What’s in an email address?

What’s in an email address?

By Elliott Anderson | Dec 17, 2019 12:00:00 AM

A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same passwords for multiple emails.  In a very...

Bad moods = Bad decisions

Bad moods = Bad decisions

By Elliott Anderson / Aug 25, 2019 12:00:00 AM

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak.  “I’ve hit a dead-end, I can’t figure...

Social Networks: Friends of Friends

Social Networks: Friends of Friends

By Josh C / May 31, 2019 12:00:00 AM

Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that are the most connected. For this example, we...

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

By Daniel Clemens / Apr 3, 2019 12:00:00 AM

Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each bread crumb, you...

Paying It Forward at Crimes Against Children Conference (CACC)

Paying It Forward at Crimes Against Children Conference (CACC)

By Daniel Clemens / Sep 6, 2018 12:00:00 AM

This was my second year attending the Crimes Against Children Conference (CACC) in Dallas.  CACC draws a crowd proficient in the art of finding the bad guys and protecting the defenseless, and I...

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

By Daniel Clemens / Aug 31, 2018 12:00:00 AM

If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate  — why do we struggle with an increase in more complex crime, a rise in...

The Real Jack Ryan is Bringing His Supranormal Skills to the Fight Against Human Trafficking

The Real Jack Ryan is Bringing His Supranormal Skills to the Fight Against Human Trafficking

By Daniel Clemens / Aug 30, 2018 12:00:00 AM

Millions love the character Jack Ryan from Tom Clancy’s bestselling 18-book series (and a new TV show on Amazon!), but not as many folks know that there is a real, live Jack Ryan living in...

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

By Daniel Clemens / Aug 3, 2018 12:00:00 AM

In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved in the...

Understanding Link Analysis and Using it in Investigations

Understanding Link Analysis and Using it in Investigations

By Daniel Clemens / Jun 21, 2018 12:00:00 AM

I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet.  A longtime friend, Roelof from Paterva, shared his vision for...

ShadowDragon Announces that SocialNet is Now Available Through Phantom Platform

ShadowDragon Announces that SocialNet is Now Available Through Phantom Platform

By Daniel Clemens / Mar 14, 2018 12:00:00 AM

United States – ShadowDragon, a U.S.-based cyber threat intelligence solutions company, today announced that its SocialNet App is the first Social Media Forensics & OSINT mapping app available on...

Scroll to Top