SlideShare a Scribd company logo
1 of 49
Presented by Kellup A. Charles, D.Sc., CISSP
Open-Source Intelligence:
The Process, Method, and Techniques
Agenda
Bill Gibbs
Cap Tech Talks Host
1. About Capitol Technology University
2. Session Pointers
3. About the Presenter
4. Presentation
5. Q & A
6. Upcoming Webinars
7. Recording, Slides, Certificate
About
Established in 1927, We are
one of the only private
Universities in the state of
Maryland specifically
dedicated to engineering,
cybersecurity, computer
sciences and tech
management.
Nonprofit, Private &
Accredited
Capitol is a nonprofit, private accredited university
located in Laurel, Maryland, USA
Capitol Technology University is
accredited by the Commission on
Higher Education of the Middle
States Association of Colleges
and Schools
The University is authorized by
the State of Maryland to confer
Associate’s (A.A.S.), Bachelor’s
(B.S.), Master’s (M.S., M.B.A.,
T.M.B.A), and Doctoral
(D.B.A.,D.Sc., Ed.D, Ph.D.) degrees.
Session Pointers
• We will answer questions at the conclusion of the presentation. At any
time you can post a question in the text chat and we will answer as many
as we can.
• Microphones and webcams are not activated for participants.
• A link to the recording and to the slides will be sent to all registrants and
available on our webinar web page.
• A participation certificate is available by request for both Live Session and
On Demand viewers.
Presented by Kellup A. Charles, D.Sc., CISSP
Open-Source Intelligence:
The Process, Method, and Techniques
About the presenter: Dr. Kellup Charles
• Chair of Cybersecurity Programs at Capitol
• Professor, Director of Cyber Labs
• Director of Center for Cybersecurity Research & Analysis
• Doctor of Science in Cybersecurity (Capital Tech. Univ)
• M.S. in Telecommunication Mgmt. (MD Univ. College)
• B.S. in Computer Science (NC A&T State University)
• 20+ years in government information security
• Creator/Executive Editor of SecurityOrb.com
• CISSP, CCNA, CISA, NSA-IAM, ITILv3)
Open-Source
Intelligence:
The Process, Method
and Techniques
Dr. Kellep A. Charles, CISSP
Cybersecurity Chair
Capitol Technology University
Disclaimer
Any views or opinions expressed in this presentation are solely
my own and do not reflect, represent, or associate to my
current and previous employers including the organizations I
participate in.
• I cannot provide any legal advice or recommendations.
• I do not condone nor encourage malicious behavior nor give permission nor
authorize to do anything related to content with this presentation.
• The information presented is solely for information and educational awareness.
AGENDA
• Define and Discuss OSINT Techniques & Methods
• OSINT Process and Framework
• Review OSINT Tools and Techniques
• Future of OSINT
• OSINT Demonstration
Dr. Kellep A. Charles
Cybersecurity Chair at Capitol Technology University
www.captechu.edu
Over 25 years as an Information Security Practitioner
Research Areas: Incident Response, Digital Forensics,
Vulnerability Scanners, Open-Source Intelligence
Certified Information Systems Security Professional
Certified Information Systems Auditor
ABOUT ME
Journey
• The reconnaissance phase consists of open-source
intelligence (OSINT) gathering techniques to better
understand the target organization and network.
• Collected artifacts from a Digital Forensics and
Incident Response investigation
What is Open-Source Intelligence (OSINT)?
● OSINT is primarily used in:
○ national security functions
○ law enforcement functions
○ business intelligence functions
○ Information Security functions
● In the intelligence community (IC), the term
"open" refers to overt publicly available
sources as opposed to "covert" or
clandestine sources (Wire Tapping)
● It is just another arrow within the
investigative analyst process, just like
techniques such as:
○ interviewing
○ surveillance
○ fingerprinting
○ and any number of others open to the
skilled professional investigator or
analyst
The collection and analysis of data gathered from open sources (overt and publicly available
sources) to produce actionable intelligence against a target/mission.
OSINT sources can be divided up into six different
categories of information flow:
Media - print newspapers, magazines, radio,
and television from across and between countries.
Internet - online publications, blogs, discussion groups,
citizen media (i.e. – cell phone videos, and user created
content), YouTube, and other social media websites (i.e.
– Facebook, Twitter, Instagram, etc.). This source also
outpaces a variety of other sources due to its timeliness
and ease of access.
Public government data - public government reports,
budgets, hearings, telephone directories, press
conferences, websites, and speeches. Although this
source comes from an official source they are publicly
accessible and may be used openly and freely.
Professional and academic publications - information
acquired from journals, conferences,
symposia, academic papers, dissertations, and theses.
Commercial data - commercial imagery, financial and
industrial assessments, and databases.
Grey literature - technical reports, preprints, patents,
working papers, business documents, unpublished
works, and newsletters.
OSINT Source Categories
OSINT is not a new capability
• Initially, was primarily paper-based resources (libraries and other common paper
media such as newspapers, industry publications, flyers and propaganda)
• Older OSINT research was limited by both the coverage of its information and
the ability of the researcher
• “What you saw was what you got and that was that…”
• The arrival of the Internet and particularly, the explosion in the use of social
media technology changed the status quo
• Created a multilingual, geographically distributed, completely unregulated publishing
platform on which any user could also become an author and a publisher
• The Internet promoted OSINT from a supporting role to finally sit alongside
other more clandestine and less accessible investigative capabilities
The street finds its own uses for things… - William Gibson
What threats can OSINT help with?
● As our physical and digital realities are
becoming more and more interlaced,
individuals and organizations are creating
more informational weaknesses and
thereby, more opportunities for an ever-
widening range of attacks and other threats
to occur:
○ Hacking
○ Information leaks
○ Extremist activity
○ Geopolitical threats
○ Fraud
○ Violent attacks
○ Disinformation campaigns
•Risk of getting detected:
This concerns the direct contact made by
using active techniques, or third-party
services that may give you away as the
one who performed the search.
•Risk of losing access to that information:
Once they know you’re tracking their steps or
looking for their information, they can
start erasing their own trails and shut
down public data from social networks,
profiles, and the like.
•Risk of becoming the victim:
After all, you can end up being the target of
an investigation, or even worse, the
organization you belong to can suffer
that fate. Great care should be taken
when using active OSINT techniques.
Risks of Performing an OSINT Investigation
Sock Puppets
• A Sock Puppet is fake persona, or an alternative online
identity used to collect and investigate open-source
information on a target.
• The main goal of the Sock Puppet is to not have the
profile linked back to the investigator.
• This is vital as to provide operational security (OPSEC) to
protect the investigator from retaliation or to prevent
bringing awareness to the target that they are being
investigated by a specific entity.
Sock Puppets (cont'd)
• To effectively create and use a functional sock puppet here are a few
recommendations:
