SlideShare a Scribd company logo
1 of 21
Download to read offline
Open Source Intelligence (OSINT)
for Emergency Services
& Missing People
Presented by: Robert Sell
robert.sell@tracelabs.org
1
2
Introductions
Founder/President of Trace Labs
• Over a decade in Search Rescue
• Team Leader
• Marine Rescue Technician
• Tracker
• Over two decades in Information Technology/Security
• CISSP, CISM certified
• Critical Incident Response Team/Operations
• Global teams
Email: robert.sell@tracelabs.org
Twitter: @robertesell
Search and Rescue Operations
National Missing Persons Hackathon
Australian News
3
Disclaimer
• None of the opinions or details presented here are in any way representative of any employers
(or any other entity I might participate in) from my past, present or future.
• All details presented here are for lawful use only.
• All information presented here is categorized as Public – TLP: White
• Only 30 minutes – Available to chat after on details of interest.
Terms
4
• Open Source Intelligence (OSINT): is the practice of collecting information from publicly available
sources (aka passive reconnaissance or zero touch recon).
• Capture the Flag (CTF): contests where hundreds of hackers and security professionals compete to
get the most “flags” for points through technical challenges. CTFs are typically hosted at large
information security conferences.
• Search & Rescue (SAR): First responders who act as an extension of paramedics once the subjects
are determined “off road” (aka back country). Tasked by law enforcement.
What is Trace Labs?
5
• Started in 2018, Trace Labs is a Not for Profit (NFP) organization.
• Mission is to crowd source the collection of Open Source Intelligence (OSINT) to aid in the
generation of new leads on missing persons cases.
• Trace Labs hosts Capture the Flag contests where hundreds of participants from around the
world perform OSINT on missing persons.
• These events generate huge amounts of data which is then refined into an actionable intelligence
report and given to the respective law enforcement agency to help locate those missing persons.
Existing CTF Environment
6
• There are hundreds of Information Security conferences around the world.
• Most of these events have a theoretical CTF with hundreds of contestants.
• All effort goes to waste once the event is over.
• Trace Labs allows the utilization of this effort to be captured for law enforcement.
• Non theoretical content is more realistic for contestants – higher value experience.
Trace Labs Beginnings
7
• Minimal viable product: limited prizes, rudimentary platform, untested at scale.
• First event on July, 2018 in Toronto, Canada at a hacker conference.
• 150 hackers / information security professionals showed up to participate.
• Toronto Police Services provided some cases.
• Results: 2 missing persons case reopened.
• Immediate demand from the industry for more.
• Proof of concept was a success.
Trace Labs Public Discovery
8
• In July, 2019 the media discovered Trace Labs.
• Free Think publishes YouTube video instantly climbs to 3 million hits. Now over 13 million.
• Interest in Trace Labs, crashed our website overnight.
• Interest by public and media continues.
• Community quickly grew to 20,000 members.
• Growth rate is approximately 15%/month.
https://youtu.be/2puBmXfi9Z0
Trace Labs Metrics
9
• 38 Search Party CTF events (Virtual & Onsite) from July 2018 – Present.
• 7,000+ Contestants have contributed OSINT to CTFs.
• 70,000+ unique OSINT submissions.
• 1,500+ Volunteer Judges have assisted with verification of OSINT.
• 360+ Missing Persons cases investigated.
• 25+ Law Enforcement Agencies assisted.
OSINT Search Party CTF
10
• Tickets for events sell out in a few hours through Eventbrite.
• Pre event training for both contestants and judges.
• Max 650 contestants.
• Teams of 1 to 4.
• 6 hour duration (flexible).
• Thousands of submissions.
• Real time leaderboard.
• Half time check in.
OSINT Search Party CTF
11
• Multiple categories ranging from easy to difficult with respective points.
• Volunteer judges verify team submissions in real time.
• 50 to 100 judges.
• Judges are trained prior.
• Open coms channels.
• Escalations.
• Quality control.
