ShadowDragon Podcast #08 - Blake Butler Interview

ShadowDragon Podcast #08 - Blake Butler Interview

By Admin | Jan 21, 2020 10:20:04 AM

Actor engagement and physical security intersect when active shooter situations or heightened security threats are targeted against executives or physical locations. Naturally, the topic of...

Exploring OSINT, War Stories & OSINT with (Nico Dekens) Dutch_OSINTguy

Exploring OSINT, War Stories & OSINT with (Nico Dekens) Dutch_OSINTguy

By Admin / Jan 21, 2020 10:20:04 AM

Nico, (dutch_osintguy) is our Director of Intelligence and Collection Innovation and has a background as an (all source) Intelligence Analyst in the Dutch Law Enforcement. He analyzed murder cases,...

What Will OSINT/PAI and Collection at Scale Look like for 2020?

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / Jan 11, 2020 12:00:00 AM

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on the...

Iran Hype - Past and Present Recollections

Iran Hype - Past and Present Recollections

By Daniel Clemens / Jan 6, 2020 12:00:00 AM

On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as a supposed...

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

By Daniel Clemens / Aug 10, 2019 12:00:00 AM

In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to drive home is there won’t ever...

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

By Daniel Clemens / Apr 3, 2019 12:00:00 AM

Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each bread crumb, you...

DEF CON 26 Intel CTF Results! Congratulations to the DEF CON Winners

DEF CON 26 Intel CTF Results! Congratulations to the DEF CON Winners

By Daniel Clemens / Sep 11, 2018 12:00:00 AM

DEF CON 26, Intel CTF (iCTF) had more participants than any other capture the flag challenge. With over 100 teams showing up, a select few escalated to the top of the heap showing off their skills,...

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

By Daniel Clemens / Aug 31, 2018 12:00:00 AM

If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate — why do we struggle with an increase in more complex crime, a rise in international...

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

By Daniel Clemens / Aug 3, 2018 12:00:00 AM

In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved in the...

Understanding Link Analysis and Using it in Investigations

Understanding Link Analysis and Using it in Investigations

By Daniel Clemens / Jun 21, 2018 12:00:00 AM

I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet. A longtime friend, Roelof from Paterva, shared his vision for a...

Patchwork APT Group - Additional IOCs & Network Indicators

Patchwork APT Group - Additional IOCs & Network Indicators

By Daniel Clemens / Jun 8, 2018 12:00:00 AM

Yesterday, Matthew Meltzer, Sean Koessel, and Steven Adair @ Volexity released an excellent write-up on the Indian APT group known as Dropping Elephant. The Volexity article detailed attacks against...

Alabama Cyber Now: Disrupting Human Trafficking With Digital Forensics

By Daniel Clemens / May 7, 2018 12:00:00 AM

When most security pros think of threat intelligence, they think of cyber crime – tracking down hackers and cyber criminals aiming to compromise networks to exploit credit card information,...

Before Threat Intelligence: How We Tailored Monitoring and Alerting

Before Threat Intelligence: How We Tailored Monitoring and Alerting

By Daniel Clemens / Sep 26, 2017 12:00:00 AM

It was the end of 2010. The Packet Ninjas’ team (the predecessor of ShadowDragon) had been making mad dashes on application assessments and penetration tests while deployed to a nowhere...

Scroll to Top