Even military hackers make OPSEC mistakes. I bring back the APT1 story in order to outline some bad OPSEC examples that you should avoid if conducting online investigations.
A New Year guide to methods of verifying news, images and videos from conflict zones. To illustrate these methods I am referring to a very recent example of a terrorist attack on a naval base and an airport in Kenya.
Why Ireland urgently needs a dedicated intelligence agency – my public consultation submission to the Government regarding their National Security Strategy 2020-2025. Also, read between the lines for my own reasons as to why I quit police work.
Tricky Thursday focuses on keyloggers. Keyloggers come in two types – hardware and software. Essentially, both types are digital surveillance tools that capture and record anything that you type on your computer’s keyboard. Check out my methods of detecting and defending against keyloggers.
A quick glimpse at various types of concealed cameras used for breaching privacy and illegal covert recording. Disturbing as it was, some of these were trending during the recent Black Friday and Cyber Monday sales.
Right wing extremists can be dangerous targets, but they are no different to other extremist groups. My interview with MW-Osint focuses on investigating neo-nazi groups, in the context of the Iron March forum data breach.
How to do OSINT without your account getting closed? Today I focused on the process of creation, cultivation and maintenance of OSINT investigation accounts.