Boletín de noticias riet n° 6 – noviembre 2015RIET_INEW
El Sistema Educativo Argentino (SEA) es un sistema descentralizado. Argentina está conformada por 23 Provincias y la Ciudad Autónoma de Buenos Aires (C.A.B.A.).
Boletín de noticias riet n° 6 – noviembre 2015RIET_INEW
El Sistema Educativo Argentino (SEA) es un sistema descentralizado. Argentina está conformada por 23 Provincias y la Ciudad Autónoma de Buenos Aires (C.A.B.A.).
Deriving Intelligence from Open Source InformationAdrianPBTaylor
The flood of Open Source Information requires a change in the way we generate intelligence. At the basic level it requires much more focus on using visualisation, sharing infomration and contextualising it in analysis, but also means much more attention must be paid to the interface with the decision maker. In fact, it calls into question the very basic assumptions of the need for a centralised analytical capability, and really requires distributed cognition networks that generate a society-wide reflection and debate on future risks and opportunities - after all, many of the greatest security risks facing developed nations are not ones that are best fought with tanks and bombs
Presentation at the Bernadotte Academy in 2007 by Infosphere CEO Mats Björe about the concept of OSINT. Examples from tools like Silobreake is included
OSINT - Open Source Intelligence by Rohit Srivastwa at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.htm
Durante l’intervento verranno presentati i cardini del processo di ricerca delle informazioni mediante la consultazione di fonti di pubblico accesso. Sarà illustrata la teoria alla base di questo processo che prevede l’identificazione delle fonti, la selezione e la valutazione del loro contenuto informativo per arrivare infine all’utilizzo stesso dell’informazione estratta. Nella seconda fase della presentazione verranno mostrati i tool e le metodologie per l’estrazione di informazioni mediante l’analisi di documenti, foto, social network e altre fonti spesso trascurate. In ultimo saranno mostrati sistemi in grado di correlare diverse informazioni provenienti dalle fonti aperte e verranno discussi i relativi scenari di utilizzo nonché le possibili contromisure.
Open Source Intelligence Gathering (OSINT) is growing in popularity among attackers and defenders alike. When an attacker comes knocking on your network's front door, the warning lights go off in multiple systems (IDS, IPS, SIEM, WAF). More sophisticated attackers, however, spend considerable time gathering information using tools and techniques that never touch any of your systems. As a result, these attackers are able to execute their attacks and make off with proprietary data before you even know they are there. This presentation provides an introduction to many OSINT tools and techniques, as well as methods you can use to minimize your exposure.
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataChema Alonso
Diapositivas de la presentación impartida por Chema Alonso durante el congreso CELAES 2015 el 15 de Octubre en Panamá. En ella se habla de cómo en Eleven Paths y Telefónica se utilizan las tecnologías Tacyt, Sinfonier y Faast para luchar contra el e-crime.
Enterprise Open Source Intelligence GatheringTom Eston
Presented at the Ohio Information Security Summit, October 30, 2009.
What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition? We all know information or intelligence gathering is one of the most important phases of a penetration test. However, gathering information and intelligence about your own company is even more valuable and can help an organization proactively determine the information that may damage your brand, reputation and help mitigate leakage of confidential information.
This presentation will cover what the risks are to an organization regarding publicly available open source intelligence. How can your enterprise put an open source intelligence gathering program in place without additional resources or money. What free tools are available for gathering intelligence including how to find your company information on social networks and how metadata can expose potential vulnerabilities about your company and applications. Next, we will explore how to get information you may not want posted about your company removed and how sensitive metadata information you may not be aware of can be removed or limited. Finally, we will discuss how to build a Internet posting policy for your company and why this is more important then ever.
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
Every investigator needs the skills and knowledge to use OSINT competently in investigations. As online information continues to multiply in volume and complexity, the tools required to find, sift through, authenticate and preserve that information become more and more important for investigators. Failure to master these tools to tap into the rich resources of the web can hamper your investigations.
Learn the intricacies of online investigating from an expert in the field. Join Sandra Stibbards, owner and president of Camelot Investigations and a financial fraud investigator, speaker and trainer, for a free webinar on How to Use OSINT in Investigations.
Webinar attendees will learn:
-How to find information on the hidden web
-How to find publicly available information in government and private databases
-Dos and don’ts for searching social media effectively
-Tips for remaining anonymous while researching investigation subjects
-Accessing archived information
-How criminals hide, and how to find them
This is the in-depth presentation I did at UX Australia 2013 in Melbourne. It gives first an approach grounded in the theory of complexity and then expands on the two fundamentals to design social experiences.