• System monitoring.
OSINT Search Party CTF
12
Category Examples
Friends Relevant friends, IDs, aliases, contact details and social media.
Employment Employer, details of employment, dates, IDs and social media.
Family Relevant family members, aliases, criminal activity and social media.
Home Address, landlord, risks in the immediate area, behaviors (ie couch surfing).
Basic Subject Info Name, alias, pictures, IDs, blog posts, dating profiles, craigslist, socials media.
Advanced Subject Info Unique identifiers (scars and tattoos), medical, hangouts, IP address, handles.
Day Last Seen Details or pictures on day last seen, intent, persons last seen with, direction.
Dark Web Any dark web activity. Often associated with human trafficking.
Location Relevant and timely information pertaining to current location.
Value Offering: Law Enforcement
13
• Provides a new scalable resource.
• Low risk, proven model (passive reconnaissance) to utilize convergent volunteers.
• Actionable intelligence report allows LEA to immediately know if new leads are available.
• If no new leads are found, verifies that everything that could be done, was done.
• Event provides LEA opportunity to learn OSINT and meet OSINT experts.
• Raises public awareness in the local community.
Value Offering: Community
14
• Low barriers to entry allow almost anyone to participate.
• Community rallies together for common goal of assisting law enforcement.
• Non theoretical means realistic experience for OSINT practitioners .
• Effort is directly helping local community, law enforcement and families of the missing persons.
• Supportive OSINT community for learning through mentoring.
15
Gamification
• Gamification allows long term sustainment of interest.
• Gamers will spend unlimited time in pursuit of next level.
• Shared achievements promote effort.
• Reward multiple priorities.
• Train the trainers.
• Collectors editions for special operations.
Success Stories: Case Study 1
16
• Subject: 35 year old male - Toronto, Canada – Missing over 2 years.
• Friend of subject posted a YouTube video with subject in it.
• Video shows subject getting into a truck. License plate is readable.
• Law enforcement ran the plate during the CTF and received an address.
• Dispatched to address and confirmed missing person was living there.
Success Stories: Case Study 2
17
• Subject: Teenage girl - Florida, USA – Missing 2 months.
• Username reuse allowed discovery of account on classifieds site.
• Selling her cat to move away from Florida. Account tracked to New York area.
• Posts looking for personal driver “risky work.”
• Hidden social media account owned by subject discovered. Posts 3 weeks after missing.
• Coordinates gathered from photos. Location narrowed to 5 mile radius.
Success Stories: Case Study 3
18
• Subject: 21 year old girl - California, USA – Missing 6 months.
• Amazon wish list discovered from username reuse.
• Items on Amazon wish list suggest involvement in adult entertainment industry.
• Username reuse also identifies profiles on adult services websites.
• Advertisements on site are recent and after she went missing.
• The site can offer law enforcement with email, IP address, Internet provider, etc.
Conclusion
19
Technology has allowed us to better utilize convergent volunteers (crowdsourcing) which
can allow very cost effective scaling on demand.
However, you must:
• Set delimitators on mission borders.
• Clearly articulate delimitators, in all communications.
• Utilize community to self govern.
• Utilize gamification to power the crowdsourcing engine.
Trace Labs is a minimal viable product that proves the model has high potential.
While our focus has been on missing persons, yours could be a different area of interest.
Partnering with Trace Labs
20
• Start with Introductory Meeting with us to discuss process.
• Submit cold cases (or recent) for our Global Search Party event.
• Provide us with a liaison who we will send the intelligence report.
• Provide us with feedback on how to increase value.
• Regional events available (i.e. Australian Hackathon).
• Contact: robert.sell@tracelabs.org
Questions
&
Answers
Email: robert.sell@tracelabs.org Twitter: @robertesell
21