• Anonymize the account so that it does not record the original IP address or location
(VPN/TOR/Public Wi-Fi)
• Certain social media platforms may prevent creating an account from a VPN or TOR connect.
In that case, using a public Wi-Fi is recommended.
• When logging to the sock account, be sure to always use a VPN, TOR or public Wi-Fi, under
no circumstances should the creator use a direct IP address that may link back to them.
• Make the account as legitimate as possible by producing daily activities, using it for a long
period of time and making online connections.
Sock Puppets (cont'd)
To effectively create and use a functional sock puppet here are a few recommendations:
• When creating a name for the account, it is recommended using a fake name generator. In
doing so, the investigator will be provided with an identity of a person that has never
existed. The identity will have a name, address, mother’s maiden name, weight, height, date
of birth, in addition to many other useful information need to create a person. Female
accounts then to have more success when creating a sock puppet.
• https://www.fakenamegenerator.com/
• Providing an image is highly recommended. The creator has two options, using a cartoon
avatar or providing an image of a human that does not exist through the use of artificial
intelligence. Never use a real person’s face as individuals can use tools such as Google
identify the photo’s original owner.
• https://thispersondoesnotexist.com/
Sock Puppets (cont'd)
To effectively create and use a functional sock puppet here are a few recommendations:
• When creating an email account for the sock puppet, it is recommended using any email
provider such as gmail.com, mail.com or yahoo.com to name a few. As previously stated, be
sure the IP address cannot be link to the creator.
• Obtain a burner cell phone and SIM card that can be used account verification. Be sure to not
have the phone linked back to the investigator by paying with cash or a privacy-based credit
card.
• Having more than one sock puppet is highly recommended in case something goes wrong,
the investigator will have an active back-up.
Sock Puppets are important for the protection of the investigator, things change fast in the online world, and it is important the
investigator keep up with the changes.
OSINT can be passive or active.
• Passive methods are those that do not involve
interaction with target systems and are not
subject to automatic detection.
> Collecting with a wide and invisible net
• Active methods are data collection where
analysts interact with target systems, which can
involve employing advanced techniques or even
simple interactions, such as registering on an
organization’s website to get materials available
to registered users only.
> Collecting with a trained fishing pole
OSINT Methods
The OSINT Process describes the steps of collecting, analyzing, and disseminating
publicly sourced information:
1. Planning and Direction
2. Collection
3. Processing and Exploitation
4. Analysis and Production
5. Dissemination and Integration
OSINT Process
OSINT Process: Planning and Direction
1. Planning and Direction
• The first step in the OSINT cycle involves planning the
priorities and requirements for the mission.
• Prior to collecting OSINT, operators should have a clear understanding of the
types of information they need, how to find those sources, and what they hope
to accomplish with the acquired information.
• These precautionary logistics will guarantee the productivity and efficiency of the
operation during the next phases of the OSINT cycle.
OSINT Process: Collection
2. Collection
• After proper planning has occurred, the collection of OSINT
can begin.
• OSINT resources include any materials that are freely
available online, such as news articles, social media posts,
and blogs.
• Teams can utilize their preferred collection tools and
resources to obtain this data.
OSINT Process: Processing and Exploitation
3. Processing and Exploitation
• Once you’ve acquired your data, you can start processing the information.
• Then, you’ll want to compile it into a common evidence repository, timeline, or report. In this
stage, you’re simplifying the content you’ve found and making it legible for the recipients of
the data.
• Processing the data will help analysts utilize the information more efficiently in the following
steps of the OSINT cycle.
OSINT Process: Analysis and Production
4. Analysis and Production
• After the initial processing of the collected data, your teams will then need to
perform an in-depth analysis of the information.
• This is a crucial step in the OSINT cycle, as it will allow your teams to use the data
they’ve acquired to interpret and anticipate events.
• Operators can organize their analyzed information into a detailed document or
presentation, which will be read by a designated audience.
OSINT Process: Dissemination and Integration
5. Dissemination and Integration
• The final step in the OSINT cycle entails delivering the collected and analyzed intelligence to
the proper stakeholders.
• Analysts then receive feedback, which dictates whether the OSINT cycle should begin again.
• Following the proper procedures of the OSINT cycle can guarantee the success of your open-
source online research and investigations.
OSINT Framework
What is the OSINT Framework?
A great place to start is the OSINT
Framework, put together by
Justin Nordine. The framework provides
links to a large collection of resources
for a huge variety of tasks from
harvesting email addresses to
searching social media or the dark web.
Four OSINT Foundations
1. Multi-Layered
2. Cyber Geography
3. Mixed Medium
4. Tangibility
OSINT Foundation: Multi-Layered
There are three layers to the Internet - the surface,
the deep, and the dark web.
1. The Surface Web - Everything you see on
the surface of the internet while online forms
part of the "surface web", which comprises just 4%
of the entire net. The data available on the surface
is purposely indexed by search engines, and this is
the reason you can access it easily compared
to information on other web layers.
2. The Deep Web - forms 95% of the net and
includes data not indexed by search engines and
can be tracked by search engines.
3. The Dark Web - includes sites designed to
be hidden which mostly have TOR (The Onion
Router) URLs that are impossible to remember,
guess or understand. TOR websites aren’t popular,
and they are not accessible without using specific
software programs, as a great deal of data is
encrypted and hosted mostly anonymously. On the
dark net, there are sites related to black-
markets and illegal activities.
● Link to the Hidden Wiki:
http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6ot
jiycgwqbym2qad.onion/wiki/
OSINT Foundation: Cyber Geography
With cyber geography, just like physical geography, the Internet has its own unique
regions based upon linguistic divisions
• Research has shown that about 50% of searches on Google are for information about
services that are in the same geographic location as the user search engine
• Results are ordered according to the physical geography of the user
• No country redirects when conducting searches across multiple cyber geographies
OSINT Foundation: Mixed Media
• Mixed medium at the layer of the user
experience
• The Internet (surface, deep or dark) is
not made-up of one single technology
• Complex mixture of searching and
display technologies
OSINT Foundation: Tangibility
• The Internet is actively distinguished from the real world
• The Internet has become so deeply intertwined with our daily lives
• For many users, particularly within western economies, access to the Internet is as
