ROBERT STEELE: This is a great guide if you only care about the 1% of 1% of 1% of 1% of 1% that is online. The author, from the much-discredited Southern Law Poverty Center that scams people for donations while censoring haters (anyone committed to the truth), has done a fine job on the pimple under the donkey’s tail. He should apply to the CIA’s Open Source Center, where he will find himself in good company. Serious people can start here: #OSINT.
As OSINT investigators, collectors, and analysts, we have to be familiar with the dark web and be able to navigate it with efficiency. We also have to be able to extract information from it in a targeted, efficient matter. Here are a few tools you can use to get you started, get you familiar, and get your comfortable in the difficult task of inspecting the dark web.
Rethinking OSINT as an Intelligence Discipline Defining Open Source and OSINT OSINT Subtypes …News Media Content …Gray Literature. …Long-Form Social Media Content …Short-Form Social Media Content OSINT Methodology: The OSINT Operations Cycle …Collection …Processing …Exploitation …Production
Zion Market Research has published a new report titled “Open Source Intelligence Market by Deployment Type (Cloud and On-premises); by Source (Public Government Data, Professional and Academic Publications, Commercial Data, Grey Literature, Media, and Internet); by Security Type (Data Analytics, Text Analytics, Artificial Intelligence, Big Data, Human Intelligence, Content Intelligence, and Dark Web Analysis); for Application (Private Sector, Public Sector, Military and Defense, Homeland Security, and National Security) – Global Industry Analysis, Size, Share, Growth, Trends, and Forecast 2016 – 2026”.
As an example of transformative change that is now underway, Joshipura pointed to the telecom industry. “For the past 137 years, we saw proprietary solutions,” he said. “But in the past several years, disaggregation has arrived, where hardware is separated from software. If you are a hardware engineer you build things like software developers do, with APIs and reusable modules. In the telecom industry, all of this is helping to scale networking deployments in brand new, automated ways.”
While Facebook is notorious for its endless piddling product tweaks, this one seems a substantive shift in strategic vision. It’s an unprecedented acknowledgment that Facebook’s core feature — News Feed — has not worked out at all the way it was intended. It was abused by peddlers of misinformation. It was used by foreign governments to attempt to interfere in elections. It made people feel bad.
Megaupload founder Kim Dotcom says he will help facilitate an unobstructed internet, free from prying eyes, through MegaNet, which will operate without IP addresses. The German entrepreneur is currently resisting extradition to the US from New Zealand over alleged copyright infringement.
Dotcom, who believes the internet to be a new frontier of rough-and-tumble lawlessness like the Wild West, previously described his alternative internet idea as “indestructible, uncontrollable & encrypted”.
My experience, both as a long-time practitioner of the open source discipline and as a former leader of the CIA branch responsible for it, is that there are two stubborn myths that continue to impede the true unleashing of OSINT’s power and potential. First, that open source is “cheap.” And second, that anyone with little more than a good internet connection can be an open source practitioner.
In the internet age, the digital breadcrumbs humans leave in their wake can be harnessed – the geotag on a tweeted photo, or the time stamps on a YouTube video upload. This open source, publicly available material, once scorned by the secret-stealers of the intelligence community, is rising in value as it is in volume. Open source intelligence (OSINT) is increasingly leveraged by intelligence agencies around the world to quantify, contextualize and even predict international events.