NeedleStack Authentic8
-
- Technologie
Every Tuesday, NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web.
From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
-
OSINT after dark with MJ Banias
MJ Banias discusses how one man’s late-night OpSec fail is an OSINTer’s treasure. If that’s too salacious for you, we also talk about how awesome newspaper archives and librarians are.
Key takeaways
Put yourself in your targets shoes to understand what sites could give you your next selectorThe sites and services every OSINTer should subscribe toHow overcoming a millennial’s worst nightmare could be the break you need -
Securing high-risk communities
Journalists, academics and NGOs face unprecedented levels of threats in real life and in the digital world. With limited resources, they often lack secure methods to collect OSINT. That’s why a digital investigations platform is being offered pro bono as part of a larger CISA initiative.
Key takeaways
New threats in the digital landscapeThe risks for journalists, NGOs and academics collecting OSINTHow digital investigative teams can protect themselves -
Demystifying dark web research for enterprise and law enforcement
An analysts from DarkOwl joins us to discuss dark web research and all its facets. From AI and other trends on the dark web, to operational security, learn how to turn on the light beneath the surface of the internet.
Key takeaways
AI and other dark web trendsOperational security in dark web researchHow to search an unindexed environment -
Breaking in: how to use OSINT for pen testing
How can I get in? Steve Stasiukonis knows the power OSINT brings to this crucial pen testing question. From uncovering who to pose as, what to wear and how to forge a badge, OSINT can be the key you need to unlock a client's physical security. Steve also discusses the gold mine OSINT brings to cyber pen tests and what CTI pros need to know before going on the dark web.
Key takeaways
How OSINT is used in pen testingDark web OPSEC considerationsHow Steve easily broke into banks (for good!) -
Lockbit and the stories behind ransomware with Jon DiMaggio
We go behind the scenes with Jon DiMaggio of Ransomware Diaries. As the chief security strategist at Analyst 1, Jon has conducted in-depth investigations of ransomware groups, including the famed Lockbit gang. He tells us the open-source tactics he uses and how cyber threats can take a mental toll.
Key takeaways
Tracking the Lockbit storyWhere OSINT meets ransomware investigationsThe human element in threat detection -
Legal and OSINT: hunting down the bullsh*t
Bullsh*t Hunting creators Justin Seitz and Some Lawyer share their tips on how OSINT and legal investigation tactics can benefit one another. They talk about their series “The Hunt” as it examines suspicious legal proceedings and possible wrongful convictions. Plus we dive deep into public records requests with tips of how to get the information you need.
Key Takeaways
How to effectively submit a public records requestWhat OSINTers can learn from legal professionals and vice versaThink like a lawyer when searching legal databases