. The difference between an...

Fishing with a Subaru

Fishing with a Subaru

By Elliott Anderson / Apr 15, 2020 12:00:00 AM

There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of...

Demystifying the Dark Web: Part 3

Demystifying the Dark Web: Part 3

By Josh C / Apr 1, 2020 12:00:00 AM

After looking at the structure of both the dark web and normal web, we can now start to see why so many people want the benefits Tor gives, especially the anonymity. With anonymity comes people who...

Filtering Out Noise

Filtering Out Noise

By Brooks M / Mar 25, 2020 12:00:00 AM

When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may even think, “Wow, this is awesome! I am awesome! My...

Background Checks & Due Diligence

Background Checks & Due Diligence

By Elliott Anderson / Mar 11, 2020 12:00:00 AM

Many years ago, when I was in college, I had a job at a large retailer. It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, etc. After working the...

Heat Maps: Form Over Function

Heat Maps: Form Over Function

By Josh C / Mar 6, 2020 12:00:00 AM

Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map: It is great....

Demystifying the Dark Web: Part 2

Demystifying the Dark Web: Part 2

By Josh C / Mar 4, 2020 12:00:00 AM

This is Part 2 of our 3-part series on demystifying the dark web. In Part 1, we looked at how the regular internet works at a networking layer. Today, we will be looking at how the dark web works at...

Password Maths

Password Maths

By Brooks M / Feb 26, 2020 12:00:00 AM

As a follow up to our last blog about password reuse and the recent data breach of Disney, I would like to talk about how to create strong passwords and why they are “strong.” Typically, we like to...

Unmasking a carder with OSINT

Unmasking a carder with OSINT

By Elliott Anderson / Feb 19, 2020 12:00:00 AM

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.I spent about an hour on the basics of the investigation. The...

Demystifying the Dark Web: Part 1

Demystifying the Dark Web: Part 1

By Josh C / Feb 12, 2020 12:00:00 AM

This post is part of a 3-part series that explains the difference between normal internet and the dark web, and how some actors use the dark web. Today we are going to try and clear up some of the...

Tracking an Outbreak

Tracking an Outbreak

By Brooks M / Jan 29, 2020 12:00:00 AM

I recently setup a project in OIMonitor to track the mentions of infectious diseases mentioned in the news. I immediately got results, though not all of it was good. One thing that did pop up...

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

By Admin / Jan 21, 2020 10:20:04 AM

Risk management strategies that work are hard to find in such a noisy infosec buzzword filled industry. Our guest Matt Devost, offers perspective on subjects which will be helpful for beginners,...

ShadowDragon Podcast #08 - Blake Butler Interview | Active Shooters, Actor Engagement, and Hack Back

ShadowDragon Podcast #08 - Blake Butler Interview | Active Shooters, Actor Engagement, and Hack Back

By Admin / Jan 21, 2020 10:20:04 AM

Actor engagement and physical security intersect when active shooter situations or heightened security threats are targeted against executives or physical locations. Naturally, the topic of...

ShadowDragon Podcast #05 - Westward.AI,Incident Response, Long Time Investigations Need Story Telling & Innovation in Event Query Languages.

ShadowDragon Podcast #05 - Westward.AI,Incident Response, Long Time Investigations Need Story Telling & Innovation in Event Query Languages.

By Admin / Jan 21, 2020 10:20:04 AM

Incident Response and extended investigations need storytelling functionality. Westward.ai’s innovation in event query languages is discussed laced with candor, history, and strange hacker lore. The...

ShadowDragon Podcast #06 - COVID19 Conversation and Observations

ShadowDragon Podcast #06 - COVID19 Conversation and Observations

By Admin / Jan 21, 2020 10:20:04 AM

We have been monitoring COVID19 and observed that we need to dig in deeper with experts in the field. In this episode we explore that dialogue. In our podcast, we aren’t always the experts in...

Exploring OSINT, War Stories & OSINT with (Nico Dekens) Dutch_OSINTguy

Exploring OSINT, War Stories & OSINT with (Nico Dekens) Dutch_OSINTguy

By Admin / Jan 21, 2020 10:20:04 AM

Nico, (dutch_osintguy) shares his origin story along with war stories old, and new. Topics the following: Leadership seems to want visualization, analyst don’t care. Discussions evolve about how...