important as the provision of a stable electricity grid or clean water supply
Web Browsers
● Default web browsers (not highly recommended)
● Google Chrome or Firefox (preferred, flexibility
and extendibility)
● Flexibility with tabbed browsing is the term used
to describe the functionality within web browsers
that allows multiple pages to be open within one
web browsing window
● This functionality allows the investigator to have
multiple windows open at any one time.
● The benefit of mastering tabbed browsing across
two separate web browsers is that multiple
investigative threats can be followed and cross
referenced by the investigator
● This approach can prove invaluable, especially if
combined with a dual monitor display.
● Extendibility with add-ons Chrome and especially
Firefox can have their functionality hugely
extended by the addition of small pieces of software
called "add-ons".
● Find add-ons:
○ chrome.google.com/webstore/category/e
xtensions
○ firefoxaddons.mozilla.org.
Free Form Text Data Recovery Tools
Resurrect pages - its function, as
described by the provider: "What do
you do when a page is dead but you
still want to see it? Call in the clerics
and perform a resurrection!"
Memento Fox - its function, as described
by the provider, is time travel for the
web. Memento Fox implements the
Memento protocol that links resources
with their previous versions automatically,
so you can see the web as it was in the
past.
Archiving and Preservation Tools
● YouTube video downloader express -
allows the download of YouTube videos
in various formats. Once installed in
Firefox, a button appears under the
YouTube video. In an investigation, it is
used for archiving relevant YouTube
videos to the user's home computer. As
YouTube videos can be taken down at
any time, this is a great tool for
preserving videos.
● Abduction webpage screenshot
screen capture - allows the user to take
screenshots of a specific section of a
web page. Once installed in Firefox, it
can be found using right click menu >
save page as image. In an investigation,
it can preserve individual images or
whole pages in a logical manner.
Note: this tool is not a forensic-grade image
capture tool.
● Saved text to file - saves selected text
to a text file. Once installed in Firefox, it
can be found by right click menu > save
text to file. In investigations, it is handy
for making notes and memos as an
investigation progresses.
Images
● The first tool is search by image in Google. Its
function, as described by the provider, is to
access the Google image search. Once installed
in the Firefox browser, right click "menu search"
in Google with this image. In an investigation, it
is useful for finding related or similar images,
e.g. more pictures of the same individual.
● The second tool is tineye reverse image search.
TinEye is the original reverse image search
engine, using image recognition with a growing
index of billions of images. You can use TinEye
to find out where an image came from, how it is
being used, if modified versions of the image
exist, or to find a higher resolution version
Meta Search Engines
Search engines, such as Google and Bing, can be described as single source intelligence
and using single sources of intelligence, within the context of an investigation, is
generally considered to be a bad thing.
So if that is the problem, what is the solution?
Meta search engines are search engines that query other search engines and aggregate these
search results they can be divided into early-stage investigative tools and mid-to-late
stage investigative tools.
Meta Search Engine Tools (cont'd)
The following meta search engines can be reached by Googling the name :
• Zula
• Dogpile
• Poly meta
Zula - its source search engines are Google, Yahoo and Bing. It queries the largest number of single source
search engines and presents them using tabbed browsing. It also provides a useful breadcrumb display of
previously used search strings.
Dogpile - its source search engines are Google and Yahoo. Nothing special, apart from being a fast tool for a
meta browser.
Ali meter - its source engines are Google, Yahoo, Bing, and Ask. It has a very useful concept-,mapping feature
Carrot 2 clustering engine its source engines are Google and Bing it has a unique approach to visualizing tag
clouds of search results
OSINT Virtual Machine (VM)
● Trace Labs created a specialized OSINT
VM specifically to bring together the most
effective OSINT tools and customized
scripts
● Built to enable OSINT investigators to get
started and have access to the most
popular OSINT tools and scripts all neatly
packaged under one roof.
● https://www.tracelabs.org/
To address these challenges, OSINT tools must:
• Improve data coverage by providing access to relevant sources, including fringe web
spaces, that are not commonly available through commercial, off-the-shelf vendors.
• Leverage machine learning capabilities – Artificial Intelligence (AI) is a major priority for
governments, helping analysts process and contextualize intelligence more efficiently.
• Be intuitive and user-friendly for lower-level intelligence analysts, providing more efficient
workflows and better speed-to-information.
OSINT Tool Requirements
Artificial Intelligence: The Future of OSINT?
• “OSINT AI” should not be confused with “OSINT
automation.” For many decades already, numerous
automated scripts, apps and services have been
developed in the open-source intelligence world.
• Machine vision, learning, natural language processing
(NLP), autonomous machines and robotics.
• Perfect ally for boosting OSINT processes when it comes
to reconnaissance, information collection, analysis and
filtering large amounts of data.
• Government and intelligence agencies are already using
AI to help with their social collection efforts. Military
forces, in particular, rely on AI to help them succeed in
fights against terrorism, cyber-attacks, fake
propaganda, and national security, amongst many others.
Conclusion
● Both amateur and professional criminals
are using sophisticated strategies and
seemingly innocuous networks to conduct
illicit business.
● More and more media networks are being
infiltrated and used outside their intended
purposes.
● Evolving threats require predictive and
intelligence-led security strategies.
● Security teams must gather intelligence
from every corner that they can.
● Open-source threat intelligence software
is essential for any enterprise using public
data sources to inform their decision-
making.
● Not only can OSINT help protect against
hidden intentional attacks such as
information leaks, theft, and fraud, but it
also has the ability to gain real-time and
location-based situational awareness to
help protect people at work, at events,
institutions, or even the shopping mall.
Tomorrow’s Tech Careers Start Here.
Upcoming Webinars
The Occupational
Safety and Health
Emphasis on Mental
Well-Being
Darin Dillow
Feb. 16, 2023
Physics-Informed
Machine Learning:
The Next Evolution in
Neural Network
Development
Dr. Karriem Perry
Nov. 17
Transformational
Leadership: Leading
and Following from
the Front
Dr. Reginald Freeman
Jan. 19, 2023
www.captechu.edu/webinar-series
To Register for Webinars or View
On Demand Webinars:
Recording, Slides & Certificate
A copy of the slides and a
link to the recording will be
sent to all registrants.
Watch for an email
A Certificate of Completion
is available upon request to
both live session and On
Demand viewers
Simply reply to the email
Thanks for Joining Us!
Thank You!
This concludes today’s webinar
Watch for a follow up email that contains:
1. How to get a Participation Certificate (Available by
request for both Live Session and On Demand
viewers)
2. Link to the webinar recording and slides

