Sportradar Case Study: Deep Background Checks, Organizational Integrity, and Fraud Investigations

Sportradar Case Study: Deep Background Checks, Organizational Integrity, and Fraud Investigations

By Admin | Mar 20, 2023 7:30:00 AM

Investigating integrity and criminality in commerce is a daunting task that requires access to vast amounts of information and complex organizational analysis. The scale rises considerably when...

ShadowDragon Combines Capabilities with Chorus Intelligence

ShadowDragon Combines Capabilities with Chorus Intelligence

By Admin / Sep 15, 2022 10:00:00 AM

September 15, 2022 – Virginia Beach, VA – Chorus Intelligence (“Chorus”) has powered up their digital intelligence platform by embedding SocialNet from ShadowDragon within it. This combined...

Rate Limits in Data Visualization

Rate Limits in Data Visualization

By Josh C / May 13, 2020 12:00:00 AM

One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes than you are allowed to...

Additional Insights into Iranian Cyber Espionage | APT33

Additional Insights into Iranian Cyber Espionage | APT33

By Daniel Clemens / Apr 24, 2020 12:00:00 AM

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment...

Data vs. Intelligence

Data vs. Intelligence

By Josh C / Apr 22, 2020 12:00:00 AM

It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you can about the person. The difference between an...

Background Checks & Due Diligence

Background Checks & Due Diligence

By Elliott Anderson / Mar 11, 2020 12:00:00 AM

Many years ago, when I was in college, I had a job at a large retailer.  It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, etc.  After working...

Unmasking a carder with OSINT

Unmasking a carder with OSINT

By Elliott Anderson / Feb 19, 2020 12:00:00 AM

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.  I spent about an hour on the basics of the investigation. The...

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

By Admin / Jan 21, 2020 10:20:04 AM

Risk management strategies that work are hard to find in such a noisy infosec buzzword filled industry. Our guest Matt Devost, offers perspective on subjects which will be helpful for beginners,...

ShadowDragon Podcast #08 - Blake Butler Interview | Active Shooters, Actor Engagement, and Hack Back

ShadowDragon Podcast #08 - Blake Butler Interview | Active Shooters, Actor Engagement, and Hack Back

By Admin / Jan 21, 2020 10:20:04 AM

Actor engagement and physical security intersect when active shooter situations or heightened security threats are targeted against executives or physical locations. Naturally, the topic of...

Iran and OSINT Hunting for Fun & Profit.

Iran and OSINT Hunting for Fun & Profit.

By Elliott Anderson / Jan 15, 2020 12:00:00 AM

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”.  There’s no deep takeaway here –– just some basic searching and the techniques involved. ...

What Will OSINT/PAI and Collection at Scale Look like for 2020?

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / Jan 11, 2020 12:00:00 AM

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on the...

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

By Daniel Clemens / Jan 6, 2020 12:00:00 AM

On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as a supposed...

What’s in an email address?

What’s in an email address?

By Elliott Anderson / Dec 17, 2019 12:00:00 AM

A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same passwords for multiple emails.  In a very...

Bad moods = Bad decisions

Bad moods = Bad decisions

By Elliott Anderson / Aug 25, 2019 12:00:00 AM

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak.  “I’ve hit a dead-end, I can’t figure anything...

Social Networks: Friends of Friends

Social Networks: Friends of Friends

By Josh C / May 31, 2019 12:00:00 AM

Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that are the most connected. For this example, we...

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

By Daniel Clemens / Apr 3, 2019 12:00:00 AM

Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each bread crumb, you...

Paying It Forward at Crimes Against Children Conference (CACC)

Paying It Forward at Crimes Against Children Conference (CACC)

By Daniel Clemens / Sep 6, 2018 12:00:00 AM

This was my second year attending the Crimes Against Children Conference (CACC) in Dallas.  CACC draws a crowd proficient in the art of finding the bad guys and protecting the defenseless, and I...

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

By Daniel Clemens / Aug 31, 2018 12:00:00 AM

If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate  — why do we struggle with an increase in more complex crime, a rise in international...

The Real Jack Ryan is Bringing His Supranormal Skills to the Fight Against Human Trafficking

The Real Jack Ryan is Bringing His Supranormal Skills to the Fight Against Human Trafficking

By Daniel Clemens / Aug 30, 2018 12:00:00 AM

Millions love the character Jack Ryan from Tom Clancy’s bestselling 18-book series (and a new TV show on Amazon!), but not as many folks know that there is a real, live Jack Ryan living in America...

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

By Daniel Clemens / Aug 3, 2018 12:00:00 AM

In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved in the...

Understanding Link Analysis and Using it in Investigations

Understanding Link Analysis and Using it in Investigations

By Daniel Clemens / Jun 21, 2018 12:00:00 AM

I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet.  A longtime friend, Roelof from Paterva, shared his vision for a...

ShadowDragon Announces that SocialNet is Now Available Through Phantom Platform

ShadowDragon Announces that SocialNet is Now Available Through Phantom Platform

By Daniel Clemens / Mar 14, 2018 12:00:00 AM

United States – ShadowDragon, a U.S.-based cyber threat intelligence solutions company, today announced that its SocialNet App is the first Social Media Forensics & OSINT mapping app available on...

Buckle up for Step-by-Step Insight into Charming Kitten Cyberespionage Attacks

Buckle up for Step-by-Step Insight into Charming Kitten Cyberespionage Attacks

By Daniel Clemens / Jan 26, 2018 12:00:00 AM

The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why the Clear Sky report...

Scroll to Top