NOTE: This piece was originally published in the E-Zine HVCK. You can see that original version here. There was a time when I’d open my phone first thing in the morning, not to read messages from family, work, or to do my morning meditation, but to read the Twitter feeds of a middle-aged male called… Continue reading
Posts tagged "OSINT"
Dear X, your staff passwords, numbers & confidential data is on Google – a report on searching and ethics
TL;DR Identification of privacy exposure of publicly available emails for password reset departments, universities, government departments and private communications. Issue is widespread. I have spent the past month notifying universities and non-government groups affected. I recently found a data leak through a Google search string which gave results of information that should probably not be… Continue reading
How I Scrape and Analyse Twitter Networks [Case Study]
This ‘how-to’ report is to assist those conducting research on information operations or performing a network analysis on Twitter. It may also be useful to those seeking to hunt bots, track automation, capture breaking events or learn how to scrape data. Because many have asked about this from varying pockets of the world, I have… Continue reading
Finding McAfee: Geolocation & Imagery Analysis [Case Study]
Identifying past, current, and possible future locations through the geolocation and chronolocation of media provided by a specific user. This case study is based on a challenge from well-known entrepreneur, John McAfee, to show how relative geolocation of two points on a chronological timeline can give a likely path and possible locations in between. To… Continue reading
Tracing a dark web service on the blockchain [Case Study]
Cryptocurrency crimes and scams are inevitable, and there’s no place better than the dark web with the added anonymity. However, not only is it easy to identify the relationship between certain sites, but there are also a number of ‘digital fingerprints’ an onion site can leave behind. In this case study, we take a look… Continue reading