Budapest Spark Meetup - Apache Spark @enbrite.lyMészáros József
Budapest Spark Meetup - Apache Spark @enbrite.ly presentation held on
March 30, 2016.
The vision we all share at enbrite.ly is to create the next generation decision supporting system in online advertising that combines the market needs; anti-fraud, viewability, brand safety and traffic quality assurances in one platform. We do this by analyzing vast amount of data to create value for our customers. In the last 6 months we created our ETL pipeline, the core component of our data platform based on Apache Spark. In this presentation I share the journey from the whiteboard designs to the maintenance of a TB-scale data pipeline. I share the lessons we learned and the ups and downs using Spark in scale.
Deriving Intelligence from Open Source InformationAdrianPBTaylor
The flood of Open Source Information requires a change in the way we generate intelligence. At the basic level it requires much more focus on using visualisation, sharing infomration and contextualising it in analysis, but also means much more attention must be paid to the interface with the decision maker. In fact, it calls into question the very basic assumptions of the need for a centralised analytical capability, and really requires distributed cognition networks that generate a society-wide reflection and debate on future risks and opportunities - after all, many of the greatest security risks facing developed nations are not ones that are best fought with tanks and bombs
Presentation at the Bernadotte Academy in 2007 by Infosphere CEO Mats Björe about the concept of OSINT. Examples from tools like Silobreake is included
OSINT - Open Source Intelligence by Rohit Srivastwa at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.htm
Durante l’intervento verranno presentati i cardini del processo di ricerca delle informazioni mediante la consultazione di fonti di pubblico accesso. Sarà illustrata la teoria alla base di questo processo che prevede l’identificazione delle fonti, la selezione e la valutazione del loro contenuto informativo per arrivare infine all’utilizzo stesso dell’informazione estratta. Nella seconda fase della presentazione verranno mostrati i tool e le metodologie per l’estrazione di informazioni mediante l’analisi di documenti, foto, social network e altre fonti spesso trascurate. In ultimo saranno mostrati sistemi in grado di correlare diverse informazioni provenienti dalle fonti aperte e verranno discussi i relativi scenari di utilizzo nonché le possibili contromisure.
Open Source Intelligence Gathering (OSINT) is growing in popularity among attackers and defenders alike. When an attacker comes knocking on your network's front door, the warning lights go off in multiple systems (IDS, IPS, SIEM, WAF). More sophisticated attackers, however, spend considerable time gathering information using tools and techniques that never touch any of your systems. As a result, these attackers are able to execute their attacks and make off with proprietary data before you even know they are there. This presentation provides an introduction to many OSINT tools and techniques, as well as methods you can use to minimize your exposure.
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataChema Alonso
Diapositivas de la presentación impartida por Chema Alonso durante el congreso CELAES 2015 el 15 de Octubre en Panamá. En ella se habla de cómo en Eleven Paths y Telefónica se utilizan las tecnologías Tacyt, Sinfonier y Faast para luchar contra el e-crime.
Enterprise Open Source Intelligence GatheringTom Eston
Presented at the Ohio Information Security Summit, October 30, 2009.
What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition? We all know information or intelligence gathering is one of the most important phases of a penetration test. However, gathering information and intelligence about your own company is even more valuable and can help an organization proactively determine the information that may damage your brand, reputation and help mitigate leakage of confidential information.
This presentation will cover what the risks are to an organization regarding publicly available open source intelligence. How can your enterprise put an open source intelligence gathering program in place without additional resources or money. What free tools are available for gathering intelligence including how to find your company information on social networks and how metadata can expose potential vulnerabilities about your company and applications. Next, we will explore how to get information you may not want posted about your company removed and how sensitive metadata information you may not be aware of can be removed or limited. Finally, we will discuss how to build a Internet posting policy for your company and why this is more important then ever.
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
Every investigator needs the skills and knowledge to use OSINT competently in investigations. As online information continues to multiply in volume and complexity, the tools required to find, sift through, authenticate and preserve that information become more and more important for investigators. Failure to master these tools to tap into the rich resources of the web can hamper your investigations.
Learn the intricacies of online investigating from an expert in the field. Join Sandra Stibbards, owner and president of Camelot Investigations and a financial fraud investigator, speaker and trainer, for a free webinar on How to Use OSINT in Investigations.
Webinar attendees will learn:
-How to find information on the hidden web
-How to find publicly available information in government and private databases
-Dos and don’ts for searching social media effectively
-Tips for remaining anonymous while researching investigation subjects
-Accessing archived information
-How criminals hide, and how to find them
This is the in-depth presentation I did at UX Australia 2013 in Melbourne. It gives first an approach grounded in the theory of complexity and then expands on the two fundamentals to design social experiences.
