Category Archives: Blog

EAG Update: More OSINT Training and Tools Launching in 2020

OSINT Training and Tools Launching in 2020

With over 20 years in the Open Source Intelligence (OSINT) field of expertise, we’ve quite literally witnessed the industry explode right before our eyes over the past decade. Of course, when we launched Echo Analytics Group in June of 2014, we never would have imagined our business would be growing this fast. With that said, we have exciting news to share and we wanted to give you an update as we build more OSINT training and tools launching in 2020.

(more…)

Why did a state plane fly to New Mexico and back?

Why did a state plane fly to New Mexico and back?

A LearJet owned by the Kentucky State Police flew to Albuquerque on Sunday, stayed for a little over an hour, then flew back to Lexington. Why?

For some time, news organizations across the state have been asking the Bevin administration to account for the use of state aircraft to fly the governor around the country. To this point, the administration has refused to explain any trips that are not official state business, even though anyone with a web browser can find them.

(more…)

Power of Word of Mouth

The Power of Word of Mouth and Social Risk

Online Word Of Mouth is powerful! I don’t think anyone would dispute that fact but just to back it up here are some recent statistics.

  • 50% of Americans would pick the word of mouth if they had to pick one source of information [Chatter Matters Report]
  • 72% of people get news from friends and family, making word-of-mouth the most popular channel for sharing [Pew Research]
  • Building an online community is most important to brand awareness and word of mouth referrals, with average rankings of 8.87 and 8.52 on a 10 point scale, according to marketers.[Referral Rock]
  • 72% of people say that they most trust content that they get from family or friends.[Statistia]

(more…)

Social Media Could Ruin Business

How social media could ruin your business

How social media could ruin your business

Whether it comes from hackers, disgruntled customers, or is simply a backlash against something you post, negative social media content can destroy trust in your brand in a matter of minutes.

“Social media is the most immediate threat to your company’s reputation,” says Pete Knott, digital consultant at reputation management consultancy Lansons.

“If not taken seriously it can and will directly impact your company financially and culturally.”

Fake news remains one of the biggest challenges – despite machine learning crackdowns by networks such as Facebook and Twitter.

In May, for example, shares in the UK’s Metro Bank plunged 11% before it could shake off inaccurate social media rumors that it was facing financial difficulties.

And according to Ilia Kolochenko of Geneva-based internet security company Immuniweb, the consequences could potentially be much worse.

 

(more…)

Using Open Source Intelligence (OSINT) to show how IAF’s Abhinandan shot down a Pakistani F-16

for  The Print

New Delhi: After the Indian Air Force strike on a Jaish-e-Mohammed terrorist camp in Pakistan on 26 February, followed by the high voltage aerial skirmish the next day between the rival air forces, the widespread din — created from manufactured lies, deceit and a misinformation campaign by the Pakistan Army’s infamous Inter-Services Public Relations (ISPR) — to deny and cover-up tactical shortcomings of the Pakistan Air Force and the shooting down of the PAF aircraft — has pro-actively blurred the truth.

The first casualty of war is always the truth! Somewhere in between this subterfuge is a PAF pilot and an aircraft tail number — shot down in heady combat by an IAF MiG-21, before the MiG itself fell victim to an air-to-air missile fired by the PAF.

(more…)

3 Ways Criminals Can Get Your Data

3 Ways Criminals Can Get Your Data

3 Ways Criminals Can Get Your Data

When we hear social engineering, we immediately think phishing. Those of us in the industry may also think about vishing, dumpster diving, or the SECTF held at DEFCON and DerbyCon. Whether you are technically inclined or not, you are probably familiar with the “Nigerian Prince” or “419” schemes. You have probably received a convincing or near-convincing phishing email claiming to be “Delta” or “App1e” or “Amazon.” This article aims to educate you about other social engineering attack vectors.

(more…)

Influencer Accounts Being Stolen

Hackers are Stealing Top Instagram Accounts

By: Taylor Lorenz, The Atlantic

In early October, a publicist received an irresistible message via email. The publicist’s client is a top “influencer”—someone who leverages a social-media following to exert influence and, usually, make money, often by selling sponsored posts. “We would be extremely interested in a business partnership,” a man calling himself “Joshua Brooks,” wrote. His pitch was eye-popping: He was offering “80 Thousand US Dollars” for a single picture. Yes, Influencer Accounts Being Stolen by Hackers.

(more…)

Stealing Social Media

A look at how it can happen.

Some employees have direct access to the corporate social media platforms, giving them the power to rename social media channels or post whatever they like. Say a former employee moves to competitive business, changes the name of the original social media channel, and immediately starts contacting the fans and followers on behalf of the new company. This happens all the time. It’s called Stealing Social Media.

The need for good contracts and agreements between employers and employees when it comes to social media is paramount. In addition, systems need to be in place to prevent this from happening.

This includes securing all passwords and changing them immediately prior to terminating an employee with passwords, as well as a strict copyright and ownership clause in the contract.

1 2 3 4
  • Sign up
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
We do not share your personal details with anyone.