Category Archives: Blog

Using Open Source Intelligence (OSINT) to show how IAF’s Abhinandan shot down a Pakistani F-16

for  The Print

New Delhi: After the Indian Air Force strike on a Jaish-e-Mohammed terrorist camp in Pakistan on 26 February, followed by the high voltage aerial skirmish the next day between the rival air forces, the widespread din — created from manufactured lies, deceit and a misinformation campaign by the Pakistan Army’s infamous Inter-Services Public Relations (ISPR) — to deny and cover-up tactical shortcomings of the Pakistan Air Force and the shooting down of the PAF aircraft — has pro-actively blurred the truth.

The first casualty of war is always the truth! Somewhere in between this subterfuge is a PAF pilot and an aircraft tail number — shot down in heady combat by an IAF MiG-21, before the MiG itself fell victim to an air-to-air missile fired by the PAF.

(more…)

3 Ways Criminals Can Get Your Data

3 Ways Criminals Can Get Your Data

3 Ways Criminals Can Get Your Data

When we hear social engineering, we immediately think phishing. Those of us in the industry may also think about vishing, dumpster diving, or the SECTF held at DEFCON and DerbyCon. Whether you are technically inclined or not, you are probably familiar with the “Nigerian Prince” or “419” schemes. You have probably received a convincing or near-convincing phishing email claiming to be “Delta” or “App1e” or “Amazon.” This article aims to educate you about other social engineering attack vectors.

(more…)

Influencer Accounts Being Stolen

Hackers are Stealing Top Instagram Accounts

By: Taylor Lorenz, The Atlantic

In early October, a publicist received an irresistible message via email. The publicist’s client is a top “influencer”—someone who leverages a social-media following to exert influence and, usually, make money, often by selling sponsored posts. “We would be extremely interested in a business partnership,” a man calling himself “Joshua Brooks,” wrote. His pitch was eye-popping: He was offering “80 Thousand US Dollars” for a single picture. Yes, Influencer Accounts Being Stolen by Hackers.

(more…)

Stealing Social Media

A look at how it can happen.

Some employees have direct access to the corporate social media platforms, giving them the power to rename social media channels or post whatever they like. Say a former employee moves to competitive business, changes the name of the original social media channel, and immediately starts contacting the fans and followers on behalf of the new company. This happens all the time. It’s called Stealing Social Media.

The need for good contracts and agreements between employers and employees when it comes to social media is paramount. In addition, systems need to be in place to prevent this from happening.

This includes securing all passwords and changing them immediately prior to terminating an employee with passwords, as well as a strict copyright and ownership clause in the contract.

Analysts need to erase their digital footprints

When we talk about the work of gathering intelligence, most people conjure the image of a James Bond-esque spy, infiltrating an enemy organization under an assumed identity. But there’s another kind of intelligence gathering, just as important to commercial, military, diplomatic and political operations: open-source intelligence, or OSINT for short. OSINT is gathered from publicly available information sources like the news, government documents, and social media reports, among others. But in order to be effective, OSINT analysts have to be just as careful about concealing their online identities as clandestine operatives.

Online surveillance is just as prevalent and often more subtle than real-world surveillance. If the OSINT analyst doesn’t cover their tracks, it’s fairly easy for someone with the resources of a nation’s intelligence agency, or even a large corporation, to track down the identity of that analyst as they dig for information. The analyst must wipe away their digital fingerprints, so to speak.

(more…)

Navigating Social Media After a Catastrophe

After the attacks on London bridge, Londoners rallied on Twitter using the hashtag #SofaForLondon, offering their sofas, and spare rooms to residents without homes.

During Hurricane Harvey, hashtags like #sosHarvey were used to call for civilian helpers when phone lines were down.

The world turned to social media to grieve, lend a hand and show support.

As a business owner, how should you post following a calamity? A genuine express for sympathy for those affected by the tragedy is one thing, but you do not want to be viewed as yet another company joining in just to improve one’s corporate image.

(more…)

Even the royals need social media intelligence

Duchess of Sussex Meghan Markle has been taking heat through social media since her relationship with Prince Harry went public in 2016. Things were so bad that the prince ended up issuing an official statement condemning the “wave of abuse and harassment” she experienced.

Markle apparently isn’t the only member of the Royal Family who gets hounded by trolls online, either. Duchess of Cambridge Kate Middleton is also a target for trolls.

The strange thing is neither of them even use a personal social media account. Instead, they share updates through official royal platforms that have millions of followers.

(more…)

The Fight that is Waging in Social Media

The importance of social media intelligence doesn’t lie in the business world only, the government deployed a new division in the fight that is waging in Social Media.

“We need to develop our asymmetric edge and bring focus to the orchestration of intelligence, information operations, cyber, electronic warfare and unconventional warfare,” Lieutenant General Ivan Jones, the commander of Britain’s field army, said as he announced the formation of a cyber warfare unit to fight “above and below the threshold of conventional conflict.”

(more…)

1 2
  • Sign up
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
We do not share your personal details with anyone.