More Related Content

What's hot

Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)festival ICT 2016
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINTAdam Compton
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)Molfar
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsJared Greenhill
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows SystemConferencias FIST
 

What's hot (20)

Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Incident response process
Incident response processIncident response process
Incident response process
 
Osint
OsintOsint
Osint
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital Forensics Case Study on BTK Killer
Digital Forensics Case Study on BTK KillerDigital Forensics Case Study on BTK Killer
Digital Forensics Case Study on BTK Killer
 

Similar to CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx

Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsJack Whitsitt
 
Building a professional digital identity
Building a professional digital identityBuilding a professional digital identity
Building a professional digital identityLisa Harris
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...Jisc
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspaceoudesign
 
Filth and lies: analysing social media
Filth and lies: analysing social mediaFilth and lies: analysing social media
Filth and lies: analysing social mediaDiana Maynard
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringJack Kessler
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other thingsSara-Jayne Terp
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 

Similar to CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication Skills
 
Building a professional digital identity
Building a professional digital identityBuilding a professional digital identity
Building a professional digital identity
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
Filth and lies: analysing social media
Filth and lies: analysing social mediaFilth and lies: analysing social media
Filth and lies: analysing social media
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Users guide
Users guideUsers guide
Users guide
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other things
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 

More from CapitolTechU

slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
Capitol Tech U Masters Presentation May 2024
Capitol Tech U Masters Presentation May 2024Capitol Tech U Masters Presentation May 2024
Capitol Tech U Masters Presentation May 2024CapitolTechU
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024CapitolTechU
 
CapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptxCapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptxCapitolTechU
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxSlides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxCapitolTechU
 
CapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptxCapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptxCapitolTechU
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxCapitolTechU
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Masters Presentation - February 2024.pptx
Masters Presentation - February  2024.pptxMasters Presentation - February  2024.pptx
Masters Presentation - February 2024.pptxCapitolTechU
 
Capitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptxCapitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptxCapitolTechU
 
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapitolTechU
 
Masters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptxMasters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptxCapitolTechU
 
Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024CapitolTechU
 
CapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptxCapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptxCapitolTechU
 
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapitolTechU
 
Masters Presentation - November 2023
Masters Presentation - November 2023 Masters Presentation - November 2023
Masters Presentation - November 2023 CapitolTechU
 
Doctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptxDoctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptxCapitolTechU
 
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptxClean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptxCapitolTechU
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapitolTechU
 

More from CapitolTechU (20)

slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Capitol Tech U Masters Presentation May 2024
Capitol Tech U Masters Presentation May 2024Capitol Tech U Masters Presentation May 2024
Capitol Tech U Masters Presentation May 2024
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
CapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptxCapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxSlides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
 
CapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptxCapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptx
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Masters Presentation - February 2024.pptx
Masters Presentation - February  2024.pptxMasters Presentation - February  2024.pptx
Masters Presentation - February 2024.pptx
 
Capitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptxCapitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptx
 
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
 
Masters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptxMasters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptx
 
Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024
 
CapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptxCapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptx
 
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
 
Masters Presentation - November 2023
Masters Presentation - November 2023 Masters Presentation - November 2023
Masters Presentation - November 2023
 
Doctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptxDoctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptx
 
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptxClean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptx
 

Recently uploaded

Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Mark Carrigan
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeSaadHumayun7
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdfVikramadityaRaj
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
factors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxfactors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxSanjay Shekar
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointELaRue0
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryEugene Lysak
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptxmanishaJyala2
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff17thcssbs2
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesashishpaul799
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...Nguyen Thanh Tu Collection
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17Celine George
 

Recently uploaded (20)

Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
factors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxfactors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptx
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 

CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx

  • 1. Presented by Kellup A. Charles, D.Sc., CISSP Open-Source Intelligence: The Process, Method, and Techniques
  • 2. Agenda Bill Gibbs Cap Tech Talks Host 1. About Capitol Technology University 2. Session Pointers 3. About the Presenter 4. Presentation 5. Q & A 6. Upcoming Webinars 7. Recording, Slides, Certificate
  • 3. About Established in 1927, We are one of the only private Universities in the state of Maryland specifically dedicated to engineering, cybersecurity, computer sciences and tech management.
  • 4. Nonprofit, Private & Accredited Capitol is a nonprofit, private accredited university located in Laurel, Maryland, USA Capitol Technology University is accredited by the Commission on Higher Education of the Middle States Association of Colleges and Schools The University is authorized by the State of Maryland to confer Associate’s (A.A.S.), Bachelor’s (B.S.), Master’s (M.S., M.B.A., T.M.B.A), and Doctoral (D.B.A.,D.Sc., Ed.D, Ph.D.) degrees.
  • 5. Session Pointers • We will answer questions at the conclusion of the presentation. At any time you can post a question in the text chat and we will answer as many as we can. • Microphones and webcams are not activated for participants. • A link to the recording and to the slides will be sent to all registrants and available on our webinar web page. • A participation certificate is available by request for both Live Session and On Demand viewers.
  • 6. Presented by Kellup A. Charles, D.Sc., CISSP Open-Source Intelligence: The Process, Method, and Techniques
  • 7. About the presenter: Dr. Kellup Charles • Chair of Cybersecurity Programs at Capitol • Professor, Director of Cyber Labs • Director of Center for Cybersecurity Research & Analysis • Doctor of Science in Cybersecurity (Capital Tech. Univ) • M.S. in Telecommunication Mgmt. (MD Univ. College) • B.S. in Computer Science (NC A&T State University) • 20+ years in government information security • Creator/Executive Editor of SecurityOrb.com • CISSP, CCNA, CISA, NSA-IAM, ITILv3)
  • 8. Open-Source Intelligence: The Process, Method and Techniques Dr. Kellep A. Charles, CISSP Cybersecurity Chair Capitol Technology University
  • 9. Disclaimer Any views or opinions expressed in this presentation are solely my own and do not reflect, represent, or associate to my current and previous employers including the organizations I participate in. • I cannot provide any legal advice or recommendations. • I do not condone nor encourage malicious behavior nor give permission nor authorize to do anything related to content with this presentation. • The information presented is solely for information and educational awareness.
  • 10. AGENDA • Define and Discuss OSINT Techniques & Methods • OSINT Process and Framework • Review OSINT Tools and Techniques • Future of OSINT • OSINT Demonstration
  • 11. Dr. Kellep A. Charles Cybersecurity Chair at Capitol Technology University www.captechu.edu Over 25 years as an Information Security Practitioner Research Areas: Incident Response, Digital Forensics, Vulnerability Scanners, Open-Source Intelligence Certified Information Systems Security Professional Certified Information Systems Auditor ABOUT ME
  • 12. Journey • The reconnaissance phase consists of open-source intelligence (OSINT) gathering techniques to better understand the target organization and network. • Collected artifacts from a Digital Forensics and Incident Response investigation
  • 13. What is Open-Source Intelligence (OSINT)? ● OSINT is primarily used in: ○ national security functions ○ law enforcement functions ○ business intelligence functions ○ Information Security functions ● In the intelligence community (IC), the term "open" refers to overt publicly available sources as opposed to "covert" or clandestine sources (Wire Tapping) ● It is just another arrow within the investigative analyst process, just like techniques such as: ○ interviewing ○ surveillance ○ fingerprinting ○ and any number of others open to the skilled professional investigator or analyst The collection and analysis of data gathered from open sources (overt and publicly available sources) to produce actionable intelligence against a target/mission.
  • 14. OSINT sources can be divided up into six different categories of information flow: Media - print newspapers, magazines, radio, and television from across and between countries. Internet - online publications, blogs, discussion groups, citizen media (i.e. – cell phone videos, and user created content), YouTube, and other social media websites (i.e. – Facebook, Twitter, Instagram, etc.). This source also outpaces a variety of other sources due to its timeliness and ease of access. Public government data - public government reports, budgets, hearings, telephone directories, press conferences, websites, and speeches. Although this source comes from an official source they are publicly accessible and may be used openly and freely. Professional and academic publications - information acquired from journals, conferences, symposia, academic papers, dissertations, and theses. Commercial data - commercial imagery, financial and industrial assessments, and databases. Grey literature - technical reports, preprints, patents, working papers, business documents, unpublished works, and newsletters. OSINT Source Categories
  • 15. OSINT is not a new capability • Initially, was primarily paper-based resources (libraries and other common paper media such as newspapers, industry publications, flyers and propaganda) • Older OSINT research was limited by both the coverage of its information and the ability of the researcher • “What you saw was what you got and that was that…” • The arrival of the Internet and particularly, the explosion in the use of social media technology changed the status quo • Created a multilingual, geographically distributed, completely unregulated publishing platform on which any user could also become an author and a publisher • The Internet promoted OSINT from a supporting role to finally sit alongside other more clandestine and less accessible investigative capabilities The street finds its own uses for things… - William Gibson
  • 16. What threats can OSINT help with? ● As our physical and digital realities are becoming more and more interlaced, individuals and organizations are creating more informational weaknesses and thereby, more opportunities for an ever- widening range of attacks and other threats to occur: ○ Hacking ○ Information leaks ○ Extremist activity ○ Geopolitical threats ○ Fraud ○ Violent attacks ○ Disinformation campaigns
  • 17. •Risk of getting detected: This concerns the direct contact made by using active techniques, or third-party services that may give you away as the one who performed the search. •Risk of losing access to that information: Once they know you’re tracking their steps or looking for their information, they can start erasing their own trails and shut down public data from social networks, profiles, and the like. •Risk of becoming the victim: After all, you can end up being the target of an investigation, or even worse, the organization you belong to can suffer that fate. Great care should be taken when using active OSINT techniques. Risks of Performing an OSINT Investigation
  • 18. Sock Puppets • A Sock Puppet is fake persona, or an alternative online identity used to collect and investigate open-source information on a target. • The main goal of the Sock Puppet is to not have the profile linked back to the investigator. • This is vital as to provide operational security (OPSEC) to protect the investigator from retaliation or to prevent bringing awareness to the target that they are being investigated by a specific entity.
