Nick Hardinges from the Reuters fact-checking team joins the podcast to walk us through how to go about debunking information online, from deciding what’s worth covering to why grainy images should make you skeptical. Ultimately, fact-checking takes time, persistence and a healthy dose of intrigue. Key takeawaysKnow these telltale signs of doctored contentCheck your sourcesDo some digging on what you seeAbout NickNick Hardinges is a former digital news editor and current fact-checker for Reuters, whose job is to find harmful, widely circulating and topical misinformation, and then address those claims in articles directly responding to the claims being made. Nick’s main focus is on setting the record straight on social media but to sometimes address claims from elsewhere, such as outright lies in politics, or damaging conclusions reached in unscientific ‘research’ papers.Where to find Nick@NickHardingesFIFA COVID misinformation storySpotting the difference between legitimate videos and satire
Jacob Lloyd, head of investigations at Animal Welfare Investigations Project, has been putting OSINT skills to use to stop organized animal crime — dogfights, puppy mills, badger baiting and more. Jacob discusses how these crimes are often neglected by law enforcement due to lack of training and are thus dealt with reactively. He explains how to leverage pedigree sites, social media and other online sources to proactively investigate animal crime and save animals from this horrible fate. Key takeawaysWhat pedigree sites can tell you about fighting dogs and their ownersHow prevalent information on organized animal crime is on the surface webHow to get involved with Animal Welfare Investigations Project
From influence operations and Telegram to using marketing tools for OSINT insights, our guest gives pro tips on OSINT and cyber investigations for professional practitioners.Key takeawaysDigital forensics incident responseCyberthreat and OSINT crossoverMarketing tools for OSINT
In this episode, we sit down with cyber threat analyst and SANS OSINT instructor, Steven Harris. Steven discusses how Telegram is a must-use channel for investigating the war in Ukraine, and why cyber threat actors are flocking to the app.Key TakeawaysSOCMINT from law enforcement to cyber threatsInvestigating on TelegramWhy Telegram allows cyber threat actors a lower barrier to entry
Alex Lozano of Cybergy joins us to discuss how he uses OSINT and social media to protect executive clients, resources for his cyber students at University of Barcelona and the best tools for real-time monitoring.Key takeawaysHow to use OSINT for executive protectionResources for students and OSINT newbiesTools for real-time monitoring
Language can limit or expand your worldview. That’s important to remember in OSINT where what you’re able to find and analyze can greatly affect the intelligence you build. Skip Schiphorst, OSINT instructor at i-Intelligence, shares his expertise on why even baseline knowledge of a foreign language is important in a world flush with translation services; how foreign language content can counteract bias; and tips for verifying automated translations.Key takeawaysYou can find a lot more online than you may think by using foreign languages — even those using non-Latin charactersYou don’t need to be a ninja with years of training to find foreign content online, or outsource everything to language expertsKnow the basics of OSINT, be critical and be patient when searching online in a foreign language
MJ Banias discusses how one man’s late-night OpSec fail is an OSINTer’s treasure. If that’s too salacious for you, we also talk about how awesome newspaper archives and librarians are.Key takeawaysPut yourself in your targets shoes to understand what sites could give you your next selectorThe sites and services every OSINTer should subscribe toHow overcoming a millennial’s worst nightmare could be the break you need
Journalists, academics and NGOs face unprecedented levels of threats in real life and in the digital world. With limited resources, they often lack secure methods to collect OSINT. That’s why a digital investigations platform is being offered pro bono as part of a larger CISA initiative. Key takeawaysNew threats in the digital landscapeThe risks for journalists, NGOs and academics collecting OSINTHow digital investigative teams can protect themselves
An analysts from DarkOwl joins us to discuss dark web research and all its facets. From AI and other trends on the dark web, to operational security, learn how to turn on the light beneath the surface of the internet.Key takeawaysAI and other dark web trendsOperational security in dark web researchHow to search an unindexed environment
How can I get in? Steve Stasiukonis knows the power OSINT brings to this crucial pen testing question. From uncovering who to pose as, what to wear and how to forge a badge, OSINT can be the key you need to unlock a client's physical security. Steve also discusses the gold mine OSINT brings to cyber pen tests and what CTI pros need to know before going on the dark web.Key takeawaysHow OSINT is used in pen testingDark web OPSEC considerationsHow Steve easily broke into banks (for good!)
