What Will OSINT/PAI and Collection at Scale Look like for 2020?

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens | Jan 11, 2020 12:00:00 AM

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on the...

The Problem with Technology Keywords

The Problem with Technology Keywords

By Josh C / Dec 4, 2019 12:00:00 AM

Big data, AI, machine learning, block chain, and every other cool new tech words are all really just that–words. To a developer or computer scientist, they are a type of tool to solve specific...

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

By Daniel Clemens / Dec 1, 2019 12:00:00 AM

Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging in...

The Vital Few and the Useful Many

The Vital Few and the Useful Many

By Brooks M / Oct 1, 2019 12:00:00 AM

In 1896, at the University of Lausanne in Switzerland, a young economist by the name of Vilfredo Pareto published a paper showing how 80% of the land in Italy was owned by 20% of the population....

Job Post: Training and Curriculum Specialist

Job Post: Training and Curriculum Specialist

By Daniel Clemens / Sep 3, 2019 12:00:00 AM

ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities,...

Bad moods = Bad decisions

Bad moods = Bad decisions

By Elliott Anderson / Aug 25, 2019 12:00:00 AM

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak.  “I’ve hit a dead-end, I can’t figure...

Illuminating Context with Timeline Analysis

Illuminating Context with Timeline Analysis

By Daniel Clemens / Jul 29, 2019 12:00:00 AM

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions...

It’s Hard Out There for a Pimp

It’s Hard Out There for a Pimp

By Brooks M / Jun 24, 2019 12:00:00 AM

Human trafficking, according to Wikipedia, is the trade of humans for forced labour. With the advent of the internet and high-speed communication, traffickers have found a new way to advertise...

Forget About Deep and Dark Web Hype

Forget About Deep and Dark Web Hype

By Elliott Anderson / Jun 12, 2019 12:00:00 AM

Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very high scale and have been...

Social Networks: Friends of Friends

Social Networks: Friends of Friends

By Josh C / May 31, 2019 12:00:00 AM

Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that are the most connected. For this example, we...

Scroll to Top