Budapest Spark Meetup - Apache Spark @enbrite.lyMészáros József
Budapest Spark Meetup - Apache Spark @enbrite.ly presentation held on
March 30, 2016.
The vision we all share at enbrite.ly is to create the next generation decision supporting system in online advertising that combines the market needs; anti-fraud, viewability, brand safety and traffic quality assurances in one platform. We do this by analyzing vast amount of data to create value for our customers. In the last 6 months we created our ETL pipeline, the core component of our data platform based on Apache Spark. In this presentation I share the journey from the whiteboard designs to the maintenance of a TB-scale data pipeline. I share the lessons we learned and the ups and downs using Spark in scale.
FIWARE Global Summit - AI on Demand – The AI4EU ProjectFIWARE
Presentation by Tobias Franke
Researcher, Deutsches Forschungszentrum für Künstliche Intelligenz
FIWARE Global Summit
23-24 October 2019 - Berlin, Germany
Day 2: Openness: making use of open data, Mr. Peter Reichstädter, CIO, Parlia...wepc2016
At first, it was assumed that if parliaments made their data available, people would come and get it. More recently, it has become clear that there is still much to do to make open data “profitable” and usable in a constant and reliable way. The session will also question parliament’s ability to access and use data from the executive branch of government and elsewhere in its own research activities.
The BROAD and EPHR projects (Barcelona, Spain – 27 Feb. 2010)Cédric Laurant
Guest speaker's presentation at the workshop: “Informing and sensitizing young European citizens on the protection of their personal data” (LDH, AEDH, EDRi, IuRe, Pangea) - Barcelona, Spain – 27 Feb. 2010.
Whistleblower Protection Seminar 16-17 June 2014 - AgendaOECD Governance
Whistleblowing is an essential element for safeguarding the public interest and for promoting a culture of public accountability and integrity. The majority of OECD countries have recently passed legislation protecting whistleblowers and yet, despite being high on the agenda, successful whistleblowing stories are rare. Therefore, it is time to re-visit whistleblower protection and reflect on what countries have learned in recent years and identify key conditions for providing even more effective protection for whistleblowers. More information on this meeting at http://www.oecd.org/gov/ethics/whistleblower-protection-seminar-june-2014.htm
Openlaws.eu is funded by JUST/2013/ACTION GRANTS Grant Agreement Number 4562, led by the University of Amsterdam during the period March 2014-2016. The case study is of the European institutions' provision of free access to European Union law, in terms of cases, legislation, regulatory instruments and academic-expert analysis. The analysis explains how and whether the environment (institutions, policies and the legal community) is finally developing in which open access models such as openlaws.eu can take root and flourish. The key functionalities of the existing legal publishing system are summarized and described. This activity involves a review of the existing information systems and legal databases already in use and will produce a specification of the requirements of the system on the basis of the analysis of social, legal and market requirements. The case studies represent the key socio-economic and legal aspects of the services and illustrate the main functionalities, structure and operation of the proposed services. The findings are informed by key informant interviews and form a working assumption. The interviews are supported by the literature review, and the insights of workshops (including the LASPSI workshop on 3 September 2014).
The breadth of stakeholders interviewed is broad and includes experts from: academia, Non-Departmental Public Bodies (NDPB), trading funds, private entrepreneurs, corporations, standards bodies, non-governmental organizations and government policy officials with both domestic and international responsibilities. Note that the case studies rely on a Soft Systems Methodology (SSM) framework in order to identify the key components of the problem and provide the key specifications for the system that is to be built, while the third activity will rely on a combination of desk research, in-depth interviews, and focus groups.
Argument (598 words):
We argue that the European legal informatics space is unique in seven respects compared to national case studies.
1. The decision to make access to documentation freely available at production and then no charge was made in the context of no developed market actors to challenge the decision to ‘super-nationalise’ the state provision of legal information and case law reportage. There was no precedent for a multilingual economic and political area such as this, with four original languages and a precedent setting ‘Supreme Court’.
2. The essential role of European law in creating the ‘acquis communitaire’ led to a political decision to make law as widely available as possible. The benefits in creating an essential knowledge of European law amongst a critical mass of advocates at national levels was considered so important from the 1950s onwards that there was no serious resistance beyond basic budgetary questions.
As a result, it may be argued that European legal data is so open to reuse and access that it is the ‘exception that proves the rule’.
Regional Conference
Transparency in Media Ownership and Preventing
Media Concentration
Skopje, 25-26 September 2014
Prof. Dr. Peggy Valcke
KU Leuven, Faculty of Law, iMinds-ICRI
& European University Institute, Florence
2. 2
This Presentation
What is OSINT
Why is OSINT important?