More Related Content

What's hot

Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINTAdam Compton
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)festival ICT 2016
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesSyedAmoz
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodologybugcrowd
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019Priyanka Aash
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE - ATT&CKcon
 

What's hot (20)

Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
OSINT
OSINTOSINT
OSINT
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodology
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 

Similar to EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services & missing people

Proyecto Arachnid, una herramienta que ayuda a las víctimas a poner fin al ci...
Proyecto Arachnid, una herramienta que ayuda a las víctimas a poner fin al ci...Proyecto Arachnid, una herramienta que ayuda a las víctimas a poner fin al ci...
Proyecto Arachnid, una herramienta que ayuda a las víctimas a poner fin al ci...Red PaPaz
 
Intensive Engagement in Community Policing
Intensive Engagement  in Community PolicingIntensive Engagement  in Community Policing
Intensive Engagement in Community PolicingTim Curtis
 
London data and digital masterclass for councillors slides 14-Feb-20
London data and digital masterclass for councillors slides 14-Feb-20London data and digital masterclass for councillors slides 14-Feb-20
London data and digital masterclass for councillors slides 14-Feb-20LG Inform Plus
 
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapitolTechU
 
Presentation 4 consult, c insight and comm-safety
Presentation 4   consult, c insight and comm-safetyPresentation 4   consult, c insight and comm-safety
Presentation 4 consult, c insight and comm-safetyCambridgeshireInsight
 
Datascienceforsocialgood humantrafficking-161019202803
Datascienceforsocialgood humantrafficking-161019202803Datascienceforsocialgood humantrafficking-161019202803
Datascienceforsocialgood humantrafficking-161019202803Jessica Blain-Lewis
 
Using Data Science for Social Good: Fighting Human Trafficking
Using Data Science for Social Good: Fighting Human TraffickingUsing Data Science for Social Good: Fighting Human Trafficking
Using Data Science for Social Good: Fighting Human TraffickingAnidata
 
You, online: Identity, Privacy, and the Future
You, online: Identity, Privacy, and the FutureYou, online: Identity, Privacy, and the Future
You, online: Identity, Privacy, and the FutureAbhay Agarwal
 
Cyber crime Introduction
Cyber crime Introduction Cyber crime Introduction
Cyber crime Introduction Vinil Patel
 
How to Succeed at Jobs That Don't Exist Yet (Workshop at Queens College-9/26/18)
How to Succeed at Jobs That Don't Exist Yet (Workshop at Queens College-9/26/18)How to Succeed at Jobs That Don't Exist Yet (Workshop at Queens College-9/26/18)
How to Succeed at Jobs That Don't Exist Yet (Workshop at Queens College-9/26/18)Christopher Bishop
 
ILG CERT Presentation Final
ILG CERT Presentation FinalILG CERT Presentation Final
ILG CERT Presentation FinalJon Praed
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Pecha kucha presentation
Pecha kucha presentationPecha kucha presentation
Pecha kucha presentationsharnsays
 

Similar to EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services & missing people (20)

Proyecto Arachnid, una herramienta que ayuda a las víctimas a poner fin al ci...
Proyecto Arachnid, una herramienta que ayuda a las víctimas a poner fin al ci...Proyecto Arachnid, una herramienta que ayuda a las víctimas a poner fin al ci...
Proyecto Arachnid, una herramienta que ayuda a las víctimas a poner fin al ci...
 
Safe Shelter Collaborative: Overview
Safe Shelter Collaborative:  OverviewSafe Shelter Collaborative:  Overview
Safe Shelter Collaborative: Overview
 
Safe Shelter Collaborative: Update.
Safe Shelter Collaborative: Update. Safe Shelter Collaborative: Update.
Safe Shelter Collaborative: Update.
 
2004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-12004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-1
 
Intensive Engagement in Community Policing
Intensive Engagement  in Community PolicingIntensive Engagement  in Community Policing
Intensive Engagement in Community Policing
 
London data and digital masterclass for councillors slides 14-Feb-20
London data and digital masterclass for councillors slides 14-Feb-20London data and digital masterclass for councillors slides 14-Feb-20
London data and digital masterclass for councillors slides 14-Feb-20
 
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
 
Presentation 4 consult, c insight and comm-safety
Presentation 4   consult, c insight and comm-safetyPresentation 4   consult, c insight and comm-safety
Presentation 4 consult, c insight and comm-safety
 
Datascienceforsocialgood humantrafficking-161019202803
Datascienceforsocialgood humantrafficking-161019202803Datascienceforsocialgood humantrafficking-161019202803
Datascienceforsocialgood humantrafficking-161019202803
 
Using Data Science for Social Good: Fighting Human Trafficking
Using Data Science for Social Good: Fighting Human TraffickingUsing Data Science for Social Good: Fighting Human Trafficking
Using Data Science for Social Good: Fighting Human Trafficking
 
You, online: Identity, Privacy, and the Future
You, online: Identity, Privacy, and the FutureYou, online: Identity, Privacy, and the Future
You, online: Identity, Privacy, and the Future
 
Cyber crime Introduction
Cyber crime Introduction Cyber crime Introduction
Cyber crime Introduction
 
Haddonfield Civic Association Neighborhood Watch
Haddonfield Civic Association Neighborhood WatchHaddonfield Civic Association Neighborhood Watch
Haddonfield Civic Association Neighborhood Watch
 
Haddonfield Civic Association Neighborhood Watch
Haddonfield Civic Association Neighborhood WatchHaddonfield Civic Association Neighborhood Watch
Haddonfield Civic Association Neighborhood Watch
 
