Becoming Dark Web Rambo

Becoming Dark Web Rambo

By Elliott Anderson | May 6, 2020 12:00:00 AM

There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space.I’ve met a huge swath of capable engineers and developers who can explain the technical...

Demystifying the Dark Web: Part 3

Demystifying the Dark Web: Part 3

By Josh C / Apr 1, 2020 12:00:00 AM

After looking at the structure of both the dark web and normal web, we can now start to see why so many people want the benefits Tor gives, especially the anonymity. With anonymity comes people who...

Filtering Out Noise

Filtering Out Noise

By Brooks M / Mar 25, 2020 12:00:00 AM

When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may even think, “Wow, this is awesome! I am awesome! My...

Tracking an Outbreak

Tracking an Outbreak

By Brooks M / Jan 29, 2020 12:00:00 AM

I recently setup a project in OIMonitor to track the mentions of infectious diseases mentioned in the news. I immediately got results, though not all of it was good. One thing that did pop up...

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

By Admin / Jan 21, 2020 10:20:04 AM

Risk management strategies that work are hard to find in such a noisy infosec buzzword filled industry. Our guest Matt Devost, offers perspective on subjects which will be helpful for beginners,...

ShadowDragon Podcast #08 - Blake Butler Interview | Active Shooters, Actor Engagement, and Hack Back

ShadowDragon Podcast #08 - Blake Butler Interview | Active Shooters, Actor Engagement, and Hack Back

By Admin / Jan 21, 2020 10:20:04 AM

Actor engagement and physical security intersect when active shooter situations or heightened security threats are targeted against executives or physical locations. Naturally, the topic of...

Iran and OSINT Hunting for Fun & Profit.

Iran and OSINT Hunting for Fun & Profit.

By Elliott Anderson / Jan 15, 2020 12:00:00 AM

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic searching and the techniques involved. Iran...

What Will OSINT/PAI and Collection at Scale Look like for 2020?

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / Jan 11, 2020 12:00:00 AM

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on the...

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

By Daniel Clemens / Jan 6, 2020 12:00:00 AM

On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as a supposed...

Bad moods = Bad decisions

Bad moods = Bad decisions

By Elliott Anderson / Aug 25, 2019 12:00:00 AM

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak. “I’ve hit a dead-end, I can’t figure anything...

It’s Hard Out There for a Pimp

It’s Hard Out There for a Pimp

By Brooks M / Jun 24, 2019 12:00:00 AM

Human trafficking, according to Wikipedia, is the trade of humans for forced labour. With the advent of the internet and high-speed communication, traffickers have found a new way to advertise their...

Forget About Deep and Dark Web Hype

Forget About Deep and Dark Web Hype

By Elliott Anderson / Jun 12, 2019 12:00:00 AM

Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very high scale and have been doing...

Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media

Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media

By Daniel Clemens / Mar 29, 2019 12:00:00 AM

Catching the backscatter of conversation, keywords and data dumps have always been one of the driving goals in our OIMonitor project. While others have been quick to highlight one particular...

Hype and the Deep Dark Web

Hype and the Deep Dark Web

By Daniel Clemens / Sep 25, 2018 12:00:00 AM

I had previously written about how we started with our our monitoring platform and how that grew into the beast it is today. I didn’t leave much room to frame things in the most hip-infosec way,...

Paying It Forward at Crimes Against Children Conference (CACC)

Paying It Forward at Crimes Against Children Conference (CACC)

By Daniel Clemens / Sep 6, 2018 12:00:00 AM

This was my second year attending the Crimes Against Children Conference (CACC) in Dallas. CACC draws a crowd proficient in the art of finding the bad guys and protecting the defenseless, and I...

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

By Daniel Clemens / Aug 31, 2018 12:00:00 AM

If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate — why do we struggle with an increase in more complex crime, a rise in international...

Before Threat Intelligence: How We Forged Tailored Monitoring and Alerting... Anonymous Investigations Inspired Innovation

Before Threat Intelligence: How We Forged Tailored Monitoring and Alerting... Anonymous Investigations Inspired Innovation

By Daniel Clemens / Sep 26, 2017 12:00:00 AM

It was the end of 2010. The Packet Ninjas’ team (the predecessor of ShadowDragon) had been making mad dashes on application assessments and penetration tests while deployed to a nowhere...

Scroll to Top