What objectives for the EUROSINT FORUM ?
Who is involved?
3. 3
Open Source Intelligence
OSINT is an intelligence discipline that involves:
collecting information from open sources;
analysing it to produce actionable recommendations.
Open sources include:
Media - newspapers, magazines, radio, television, and computer-
based information (free or paying);
Official data – e.g. government reports, budgets, demographics,
hearings, press conferences, speeches;
Professional and academic – e.g. conferences, symposia,
professional associations, academic papers, and interviews with
experts;
Other sources - e.g. Commercial satellite imagery, weblogs,
social networking on the internet, youtube videos.
4. 4
OSINT : The old way of seeing it
Seven major intelligence disciplines :
human intelligence,
imagery intelligence,
measurement and signature intelligence,
signals intelligence,
open-source intelligence,
technical intelligence,
counter-intelligence.
The Defense Technical Information Center (DTIC®)
5. 5
A better way of understanding OS
Signals Human Satellite …
OSINF Radio/TV… Interviews
with
experts…
Google
Earth or
commercial
satellites…
CLASINF Telephone,
radio
intercepts…
Under-cover
work…
Govern-
mental
satellites…
6. 6
This Presentation
What is OSINT
Why is OSINT important?
What objectives for the EUROSINT FORUM ?
Who is involved?
7. 7
Open Sources a Crucial Component
“Open sources often equal or surpass classified
information in monitoring and analyzing such
pressing problems as terrorism, proliferation, and
counterintelligence.”
CIA - « Studies in Intelligence » - Volume 49 - 2005
8. 8
Open Compared to Classified Sources
Open Classified
All public sources Secret sources
Can be wrong! Can also be wrong!
Easy to check sources Hard to check sources
A culture of sharing A culture of dividing
A culture of openness A culture of closed doors
The dominant force in
our society today
The dominant force in the
Cold War
9. 9
Understanding is power
“We have information coming out of our ears, but we
just cannot analyse it. Yet governments persist in
spending 95% of their budgets on collecting more
information rather than filtering and analysing it!”
A government official at the EUROSINT FORUM, 15/12/2006
10. 10
This Presentation
What is OSINT
Why is OSINT important?
What objectives for the EUROSINT FORUM ?
Who is involved?
11. 11
EUROSINT FORUM
The EUROSINT FORUM is a NOT FOR PROFIT association (ASBL
under Belgian law). Its only income are the joining fees of its members.
The FORUM does not undertake any kind of commercial work.
The EUROSINT FORUM aims to:
Facilitate the public-private dialogue in the area of Open Source
Intelligence (OSINT);
Promote thinking on the development of the European Union’s
policies, in particular in the use of OSINT in the field of security in its
broadest sense;
Gather private sector actors dealing with security and intelligence
issues in a European association which is thus able to talk with one
voice to the public authorities, as well as raising interest in the EU
institutions and Member States in joining reflection in the Forum;
Pool activities of research and development through networking
of clusters of actors at the EU level;
Encourage the creation of public-private partnerships, to create
European consortiums that can bring forward new projects.
12. 12
Activities
Larger conferences on broad OSINT themes, in
September 2006 and March 2007
Working groups focused on:
Technological Gaps
OSINT Training
Legal issues
Exchange of best practices (government only)
Consortia of some members on specific projects
Information on latest tools and methods with a
“speed dating” event planned for December 2007
13. 13
The Overarching Aim
To create a European « intelligence ecology »: a
Forum dedicated to provoking thought on OSINT and
its use in the intelligence and security spheres by
public and private organisations
14. 14
This Presentation
What is OSINT
Why is OSINT important?
What objectives for the EUROSINT FORUM?
Who is involved?
15. 15
Those who may wish to be involved
Users
of
Intelligence
Analysis
Providers of
Intelligence
Analysis
Providers of
Tools and
Methods
EUROSINT FORUM
16. 16
Some of our members
Associate Members from:
Interpol
Europol
Joint Research Centre
Joint Situation Centre
European Military Staff
EU Member State governments
Other European governments
….
Member organisations:
CEIS (FRA)
Parmenides Foundation (DEU)
Factiva (GBR)
Sail Labs (AUS)
Columbus Global Systems (IRL)
I2S (CZE)
Oxford Analytica (GBR)
WS Networks (BEL)
Jane’s (GBR)
Electricité de France (FRA)
Templeton Thorpe (GBR)
European Defence Agency
(EUR)
ISN/ETH-Zurich (CH)
17. 17
Contact Us
Please write to Caroline Calvez,
secretary of the EUROSINT FORUM:
Caroline.Calvez@eurosint.eu