  • 19. Sock Puppets (cont'd) • To effectively create and use a functional sock puppet here are a few recommendations: • Anonymize the account so that it does not record the original IP address or location (VPN/TOR/Public Wi-Fi) • Certain social media platforms may prevent creating an account from a VPN or TOR connect. In that case, using a public Wi-Fi is recommended. • When logging to the sock account, be sure to always use a VPN, TOR or public Wi-Fi, under no circumstances should the creator use a direct IP address that may link back to them. • Make the account as legitimate as possible by producing daily activities, using it for a long period of time and making online connections.
  • 20. Sock Puppets (cont'd) To effectively create and use a functional sock puppet here are a few recommendations: • When creating a name for the account, it is recommended using a fake name generator. In doing so, the investigator will be provided with an identity of a person that has never existed. The identity will have a name, address, mother’s maiden name, weight, height, date of birth, in addition to many other useful information need to create a person. Female accounts then to have more success when creating a sock puppet. • https://www.fakenamegenerator.com/ • Providing an image is highly recommended. The creator has two options, using a cartoon avatar or providing an image of a human that does not exist through the use of artificial intelligence. Never use a real person’s face as individuals can use tools such as Google identify the photo’s original owner. • https://thispersondoesnotexist.com/
  • 21. Sock Puppets (cont'd) To effectively create and use a functional sock puppet here are a few recommendations: • When creating an email account for the sock puppet, it is recommended using any email provider such as gmail.com, mail.com or yahoo.com to name a few. As previously stated, be sure the IP address cannot be link to the creator. • Obtain a burner cell phone and SIM card that can be used account verification. Be sure to not have the phone linked back to the investigator by paying with cash or a privacy-based credit card. • Having more than one sock puppet is highly recommended in case something goes wrong, the investigator will have an active back-up. Sock Puppets are important for the protection of the investigator, things change fast in the online world, and it is important the investigator keep up with the changes.
  • 22. OSINT can be passive or active. • Passive methods are those that do not involve interaction with target systems and are not subject to automatic detection. > Collecting with a wide and invisible net • Active methods are data collection where analysts interact with target systems, which can involve employing advanced techniques or even simple interactions, such as registering on an organization’s website to get materials available to registered users only. > Collecting with a trained fishing pole OSINT Methods
  • 23. The OSINT Process describes the steps of collecting, analyzing, and disseminating publicly sourced information: 1. Planning and Direction 2. Collection 3. Processing and Exploitation 4. Analysis and Production 5. Dissemination and Integration OSINT Process
  • 24. OSINT Process: Planning and Direction 1. Planning and Direction • The first step in the OSINT cycle involves planning the priorities and requirements for the mission. • Prior to collecting OSINT, operators should have a clear understanding of the types of information they need, how to find those sources, and what they hope to accomplish with the acquired information. • These precautionary logistics will guarantee the productivity and efficiency of the operation during the next phases of the OSINT cycle.
  • 25. OSINT Process: Collection 2. Collection • After proper planning has occurred, the collection of OSINT can begin. • OSINT resources include any materials that are freely available online, such as news articles, social media posts, and blogs. • Teams can utilize their preferred collection tools and resources to obtain this data.
  • 26. OSINT Process: Processing and Exploitation 3. Processing and Exploitation • Once you’ve acquired your data, you can start processing the information. • Then, you’ll want to compile it into a common evidence repository, timeline, or report. In this stage, you’re simplifying the content you’ve found and making it legible for the recipients of the data. • Processing the data will help analysts utilize the information more efficiently in the following steps of the OSINT cycle.
  • 27. OSINT Process: Analysis and Production 4. Analysis and Production • After the initial processing of the collected data, your teams will then need to perform an in-depth analysis of the information. • This is a crucial step in the OSINT cycle, as it will allow your teams to use the data they’ve acquired to interpret and anticipate events. • Operators can organize their analyzed information into a detailed document or presentation, which will be read by a designated audience.
  • 28. OSINT Process: Dissemination and Integration 5. Dissemination and Integration • The final step in the OSINT cycle entails delivering the collected and analyzed intelligence to the proper stakeholders. • Analysts then receive feedback, which dictates whether the OSINT cycle should begin again. • Following the proper procedures of the OSINT cycle can guarantee the success of your open- source online research and investigations.
  • 29. OSINT Framework What is the OSINT Framework? A great place to start is the OSINT Framework, put together by Justin Nordine. The framework provides links to a large collection of resources for a huge variety of tasks from harvesting email addresses to searching social media or the dark web.
  • 30. Four OSINT Foundations 1. Multi-Layered 2. Cyber Geography 3. Mixed Medium 4. Tangibility
  • 31. OSINT Foundation: Multi-Layered There are three layers to the Internet - the surface, the deep, and the dark web. 1. The Surface Web - Everything you see on the surface of the internet while online forms part of the "surface web", which comprises just 4% of the entire net. The data available on the surface is purposely indexed by search engines, and this is the reason you can access it easily compared to information on other web layers. 2. The Deep Web - forms 95% of the net and includes data not indexed by search engines and can be tracked by search engines. 3. The Dark Web - includes sites designed to be hidden which mostly have TOR (The Onion Router) URLs that are impossible to remember, guess or understand. TOR websites aren’t popular, and they are not accessible without using specific software programs, as a great deal of data is encrypted and hosted mostly anonymously. On the dark net, there are sites related to black- markets and illegal activities. ● Link to the Hidden Wiki: http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6ot jiycgwqbym2qad.onion/wiki/
  • 32. OSINT Foundation: Cyber Geography With cyber geography, just like physical geography, the Internet has its own unique regions based upon linguistic divisions • Research has shown that about 50% of searches on Google are for information about services that are in the same geographic location as the user search engine • Results are ordered according to the physical geography of the user • No country redirects when conducting searches across multiple cyber geographies
  • 33. OSINT Foundation: Mixed Media • Mixed medium at the layer of the user experience • The Internet (surface, deep or dark) is not made-up of one single technology • Complex mixture of searching and display technologies
  • 34. OSINT Foundation: Tangibility • The Internet is actively distinguished from the real world • The Internet has become so deeply intertwined with our daily lives • For many users, particularly within western economies, access to the Internet is as important as the provision of a stable electricity grid or clean water supply