Iran and OSINT Hunting for Fun & Profit.

Iran and OSINT Hunting for Fun & Profit.

By Elliott Anderson / Jan 15, 2020 12:00:00 AM

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic searching and the techniques involved. Iran...

What Will OSINT/PAI and Collection at Scale Look like for 2020?

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / Jan 11, 2020 12:00:00 AM

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on the...

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

By Daniel Clemens / Jan 6, 2020 12:00:00 AM

On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as a supposed...

What’s in an email address?

What’s in an email address?

By Elliott Anderson / Dec 17, 2019 12:00:00 AM

A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same passwords for multiple emails. In a very...

The Problem with Technology Keywords

The Problem with Technology Keywords

By Josh C / Dec 4, 2019 12:00:00 AM

Big data, AI, machine learning, block chain, and every other cool new tech words are all really just that–words. To a developer or computer scientist, they are a type of tool to solve specific...

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

By Daniel Clemens / Dec 1, 2019 12:00:00 AM

Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging in...

Into the Breach

Into the Breach

By Elliott Anderson / Oct 16, 2019 12:00:00 AM

We’ve all heard the advice a million times, “Don’t use the same password on different websites.” Unfortunately, (or fortunately, depending on our motivations) many users make this exact mistake. In...

Scaffolding: The Basis of Everything

Scaffolding: The Basis of Everything

By Josh C / Oct 9, 2019 12:00:00 AM

The first lesson I was ever taught in programming is the need for scaffolding. Just like painting a house, even if you are certain you can reach every nook and cranny and cover every wall,...

The Vital Few and the Useful Many

The Vital Few and the Useful Many

By Brooks M / Oct 1, 2019 12:00:00 AM

In 1896, at the University of Lausanne in Switzerland, a young economist by the name of Vilfredo Pareto published a paper showing how 80% of the land in Italy was owned by 20% of the population....

Job Post: Training and Curriculum Specialist

Job Post: Training and Curriculum Specialist

By Daniel Clemens / Sep 3, 2019 12:00:00 AM

ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities,...

Bad moods = Bad decisions

Bad moods = Bad decisions

By Elliott Anderson / Aug 25, 2019 12:00:00 AM

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak. “I’ve hit a dead-end, I can’t figure anything...

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

By Daniel Clemens / Aug 10, 2019 12:00:00 AM

In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to drive home is there won’t ever...

Illuminating Context with Timeline Analysis

Illuminating Context with Timeline Analysis

By Daniel Clemens / Jul 29, 2019 12:00:00 AM

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions will...

It’s Hard Out There for a Pimp

It’s Hard Out There for a Pimp

By Brooks M / Jun 24, 2019 12:00:00 AM

Human trafficking, according to Wikipedia, is the trade of humans for forced labour. With the advent of the internet and high-speed communication, traffickers have found a new way to advertise their...

Forget About Deep and Dark Web Hype

Forget About Deep and Dark Web Hype

By Elliott Anderson / Jun 12, 2019 12:00:00 AM

Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very high scale and have been doing...

Social Networks: Friends of Friends

Social Networks: Friends of Friends

By Josh C / May 31, 2019 12:00:00 AM

Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that are the most connected. For this example, we...

DataWalk And ShadowDragon Team To Enhance Investigative Capabilities

DataWalk And ShadowDragon Team To Enhance Investigative Capabilities

By Daniel Clemens / May 16, 2019 12:00:00 AM

Redwood City, California – May 16, 2019 DataWalk and ShadowDragon have formed a strategic technical alliance to facilitate more complete and detailed investigations incorporating open source...

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

By Daniel Clemens / Apr 3, 2019 12:00:00 AM

Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each bread crumb, you...

Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media

Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media

By Daniel Clemens / Mar 29, 2019 12:00:00 AM

Catching the backscatter of conversation, keywords and data dumps have always been one of the driving goals in our OIMonitor project. While others have been quick to highlight one particular...

ShadowDragon Launches ConvertIt Tool

ShadowDragon Launches ConvertIt Tool

By Daniel Clemens / Dec 17, 2018 12:00:00 AM

Shadow Dragon has created an automated document conversion tool that expands analysts’ capabilities, speeds analysis and investigations, and making the electronic transmission of files between...

