Threat Inteliigence / OSINT / NETSEC / NATSEC

Few words of introduction

I have been interested in the issues of security, access to information and intelligence for a long time. I've always been fascinated by the very idea of secret information - the fact that knowledge on a given topic can be so valuable and important to the operation of a company, national or personal security that it must be protected, and at the same time there are groups prepared to dedicate significant resources to get access to it. Not surprisingly I very much followed how development of the Internet enabled access to vast volumes of data. At the same time, use of the Internet simultaneously enabled collaboration of teams scattered around the world and threatened the security of information with remote, unauthorized access to it. 

In my view, the biggest revolution in this area was development and proliferation of Open Source Intelligence (OSINT) and private sector intelligence services. This is most evident in the cybersecurity industry, where private incident response teams today often have to deal with activity of foreign intelligence services, thus gaining insight into the data that enables tracking of those efforts. On the other hand, websites such as Bellingcat publish analyzes which several dozen years ago could only originate from state intelligence agencies - for example, identification of Russian military intelligence officers and presenting the sequence of events that led to the downing of the MH17 aircraft. It is also possible because the data to which private individuals currently have access could often compete with what not so long ago would be available only to government intelligence analysts - such as satellite photos, along with the possibility of comparing photos from specific days and different satellites. 

Results of those efforts are quite spectacular - starting with information security vendors attributing cyberoperations to specific military units, and to mention also detailed analysis of events such as explosion in Beirut port or expansion of Chinese industrial infrastructure related to the Belt and Road Initiative. Given how young discipline this kind of OSINT is, its future seems even more fascinating. 

This passion for analysis of events led me to creating counteintelligence.pl, where I would like to share my thoughts, tips and comments on OSINT, analysis and detection of cyber operations and related topics. 

Why counterintelligence.pl? First of all, I was surprised that this domain is still available, so I couldn't help but use it :). Secondly, and more substantively, I believe that word "counterintelligence" defines very well the advantage that private organizations, NGOs, and civil society have gained as a result of broad access to information. The name Bellingcat comes from the phrase "Belling the cat" or "putting bells on a cat" and it is precisely getting in the way of intelligence operations is the essence of the practice of both organizations fighting against civil rights violations such as CitizenLab or Bellingcat as well as threat intelligence teams.

To finish this short introduction, I invite you to read, comment, contact me with any feedback and I wish you curiosity in discovering this fascinating and constantly evolving world.

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish