Threat Inteliigence / OSINT / NETSEC / NATSEC

OSINT Wolves of Wall Street - gathering information on companies in open sources

Nowadays, OSINT is most often associated with the analysis of threats, journalistic investigations and verification of information, for example, from places subject to military operations. However, if we zoom out a bit and look at the phenomenon of collecting publicly available information and analyzing it in order to achieve specific results, it forms the basis of one of the most important contemporary institutions [...]

On a Shodan safari - about discovering what is connected to the Internet

Shodan main page map

In the last post, we visited airports and tracked planes. This time we will go down to earth, but we will again wander to distant corners of the globe. Observing the devices that surround us, it is not difficult to notice that more and more of them would like to connect to the Internet - TVs, refrigerators, vacuum cleaners, thermostats - all this gradually acquires functionalities that can [...]

Take to the skies with OSINT - open source air traffic tracking

I have been observing airplanes for a long time, the natural direction of OSINT's interests was therefore sources of information allowing for live tracking of airplanes routes. Currently, such tracking is possible mainly due to the spread of the Automatic Dependent Surveillance - Broadcast (ADS-B) system, in which aircraft determine their position using navigation [...]

What is OSINT

Intelligence analysis, satellite image analysis, SIGINT, IMINT - these terms are usually associated with the activities of state intelligence agencies with enormous budgets, a technique ahead of products available to the public for many years and secret knowledge obtained by intelligence officers. However, recent years have brought a real revolution in terms of access to data once available only [...]

Few words of introduction

I have been interested in the issues of security, access to information and intelligence for a long time. I've always been fascinated by the very idea of secret information - the fact that knowledge on a given topic can be so valuable and important to the operation of a company, national or personal security that it must be protected, and at the same time there are groups prepared to dedicate significant resources to get access to it. Not surprisingly I very much followed how development of the Internet enabled access to vast volumes of data. At the same time, use of the Internet simultaneously enabled collaboration of teams scattered around the world and threatened the security of information with remote, unauthorized access to it.

en_USEnglish