Hype and the Deep Dark Web

Hype and the Deep Dark Web

By Daniel Clemens / Sep 25, 2018 12:00:00 AM

I had previously written about how we started with our our monitoring platform and how that grew into the beast it is today. I didn’t leave much room to frame things in the most hip-infosec way,...

DEF CON 26 Intel CTF Results! Congratulations to the DEF CON iCTF Winners

DEF CON 26 Intel CTF Results! Congratulations to the DEF CON iCTF Winners

By Daniel Clemens / Sep 11, 2018 12:00:00 AM

DEF CON 26, Intel CTF (iCTF) had more participants than any other capture the flag challenge. With over 100 teams showing up, a select few escalated to the top of the heap showing off their skills,...

Paying It Forward at Crimes Against Children Conference (CACC)

Paying It Forward at Crimes Against Children Conference (CACC)

By Daniel Clemens / Sep 6, 2018 12:00:00 AM

This was my second year attending the Crimes Against Children Conference (CACC) in Dallas. CACC draws a crowd proficient in the art of finding the bad guys and protecting the defenseless, and I...

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

By Daniel Clemens / Aug 31, 2018 12:00:00 AM

If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate — why do we struggle with an increase in more complex crime, a rise in international...

The Real Jack Ryan is Bringing His Supranormal Skills to the Fight Against Human Trafficking

The Real Jack Ryan is Bringing His Supranormal Skills to the Fight Against Human Trafficking

By Daniel Clemens / Aug 30, 2018 12:00:00 AM

Millions love the character Jack Ryan from Tom Clancy’s bestselling 18-book series (and a new TV show on Amazon!), but not as many folks know that there is a real, live Jack Ryan living in America...

Kaseware Integrates ShadowDragon’s SocialNet Forensics Tool into Case Management Investigative Platform

Kaseware Integrates ShadowDragon’s SocialNet Forensics Tool into Case Management Investigative Platform

By Daniel Clemens / Aug 8, 2018 12:00:00 AM

Cheyenne, Wyoming and Denver, Colorado With more than 3.1 billion people across the globe actively using Social Media, it is no surprise that criminals utilize it and can be tracked down on it by...

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

By Daniel Clemens / Aug 3, 2018 12:00:00 AM

In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved in the...

Intelligence Capture the Flag (iCTF) Contest at Def Con

Intelligence Capture the Flag (iCTF) Contest at Def Con 

By Daniel Clemens / Jul 27, 2018 12:00:00 AM

ShadowDragon is proud to be a co-sponsor of the Mission III Advanced iCTF Contest at Defcon 2018. iCTF has crafted a compelling and challenging scenario! Participating is a great way to hone your...

ALTEN Calsoft Labs Joins ShadowDragon and Cloudly to Build Cybersecurity Practices

ALTEN Calsoft Labs Joins ShadowDragon and Cloudly to Build Cybersecurity Practices

By Daniel Clemens / Jul 6, 2018 12:00:00 AM

BANGALORE, India ALTEN Calsoft Labs, a next-generation digital transformation company, rolls out a plan to Prevent Cyber Attacks and Minimize Damage by leveraging ShadowDragon’s cyber intelligence...

Understanding Link Analysis and Using it in Investigations

Understanding Link Analysis and Using it in Investigations

By Daniel Clemens / Jun 21, 2018 12:00:00 AM

I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet. A longtime friend, Roelof from Paterva, shared his vision for a...

Patchwork APT Group - Additional IOCs & Network Indicators

Patchwork APT Group - Additional IOCs & Network Indicators

By Daniel Clemens / Jun 8, 2018 12:00:00 AM

Yesterday, Matthew Meltzer, Sean Koessel, and Steven Adair @ Volexity released an excellent write-up on the Indian APT group known as Dropping Elephant. The Volexity article detailed attacks against...

ShadowDragon Significantly Enhances its Visibility and Forensic Capture Capabilities for Open and Closed Source Threat Intelligence

ShadowDragon Significantly Enhances its Visibility and Forensic Capture Capabilities for Open and Closed Source Threat Intelligence

By Daniel Clemens / May 15, 2018 12:00:00 AM

ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has enhanced its OIMonitor product to include secure and customizable monitoring of forums, open, closed source, TOR and...