  • 35. Web Browsers ● Default web browsers (not highly recommended) ● Google Chrome or Firefox (preferred, flexibility and extendibility) ● Flexibility with tabbed browsing is the term used to describe the functionality within web browsers that allows multiple pages to be open within one web browsing window ● This functionality allows the investigator to have multiple windows open at any one time. ● The benefit of mastering tabbed browsing across two separate web browsers is that multiple investigative threats can be followed and cross referenced by the investigator ● This approach can prove invaluable, especially if combined with a dual monitor display. ● Extendibility with add-ons Chrome and especially Firefox can have their functionality hugely extended by the addition of small pieces of software called "add-ons". ● Find add-ons: ○ chrome.google.com/webstore/category/e xtensions ○ firefoxaddons.mozilla.org.
  • 36. Free Form Text Data Recovery Tools Resurrect pages - its function, as described by the provider: "What do you do when a page is dead but you still want to see it? Call in the clerics and perform a resurrection!" Memento Fox - its function, as described by the provider, is time travel for the web. Memento Fox implements the Memento protocol that links resources with their previous versions automatically, so you can see the web as it was in the past.
  • 37. Archiving and Preservation Tools ● YouTube video downloader express - allows the download of YouTube videos in various formats. Once installed in Firefox, a button appears under the YouTube video. In an investigation, it is used for archiving relevant YouTube videos to the user's home computer. As YouTube videos can be taken down at any time, this is a great tool for preserving videos. ● Abduction webpage screenshot screen capture - allows the user to take screenshots of a specific section of a web page. Once installed in Firefox, it can be found using right click menu > save page as image. In an investigation, it can preserve individual images or whole pages in a logical manner. Note: this tool is not a forensic-grade image capture tool. ● Saved text to file - saves selected text to a text file. Once installed in Firefox, it can be found by right click menu > save text to file. In investigations, it is handy for making notes and memos as an investigation progresses.
  • 38. Images ● The first tool is search by image in Google. Its function, as described by the provider, is to access the Google image search. Once installed in the Firefox browser, right click "menu search" in Google with this image. In an investigation, it is useful for finding related or similar images, e.g. more pictures of the same individual. ● The second tool is tineye reverse image search. TinEye is the original reverse image search engine, using image recognition with a growing index of billions of images. You can use TinEye to find out where an image came from, how it is being used, if modified versions of the image exist, or to find a higher resolution version
  • 39. Meta Search Engines Search engines, such as Google and Bing, can be described as single source intelligence and using single sources of intelligence, within the context of an investigation, is generally considered to be a bad thing. So if that is the problem, what is the solution? Meta search engines are search engines that query other search engines and aggregate these search results they can be divided into early-stage investigative tools and mid-to-late stage investigative tools.
  • 40. Meta Search Engine Tools (cont'd) The following meta search engines can be reached by Googling the name : • Zula • Dogpile • Poly meta Zula - its source search engines are Google, Yahoo and Bing. It queries the largest number of single source search engines and presents them using tabbed browsing. It also provides a useful breadcrumb display of previously used search strings. Dogpile - its source search engines are Google and Yahoo. Nothing special, apart from being a fast tool for a meta browser. Ali meter - its source engines are Google, Yahoo, Bing, and Ask. It has a very useful concept-,mapping feature Carrot 2 clustering engine its source engines are Google and Bing it has a unique approach to visualizing tag clouds of search results
  • 41. OSINT Virtual Machine (VM) ● Trace Labs created a specialized OSINT VM specifically to bring together the most effective OSINT tools and customized scripts ● Built to enable OSINT investigators to get started and have access to the most popular OSINT tools and scripts all neatly packaged under one roof. ● https://www.tracelabs.org/
  • 42. To address these challenges, OSINT tools must: • Improve data coverage by providing access to relevant sources, including fringe web spaces, that are not commonly available through commercial, off-the-shelf vendors. • Leverage machine learning capabilities – Artificial Intelligence (AI) is a major priority for governments, helping analysts process and contextualize intelligence more efficiently. • Be intuitive and user-friendly for lower-level intelligence analysts, providing more efficient workflows and better speed-to-information. OSINT Tool Requirements
  • 43. Artificial Intelligence: The Future of OSINT? • “OSINT AI” should not be confused with “OSINT automation.” For many decades already, numerous automated scripts, apps and services have been developed in the open-source intelligence world. • Machine vision, learning, natural language processing (NLP), autonomous machines and robotics. • Perfect ally for boosting OSINT processes when it comes to reconnaissance, information collection, analysis and filtering large amounts of data. • Government and intelligence agencies are already using AI to help with their social collection efforts. Military forces, in particular, rely on AI to help them succeed in fights against terrorism, cyber-attacks, fake propaganda, and national security, amongst many others.
  • 44. Conclusion ● Both amateur and professional criminals are using sophisticated strategies and seemingly innocuous networks to conduct illicit business. ● More and more media networks are being infiltrated and used outside their intended purposes. ● Evolving threats require predictive and intelligence-led security strategies. ● Security teams must gather intelligence from every corner that they can. ● Open-source threat intelligence software is essential for any enterprise using public data sources to inform their decision- making. ● Not only can OSINT help protect against hidden intentional attacks such as information leaks, theft, and fraud, but it also has the ability to gain real-time and location-based situational awareness to help protect people at work, at events, institutions, or even the shopping mall.
  • 46. Upcoming Webinars The Occupational Safety and Health Emphasis on Mental Well-Being Darin Dillow Feb. 16, 2023 Physics-Informed Machine Learning: The Next Evolution in Neural Network Development Dr. Karriem Perry Nov. 17 Transformational Leadership: Leading and Following from the Front Dr. Reginald Freeman Jan. 19, 2023
  • 47. www.captechu.edu/webinar-series To Register for Webinars or View On Demand Webinars:
  • 48. Recording, Slides & Certificate A copy of the slides and a link to the recording will be sent to all registrants. Watch for an email A Certificate of Completion is available upon request to both live session and On Demand viewers Simply reply to the email
  • 49. Thanks for Joining Us! Thank You! This concludes today’s webinar Watch for a follow up email that contains: 1. How to get a Participation Certificate (Available by request for both Live Session and On Demand viewers) 2. Link to the webinar recording and slides