How to Succeed at Jobs That Don't Exist Yet (Workshop at Queens College-9/26/18)
How to Succeed at Jobs That Don't Exist Yet (Workshop at Queens College-9/26/18)How to Succeed at Jobs That Don't Exist Yet (Workshop at Queens College-9/26/18)
How to Succeed at Jobs That Don't Exist Yet (Workshop at Queens College-9/26/18)
 
ILG CERT Presentation Final
ILG CERT Presentation FinalILG CERT Presentation Final
ILG CERT Presentation Final
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
2007 open everything at gnomedex 4.4
2007 open everything at gnomedex 4.42007 open everything at gnomedex 4.4
2007 open everything at gnomedex 4.4
 
Pecha kucha presentation
Pecha kucha presentationPecha kucha presentation
Pecha kucha presentation
 

More from EENA (European Emergency Number Association)

More from EENA (European Emergency Number Association) (20)

EENA 2021: Industry session - Drones in emergencies (2/3)
EENA 2021: Industry session - Drones in emergencies (2/3) EENA 2021: Industry session - Drones in emergencies (2/3)
EENA 2021: Industry session - Drones in emergencies (2/3)
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
 
EENA 2021: Keynote - The European legislative framework on emergency communic...
EENA 2021: Keynote - The European legislative framework on emergency communic...EENA 2021: Keynote - The European legislative framework on emergency communic...
EENA 2021: Keynote - The European legislative framework on emergency communic...
 
EENA 2021: Keynote - Maintaining physical and mental capacity to perform duti...
EENA 2021: Keynote - Maintaining physical and mental capacity to perform duti...EENA 2021: Keynote - Maintaining physical and mental capacity to perform duti...
EENA 2021: Keynote - Maintaining physical and mental capacity to perform duti...
 
EENA 2021: Keynote – Cybersecurity
EENA 2021: Keynote – CybersecurityEENA 2021: Keynote – Cybersecurity
EENA 2021: Keynote – Cybersecurity
 
EENA 2021: Staff retention in PSAPs (1/3)
EENA 2021: Staff retention in PSAPs (1/3)EENA 2021: Staff retention in PSAPs (1/3)
EENA 2021: Staff retention in PSAPs (1/3)
 
EENA 2021: Staff retention in PSAPs (2/3)
EENA 2021: Staff retention in PSAPs (2/3)EENA 2021: Staff retention in PSAPs (2/3)
EENA 2021: Staff retention in PSAPs (2/3)
 
EENA 2021: Remote call-taking (3/3)
EENA 2021: Remote call-taking (3/3) EENA 2021: Remote call-taking (3/3)
EENA 2021: Remote call-taking (3/3)
 
EENA 2021: Remote call-taking (1/3)
EENA 2021: Remote call-taking (1/3)EENA 2021: Remote call-taking (1/3)
EENA 2021: Remote call-taking (1/3)
 
EENA 2021: Remote call-taking (2/3)
EENA 2021: Remote call-taking (2/3)EENA 2021: Remote call-taking (2/3)
EENA 2021: Remote call-taking (2/3)
 
EENA 2021: Industry session - Public Warning Solutions by Genasys (2/5)
EENA 2021: Industry session - Public Warning Solutions by Genasys (2/5)EENA 2021: Industry session - Public Warning Solutions by Genasys (2/5)
EENA 2021: Industry session - Public Warning Solutions by Genasys (2/5)
 
EENA 2021: Industry session - Public Warning Solutions by Celltick (3/5)
EENA 2021: Industry session - Public Warning Solutions by Celltick (3/5)EENA 2021: Industry session - Public Warning Solutions by Celltick (3/5)
EENA 2021: Industry session - Public Warning Solutions by Celltick (3/5)
 
EENA 2021: Industry session - Public Warning Solutions by Everbridge & one2ma...
EENA 2021: Industry session - Public Warning Solutions by Everbridge & one2ma...EENA 2021: Industry session - Public Warning Solutions by Everbridge & one2ma...
EENA 2021: Industry session - Public Warning Solutions by Everbridge & one2ma...
 