Alabama Cyber Now: Disrupting Human Trafficking Using Digital Forensics & Social Media Forensics

By Daniel Clemens / May 7, 2018 12:00:00 AM

When most security pros think of threat intelligence, they think of cyber crime – tracking down hackers and cyber criminals aiming to compromise networks to exploit credit card information,...

Cybersecurity is Everyone’s Business: Learn How to Combat it at Alabama Cyber Now

Cybersecurity is Everyone’s Business: Learn How to Combat it at Alabama Cyber Now

By Daniel Clemens / Apr 11, 2018 12:00:00 AM

Attack methods targeting businesses nearly doubled from 82,000 in 2016 to at least 159,700 in 2017 (the majority of cyberattacks are never reported), according to the Online Trust Alliance. 2017 was...

ShadowDragon Announces that SocialNet is Now Available Through Phantom Platform

ShadowDragon Announces that SocialNet is Now Available Through Phantom Platform

By Daniel Clemens / Mar 14, 2018 12:00:00 AM

United States – ShadowDragon, a U.S.-based cyber threat intelligence solutions company, today announced that its SocialNet App is the first Social Media Forensics & OSINT mapping app available on...

Buckle up for Step-by-Step Insight into Charming Kitten Cyberespionage Attacks

Buckle up for Step-by-Step Insight into Charming Kitten Cyberespionage Attacks

By Daniel Clemens / Jan 26, 2018 12:00:00 AM

The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why the Clear Sky report...

Insights Success Magazine names ShadowDragon one of the “The 10 Best Performing #CyberSecurity Solution Providers.”

Insights Success Magazine names ShadowDragon one of the “The 10 Best Performing #CyberSecurity Solution Providers.”

By Daniel Clemens / Jan 12, 2018 12:00:00 AM

ShadowDragon: Solving the Challenges of Modern Investigations Today, the internet is ubiquitous. It has revolutionized businesses and communications. It also has revolutionized crime....

ShadowDragon Gains New Distribution Partner to Support Businesses in the Fight Against Cybercrime

ShadowDragon Gains New Distribution Partner to Support Businesses in the Fight Against Cybercrime

By Daniel Clemens / Dec 1, 2017 12:00:00 AM

Cheyenne, Wyoming – ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has entered into a distribution agreement with GuidePoint Security LLC, a Virginia-based technology...

Before Threat Intelligence: How We Forged Tailored Monitoring and Alerting... Anonymous Investigations Inspired Innovation

Before Threat Intelligence: How We Forged Tailored Monitoring and Alerting... Anonymous Investigations Inspired Innovation

By Daniel Clemens / Sep 26, 2017 12:00:00 AM

It was the end of 2010. The Packet Ninjas’ team (the predecessor of ShadowDragon) had been making mad dashes on application assessments and penetration tests while deployed to a nowhere...

ShadowDragon named to CIOReview’s 20 Most Promising Enterprise Security Solution Providers 2017

ShadowDragon named to CIOReview’s 20 Most Promising Enterprise Security Solution Providers 2017

By Daniel Clemens / Sep 5, 2017 12:00:00 AM

Cheyenne, Wyoming – ShadowDragon makes it to the list of 20 Most Promising Enterprise Security Solution Providers 2017 by CIOReview. CIOReview is a technology magazine with a mission to guide...

ShadowDragon MalNet - ProofPoint Maltego Transforms | Vietnamese Victims 1937CN

ShadowDragon MalNet - ProofPoint Maltego Transforms | Vietnamese Victims 1937CN

By Daniel Clemens / Aug 28, 2017 12:00:00 AM

Votiro Labs and ClearSky CyberSecurity both based out of Israel, through use of MalNet have uncovered a slew of interesting TTPs and infrastructure believed to be used by the 1937CN group. Votiro &...

iHTAC Offers LE Resources to Help Children Victimized by Human Trafficking

By Daniel Clemens / Aug 5, 2017 12:00:00 AM

Accelerating Law Enforcement Capabilities DeliverFund’s iHTAC is a unique collaboration with corporate partners who bring innovative technology tools used to accelerate law enforcement capabilities...

Tales from the Trenches: Assumptions & Out-of-Country Investigations

Tales from the Trenches: Assumptions & Out-of-Country Investigations

By Daniel Clemens / Feb 22, 2017 12:00:00 AM

In one case, I found myself in a country in Latin America investigating a complicated persistent business compromise being implemented through both electronic and human means. I had already been...

