Intelligence

The Versatility of Protective Intelligence

This Guest Blog was originally produced by Ontic Technologies, a protective intelligence software firm.  Learn more about Ontic Technologies and their protective intelligence solutions at Ontic.ai. +++++++++++++++++++++++++++++++++++++++++++++++++++++ The concept of “protective intelligence” was originally founded on the assumption that those actors that attempt to harm public figures share a common behavior & way of thinking. Additionally,…

Read More

Russian Surveillance is Nothing New

Russian surveillance is nothing new.  Back in 1945, the Russians gave U.S. Ambassador Harriman a gift of a wall plaque that years later was revealed to be bugged. (Link here to that story.) The desire to have current, usable intelligence is a powerful motivator.  It’s surely no surprise that power-hungry states with the means and…

Read More

Offensive OSINT: Exploiting Social Media

A NATO affiliated research group published a report this week showing results of a test they conducted using OSINT.  They wanted to see how much they could influence real world NATO soldiers via social media manipulation. The three main questions the researchers posed were: (1) What can be found out about a military exercise through…

Read More

Updating OSINT Cycles

In the wake of the information explosion and the dramatic changes in open-source intelligence we’ve experienced over the last decades, the traditional intelligence cycle used in OSINT is no longer adequate, some would say.  Here are some of the issues: Information consumers are now also information producers, posting, blogging and tweeting with abandon.  It’s worth…

Read More

The Power of OSINT

Last Saturday, a devastating terrorist attack led to multiple casualties during a hate crime against a Pittsburgh synagogue.  The man Robert Bowers, aged 46, accused of committing the attack had posted an online message on a social platform called Gab in which he announced his intention to attack. His Gab account showed that he had…

Read More

The Red Sea Diving Resort

Tales of crazy covert spy operations make great memoirs.  Ex-Mossad agent Gad Shimron tells such a story about Operation Brothers, a mission that took place in the 1980s to extricate starving Ethiopian Jews from Sudan, a Muslim state.  Hollywood has jumped on the bandwagon; a movie based on the operation and starring Chris Evans will…

Read More

Reality is Stranger than Fiction

Reality Winner who worked for Pluribus International at their offices in Georgia was arrested this week under the Espionage Act for sending a classified document to Intercept, a publication first created in 2014 as a platform to report on documents released by Edward Snowden.  Ms. Winner faces one count of “gathering, transmitting or losing defense…

Read More

The Method to the Madness of Criminal Intent

Late in the summer of 2015, open source news reporting indicated that Chinese hackers may have been to blame for the breach of information at USIS, which is the major U.S. contractor for security background investigations for the U.S. Government. Initial estimates indicate that the cyber security hacking included more than 25,000 private records. Investigators…

Read More

Unconventional Crime Indicators

How can we evaluate whether or not a given area – perhaps a business or leisure travel destination – has a high or low risk for crime? It’s an important thing to know in order to prepare against potential threats.   In the U.S., crime statistics are readily and easily available online. But outside of…

Read More

Mommy Spies

The newest James Bond movie Spectre is due out this week. In the Bond series, female characters most often play the part of a villain or a love interest to 007, (or both). And while Judy Dench played “M” in the previous four Bond movies, there have been few if any ladies amongst the 00…

Read More