EENA 2021: Industry session - Public Warning Solutions by Frequentis (5/5)
EENA 2021: Industry session - Public Warning Solutions by Frequentis (5/5) EENA 2021: Industry session - Public Warning Solutions by Frequentis (5/5)
EENA 2021: Industry session - Public Warning Solutions by Frequentis (5/5)
 
EENA 2021: Industry session - Public Warning Solutions by F24 (4/5)
EENA 2021: Industry session - Public Warning Solutions by F24 (4/5)EENA 2021: Industry session - Public Warning Solutions by F24 (4/5)
EENA 2021: Industry session - Public Warning Solutions by F24 (4/5)
 
EENA 2021: Non-emergency numbers (4/4)
EENA 2021: Non-emergency numbers (4/4)EENA 2021: Non-emergency numbers (4/4)
EENA 2021: Non-emergency numbers (4/4)
 
EENA 2021: Non-emergency numbers (3/4)
EENA 2021: Non-emergency numbers (3/4)EENA 2021: Non-emergency numbers (3/4)
EENA 2021: Non-emergency numbers (3/4)
 
EENA 2021: Non-emergency numbers (2/4)
EENA 2021: Non-emergency numbers (2/4)EENA 2021: Non-emergency numbers (2/4)
EENA 2021: Non-emergency numbers (2/4)
 
EENA 2021: Non-emergency numbers (1/4)
EENA 2021: Non-emergency numbers (1/4)EENA 2021: Non-emergency numbers (1/4)
EENA 2021: Non-emergency numbers (1/4)
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services & missing people

