Open Source Intelligence

Open Source Intelligence

Update: 2024-07-22
Share

Description

If someone decided to dig into your life – perhaps even try to ‘dox’ you – how might they go about doing that? What could they find about you right now on the internet? You might be surprised at how much information is readily available from public sources, including your local government agencies and state databases. Today I’ll be talking with Jason Edison from Intel Techniques whose day job is using open source intelligence, or OSINT, to find suspected criminals and whose night job is helping people remove that same information to protect their privacy and even personal security.


Interview Notes



Further Info



Table of Contents


Use these timestamps to jump to a particular section of the show.



  • 0:00:41 : Interview setup

  • 0:02:34 : What do you do for your day job in law enforcement?

  • 0:05:17 : What is open source intelligence, exactly?

  • 0:08:41 : What are your primary sources for OSINT?

  • 0:12:01 : What is doxing and how might it impact someone?

  • 0:14:56 : How does an OSINT specialist also value personal privacy?

  • 0:22:36 : How do others in law enforcement view data collection and privacy?

  • 0:28:36 : When emotional cases arise, do officials favor privacy rights over catching bad guys?

  • 0:33:32 : How do we balance privacy rights vs public safety?

  • 0:39:19 : How would you do a full workup on someone?

  • 0:45:18 : Where do people overshare or give away the most personal information?

  • 0:52:31 : How much of my personal information is available via public records?

  • 0:56:43 : Will tooks like AI help us find the needles in the haystacks?

  • 1:00:56 : What about data deletion services – are they worth it?

  • 1:07:51 : How useful are email and phone aliases for privacy?

  • 1:11:17 : How do you prove your identity to deletion sites without giving more info?

  • 1:17:10 : What tools can I find at Intel Techniques?

  • 1:19:00 : My data deletion journey

Comments 
In Channel
Malware Reboot Remedy

Malware Reboot Remedy

2024-09-2301:02:42

Post-Quantum Crypto

Post-Quantum Crypto

2024-09-1601:08:27

The Truth is Out There

The Truth is Out There

2024-09-0901:14:03

Crazy Proton Summer

Crazy Proton Summer

2024-09-0201:16:33

National Public Data Breach

National Public Data Breach

2024-08-2601:21:49

Dating App Privacy

Dating App Privacy

2024-08-1901:00:56

Catch You on the BSide

Catch You on the BSide

2024-08-0501:14:41

Open Source Intelligence

Open Source Intelligence

2024-07-2201:21:54

How & Why to Block Ads

How & Why to Block Ads

2024-07-1501:18:19

Promising Privacy Tech

Promising Privacy Tech

2024-07-0801:11:12

Backing Up Other Data

Backing Up Other Data

2024-07-0101:19:54

Means of Control

Means of Control

2024-06-2401:12:35

Backup Your Cloud Data

Backup Your Cloud Data

2024-06-1701:06:11

Migrate to Mastodon

Migrate to Mastodon

2024-06-0301:05:28

Why Privacy Matters

Why Privacy Matters

2024-05-2701:07:42

How to Choose a PIN

How to Choose a PIN

2024-05-2001:11:05

loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Open Source Intelligence

Open Source Intelligence

Carey Parker