ShadowDragon and DeliverFund Partner to Catch Human Traffickers

ShadowDragon and DeliverFund Partner to Catch Human Traffickers

By Daniel Clemens / Dec 16, 2016 12:00:00 AM

Cheyenne, Wyoming – December 15, 2016 ShadowDragon, a company that develops specialized digital investigations technology, and DeliverFund, a nonprofit dedicated to disrupting sex trafficking...

Artifacts, Speculation and Compromised Secrets at the Democratic National Committee and more...

Artifacts, Speculation and Compromised Secrets at the Democratic National Committee and more...

By Daniel Clemens / Jun 16, 2016 12:00:00 AM

The buzz of cyber compromise has been booming since the AP released some interesting points on the Hillary Clinton email compromise. This was followed up by Brian Krebs on May 16th, 2016 noting less...

The Cyber Crime Chronicles: The Cyber Criminal

The Cyber Crime Chronicles: The Cyber Criminal

By Daniel Clemens / Jun 2, 2016 12:00:00 AM

Perhaps the most nefarious, these attackers are driven almost exclusively by financial gain. These criminals typically target personal and corporate systems, and range in skill from Nigerian 419...

MalNet Maltego Transforms with ProofPoint Data

MalNet Maltego Transforms with ProofPoint Data

By Daniel Clemens / May 10, 2016 12:00:00 AM

MalNet accesses the Proofpoint ET Intelligence™ comprehensive database that contains current and historical malicious IP addresses and domains. In this blog post we share screenshots of Maltego 4...

ShadowDragon Screenshots with Maltego M4 Release

ShadowDragon Screenshots with Maltego M4 Release

By Daniel Clemens / May 3, 2016 12:00:00 AM

Below are a few screenshots of our flagship product SocialNet, integrated with the new Maltego M4 release. If you haven’t seen the video from Maltego, please go check it out now. Email Correlations

OSINT Process, SocialNet and Breaking Bad Case Files

OSINT Process, SocialNet and Breaking Bad Case Files

By Daniel Clemens / May 2, 2016 12:00:00 AM

Our first artifact, begins with the email address rumored to be used by Jesse Pinkman, pivoting on one to one correlations between his favorite social media provider and others, we find his wish...

Tracking GozNym Campaigns with MalNet

Tracking GozNym Campaigns with MalNet

By Daniel Clemens / Apr 22, 2016 12:00:00 AM

In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently,...

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

By Daniel Clemens / Apr 15, 2016 12:00:00 AM

MalNet brings together the industry’s most up to date and extensive threat information from Proofpoint with Maltego link analysis capabilities from ShadowDragon. MalNet enables threat analysts and...

ShadowDragon Announces Partnership with Proofpoint

ShadowDragon Announces Partnership with Proofpoint

By Daniel Clemens / Mar 8, 2016 12:00:00 AM

Cheyenne, Wyoming – March 8, 2016 ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has entered into a partnership with Proofpoint, a leading next-generation cybersecurity...

Packet Ninjas Formally Announces the Formation of ShadowDragon

Packet Ninjas Formally Announces the Formation of ShadowDragon

By Daniel Clemens / Feb 16, 2016 12:00:00 AM

Cheyenne, Wyoming – February 16, 2016 Packet Ninjas, a niche cyber security consulting and services company, today announced the formation of a sister company named ShadowDragon. ShadowDragon will...

The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker

The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker

By Daniel Clemens / Nov 28, 2015 12:00:00 AM

Just a couple of weeks ago the world was rocked by the news that CIA Director John Brennan’s AOL email account (apparently that’s still a thing) had been hacked. Immediately, speculation began. Had...

The Cybercrime Chronicles: Understanding The Actors

The Cybercrime Chronicles: Understanding The Actors

By Daniel Clemens / Nov 27, 2015 12:00:00 AM

Cyber Threat Types and Motivations There are several types of cyberwars going on at any given time. There are plain old hacking attacks, criminally-targeted attacks, nation state cyberwar, and...

Why OSINT?

Why OSINT?

By Daniel Clemens / Nov 26, 2015 12:00:00 AM

Ordinary Info to You; Opportunity to a Cyber Criminal As its name suggests, OSINT is intelligence gleaned from publicly available sources such as social media, company websites, news sites, even...

Scroll to Top