  • 1. Open Source Intelligence (OSINT) for Emergency Services & Missing People Presented by: Robert Sell robert.sell@tracelabs.org 1
  • 2. 2 Introductions Founder/President of Trace Labs • Over a decade in Search Rescue • Team Leader • Marine Rescue Technician • Tracker • Over two decades in Information Technology/Security • CISSP, CISM certified • Critical Incident Response Team/Operations • Global teams Email: robert.sell@tracelabs.org Twitter: @robertesell Search and Rescue Operations National Missing Persons Hackathon Australian News
  • 3. 3 Disclaimer • None of the opinions or details presented here are in any way representative of any employers (or any other entity I might participate in) from my past, present or future. • All details presented here are for lawful use only. • All information presented here is categorized as Public – TLP: White • Only 30 minutes – Available to chat after on details of interest.
  • 4. Terms 4 • Open Source Intelligence (OSINT): is the practice of collecting information from publicly available sources (aka passive reconnaissance or zero touch recon). • Capture the Flag (CTF): contests where hundreds of hackers and security professionals compete to get the most “flags” for points through technical challenges. CTFs are typically hosted at large information security conferences. • Search & Rescue (SAR): First responders who act as an extension of paramedics once the subjects are determined “off road” (aka back country). Tasked by law enforcement.
  • 5. What is Trace Labs? 5 • Started in 2018, Trace Labs is a Not for Profit (NFP) organization. • Mission is to crowd source the collection of Open Source Intelligence (OSINT) to aid in the generation of new leads on missing persons cases. • Trace Labs hosts Capture the Flag contests where hundreds of participants from around the world perform OSINT on missing persons. • These events generate huge amounts of data which is then refined into an actionable intelligence report and given to the respective law enforcement agency to help locate those missing persons.
  • 6. Existing CTF Environment 6 • There are hundreds of Information Security conferences around the world. • Most of these events have a theoretical CTF with hundreds of contestants. • All effort goes to waste once the event is over. • Trace Labs allows the utilization of this effort to be captured for law enforcement. • Non theoretical content is more realistic for contestants – higher value experience.
  • 7. Trace Labs Beginnings 7 • Minimal viable product: limited prizes, rudimentary platform, untested at scale. • First event on July, 2018 in Toronto, Canada at a hacker conference. • 150 hackers / information security professionals showed up to participate. • Toronto Police Services provided some cases. • Results: 2 missing persons case reopened. • Immediate demand from the industry for more. • Proof of concept was a success.
  • 8. Trace Labs Public Discovery 8 • In July, 2019 the media discovered Trace Labs. • Free Think publishes YouTube video instantly climbs to 3 million hits. Now over 13 million. • Interest in Trace Labs, crashed our website overnight. • Interest by public and media continues. • Community quickly grew to 20,000 members. • Growth rate is approximately 15%/month. https://youtu.be/2puBmXfi9Z0
  • 9. Trace Labs Metrics 9 • 38 Search Party CTF events (Virtual & Onsite) from July 2018 – Present. • 7,000+ Contestants have contributed OSINT to CTFs. • 70,000+ unique OSINT submissions. • 1,500+ Volunteer Judges have assisted with verification of OSINT. • 360+ Missing Persons cases investigated. • 25+ Law Enforcement Agencies assisted.
  • 10. OSINT Search Party CTF 10 • Tickets for events sell out in a few hours through Eventbrite. • Pre event training for both contestants and judges. • Max 650 contestants. • Teams of 1 to 4. • 6 hour duration (flexible). • Thousands of submissions. • Real time leaderboard. • Half time check in.
  • 11. OSINT Search Party CTF 11 • Multiple categories ranging from easy to difficult with respective points. • Volunteer judges verify team submissions in real time. • 50 to 100 judges. • Judges are trained prior. • Open coms channels. • Escalations. • Quality control. • System monitoring.
  • 12. OSINT Search Party CTF 12 Category Examples Friends Relevant friends, IDs, aliases, contact details and social media. Employment Employer, details of employment, dates, IDs and social media. Family Relevant family members, aliases, criminal activity and social media. Home Address, landlord, risks in the immediate area, behaviors (ie couch surfing). Basic Subject Info Name, alias, pictures, IDs, blog posts, dating profiles, craigslist, socials media. Advanced Subject Info Unique identifiers (scars and tattoos), medical, hangouts, IP address, handles. Day Last Seen Details or pictures on day last seen, intent, persons last seen with, direction. Dark Web Any dark web activity. Often associated with human trafficking. Location Relevant and timely information pertaining to current location.
  • 13. Value Offering: Law Enforcement 13 • Provides a new scalable resource. • Low risk, proven model (passive reconnaissance) to utilize convergent volunteers. • Actionable intelligence report allows LEA to immediately know if new leads are available. • If no new leads are found, verifies that everything that could be done, was done. • Event provides LEA opportunity to learn OSINT and meet OSINT experts. • Raises public awareness in the local community.
  • 14. Value Offering: Community 14 • Low barriers to entry allow almost anyone to participate. • Community rallies together for common goal of assisting law enforcement. • Non theoretical means realistic experience for OSINT practitioners . • Effort is directly helping local community, law enforcement and families of the missing persons. • Supportive OSINT community for learning through mentoring.
  • 15. 15 Gamification • Gamification allows long term sustainment of interest. • Gamers will spend unlimited time in pursuit of next level. • Shared achievements promote effort. • Reward multiple priorities. • Train the trainers. • Collectors editions for special operations.
  • 16. Success Stories: Case Study 1 16 • Subject: 35 year old male - Toronto, Canada – Missing over 2 years. • Friend of subject posted a YouTube video with subject in it. • Video shows subject getting into a truck. License plate is readable. • Law enforcement ran the plate during the CTF and received an address. • Dispatched to address and confirmed missing person was living there.
  • 17. Success Stories: Case Study 2 17 • Subject: Teenage girl - Florida, USA – Missing 2 months. • Username reuse allowed discovery of account on classifieds site. • Selling her cat to move away from Florida. Account tracked to New York area. • Posts looking for personal driver “risky work.” • Hidden social media account owned by subject discovered. Posts 3 weeks after missing. • Coordinates gathered from photos. Location narrowed to 5 mile radius.
  • 18. Success Stories: Case Study 3 18 • Subject: 21 year old girl - California, USA – Missing 6 months. • Amazon wish list discovered from username reuse. • Items on Amazon wish list suggest involvement in adult entertainment industry. • Username reuse also identifies profiles on adult services websites. • Advertisements on site are recent and after she went missing. • The site can offer law enforcement with email, IP address, Internet provider, etc.
  • 19. Conclusion 19 Technology has allowed us to better utilize convergent volunteers (crowdsourcing) which can allow very cost effective scaling on demand. However, you must: • Set delimitators on mission borders. • Clearly articulate delimitators, in all communications. • Utilize community to self govern. • Utilize gamification to power the crowdsourcing engine. Trace Labs is a minimal viable product that proves the model has high potential. While our focus has been on missing persons, yours could be a different area of interest.
  • 20. Partnering with Trace Labs 20 • Start with Introductory Meeting with us to discuss process. • Submit cold cases (or recent) for our Global Search Party event. • Provide us with a liaison who we will send the intelligence report. • Provide us with feedback on how to increase value. • Regional events available (i.e. Australian Hackathon). • Contact: robert.sell@tracelabs.org