Open Source Intelligence

Help companies & Law enforcement to build security programs based on OSINT activities like Critical Thinking with compact OSINT Investigations across Internet, Social Media Analytics and profiling the targets.

Open Source Intelligence

(OSINT)

OSINT (Open Source Intelligence) is a technology that refers to publicly available and open sources of information (as opposed to covert or secret sources) that are used in the intelligence community.
Information obtained from public and open sources is referred to as OSINT.
Public and non-classified sources provide a significant amount of actionable and predictable intelligence.
It means that the information gathered is accessible not only to the general public, but also to the intelligence community as a whole.

How It Works

“Officially, it is defined as any intelligence derived from publically accessible information that is collected, exploited, and distributed to an appropriate audience in a timely way for the goal of meeting a specific intelligence demand.”
It could be intelligence gleaned from international news broadcasts for the CIA.
For an attorney, this could mean data gathered from publicly available official government records.
For the most part, it’s content that’s freely available on the internet.”

Active reconnaissance, such as port monitoring, is not open-source intelligence.

Every organization has a lot of data on the internet:

Annual reports, contact information, website material, press releases, and other information will be shared as planned.

Unintentional sharing – hacked third-party website email addresses, employee social media content, website certificate details, internal server links, public forum data, document metadata, and more…

OSINT is a collective representation of this data that can be used both offensively and defensively.

Methodology for OSINT

An adversary would start with the small amount of information they have and work their way through the following steps:

Begin with what you already know (email, username, etc.)

Specify the needs (what you want to get)

Collect the information

Examine the information you’ve gathered.

As needed, pivot based on newly obtained data.

Confirm assumptions

The Techniques, Tactics, and Procedures (TTPs) that make-up OSINT in the MITRE PRE-ATT&CK Framework.