We go behind the scenes with Jon DiMaggio of Ransomware Diaries. As the chief security strategist at Analyst 1, Jon has conducted in-depth investigations of ransomware groups, including the famed Lockbit gang. He tells us the open-source tactics he uses and how cyber threats can take a mental toll.Key takeawaysTracking the Lockbit storyWhere OSINT meets ransomware investigationsThe human element in threat detection
Bullsh*t Hunting creators Justin Seitz and Some Lawyer share their tips on how OSINT and legal investigation tactics can benefit one another. They talk about their series “The Hunt” as it examines suspicious legal proceedings and possible wrongful convictions. Plus we dive deep into public records requests with tips of how to get the information you need.Key TakeawaysHow to effectively submit a public records requestWhat OSINTers can learn from legal professionals and vice versaThink like a lawyer when searching legal databases
Cybersecurity is rife with technological solutions, but as security researcher John Hammond knows all too well, it’s people that make the difference. Hear how people make or break security intel, both as researchers and threat actors. We’ll talk sock puppets, the role of OSINT for your own OPSEC and intelligence building, cybergang leaders as businessmen and more. Plus we’ll dive into John’s recent OSINT work on the ScreenConnect vulnerabilities and how they’re being leveraged in the wild.Key takeawaysUsing OSINT for opsec to protect your identity and enhance security intelligenceLurking in dark web forums, sock puppets and engaging with threat actorsThe role OSINT played in dissecting ScreenConnect vulnerabilities and exploits in the wild
Do you wish you had more training opportunities or just chances to flex your OSINT skills? We’re hosting a big event this month where we’ll talk ways to level up your tradecraft, training opportunities, take-home tips and more.
There are many paths to OSINT — one of them is through training programs and online resources! Aubrey and Shannon break down what’s available, what’s free (or not) to keep you abreast of how you can gain and further your OSINT skills.
Propublica reporter and author of the Digital Investigations newsletter, Craig Silverman joins the podcast to discuss disinformation trends on social media platforms, elections around the world in 2024 and what journalists and OSINT investigators can learn from each other.Key takeawaysOSINT for investigative journalismDisinformation trends on social mediaDocumenting evidence during an investigation
DefCon speaker and host of DoingFedTime on YouTube, Sam Bent joins the podcast to shine light on operational security concerns on the dark web. The reformed darknet marketplace seller shares insights and advice for best practices when investigating on the dark web. Key takeaways:OPSEC on the dark webThe different darknetsLinguistic analysis in evidence gathering
Ritu Gill, or @OSINTtechniques as she’s known online, joins the podcast to give tips for social media intelligence gathering. What are the little-known platforms to look at and how do you gather safely? Tune in to hear the tips.Key takeawaysOverlooked social media platforms for evidence gatheringOPSEC for law enforcementTips for beginning OSINT practitioners
The chief investigations officer of the National Child Protection Task Force shares the tools and methods he trains law enforcement on, how he protects his mental health in a such a devastating field and the latest platforms and technology to stay on top of.Key takeawaysOSINT for child protectionThe importance of mental healthWhat law enforcement need to know about trafficking
Jessica Smith, president and founder of ClickSafe intelligence and special investigations lead with the National Child Protection Task Force, joins the podcast to dispel misconceptions about child protection. From who is being targeted to where and how, Jessica Smith shares how misinformation about child exploitation can derail investigations, and how OSINT helps pave the way for child protection.Key takeawaysMisinformation around child protection can adversely affect investigationsHow OSINT plays a role in helping victimsThe new platforms where kids are targetedTips for vigilance and education