OSINT with ShadowDragon & Digital Tools For Modern Investigations

Daniel Clemens from ShadowDragon, LLC
OSINT with ShadowDragon & Digital Tools For Modern Investigations

This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.

Episodes

  1. S04 E03 Part 2: Human Trafficking in Online Marketplaces (Part 2): Exposing the Threats & Tools to Fight Back

    2 DAYS AGO

    S04 E03 Part 2: Human Trafficking in Online Marketplaces (Part 2): Exposing the Threats & Tools to Fight Back

    In this episode of the Shadow Dragon podcast, Director of National Security David Cook hosts a conversation for National Human Trafficking Prevention Month. The panel features: Matt Richardson, Senior Advisor of Intelligence and Child Safety at the Anti-Human Trafficking Intelligence Initiative (ATII) and Head of Intelligence at the Canadian OSINT Center Daniel Clemens, CEO and Founder of Shadow Dragon Elliot Anderson, CTO of Shadow Dragon This episode explores how open-source intelligence (OSINT) methods can unveil hidden threads of human trafficking by tracing repeated text, phone numbers, and images in online ads. Experts from both ShadowDragon and the Anti-Human Trafficking Intelligence Initiative (ATII) emphasize that ethical, transparent data collection is vital for legal admissibility. They also stress the significance of parental involvement—through open dialogue, clear device-use boundaries, and vigilance for red flags like unsolicited gifts or secrecy—in thwarting exploitation before it begins. Central to prevention is the “stop, block, and talk” framework, which empowers children to discontinue unsafe interactions, block perpetrators, and immediately seek help from a trusted adult. Ultimately, the episode underscores that deploying cutting-edge OSINT tools, coupled with engaged parenting and community collaboration, remains key to addressing the global crisis of human trafficking. Key Takeaways OSINT in Trafficking Investigations: Repeated text, phone numbers, and images in online ads can offer critical leads on trafficking networks. Ethical Data Collection: Transparent, legally compliant methods ensure that gathered evidence is admissible in court. Parenting & Prevention: Open communication, device-use boundaries, and awareness of red flags (like secretive behavior) are essential for child safety. “Stop, Block, and Talk”: A straightforward guideline that urges children to halt disturbing interactions, block the user, and seek adult assistance. Community Collaboration: Harnessing advanced OSINT tools alongside active parental and broader community engagement is crucial in the fight against human trafficking. Request to view ShadowDragon and CACI's DarkBlue Intelligence Suite Webinar on using OSINT to find indicators of human trafficking online: https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0 Special Guest: Matt Richardson.

    34 min
  2. S04 E02 Part 1: Human Trafficking in Online Marketplaces (Part 1): Exposing the Threats & Tools to Fight Back

    FEB 3

    S04 E02 Part 1: Human Trafficking in Online Marketplaces (Part 1): Exposing the Threats & Tools to Fight Back

    In this episode of the Shadow Dragon podcast, Director of National Security David Cook hosts a conversation for National Human Trafficking Prevention Month. The panel features: Matt Richardson, Senior Advisor of Intelligence and Child Safety at the Anti-Human Trafficking Intelligence Initiative (ATII) and Head of Intelligence at the Canadian OSINT Center Daniel Clemens, CEO and Founder of Shadow Dragon Elliot Anderson, CTO of Shadow Dragon They discuss how human traffickers operate, the indicators that a child or adult may be at risk, and the ways online investigative tools—particularly open-source intelligence (OSINT) platforms—support law enforcement efforts. Matt shares the emotional toll of these cases and the importance of self-care for investigators, emphasizing that while the work can be harrowing, it is a privilege to help protect vulnerable individuals. The group also highlights the power of community partnerships, legal collaboration, and technology in preventing human trafficking and rescuing victims. This episode is part one of a three-part series focusing on human trafficking and online marketplaces, with a strong warning that some content may be disturbing to listeners. Request to view ShadowDragon and CACI's DarkBlue Intelligence Suite Webinar on using OSINT to find indicators of human trafficking online: https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0 Special Guest: Matt Richardson.

    1 hr
  3. S3 E12: How a Former CIA Targeter Uses OSINT

    12/15/2024

    S3 E12: How a Former CIA Targeter Uses OSINT

    The guys cover how OSINT is used in monitoring the unrest in Syria, and the tragic killing of Brian Thompson, United Healthcare’s CEO, on his way to the company’s investor day. Hosted by Nico “Dutch OSINT Guy” Dekens, Director of Intelligence and Collection Innovation, and David Cook, Director of National Security, with guest Jake Robinson, ShadowDragon’s Director of Product. Jake's Background: o Jake shared his journey from a U.S. Army intelligence analyst in human intelligence (HUMINT) to the CIA, where he was a targeting officer. o Discussion of the importance of open-source data in intelligence operations and its evolving use in government. Geopolitical Insights: o Syria's current instability, including Bashar al Assad's exile and the rise of groups like Hay'at Tahrir al-Sham (HTS), is discussed as a geopolitical event that has effects around the world. o OSINT tools can be used to monitor key players and groups for patterns and motivations. Social media platforms, like Telegram, are crucial for real-time intelligence gathering. Practical Applications of OSINT in the News Last Week: o Real-world monitoring of geopolitical and domestic incidents, such as the assassination of United Healthcare’s CEO, demonstrates OSINT's role in monitoring real-time events. o OSINT is used widely for threat assessments for executives and principles to build a ‘threat profile’ or ‘threat matrix’ that can define or identify security vulnerabilities to fix. o The team emphasized balancing public exposure with security for high-profile individuals and companies is a double-edged sword – the need to be public while simultaneously maintaining safety. Challenges in Verification: o Issues of misinformation and false data, particularly in high-profile cases (e.g., fake accounts of suspects), highlight the need for robust validation processes in OSINT. Tools and Techniques: o Shadow Dragon’s tools, like Horizon, are designed for real-time monitoring, metadata analysis, and creating timelines to distinguish credible information from noise. Key Takeaway: OSINT is invaluable in today’s world. More data and information are public every day – use it to enhance security, monitor geopolitical events, and mitigate corporate risk. OSINT’s effectiveness depends on timely collection, thorough validation, and cautious interpretation. Learn more at: Special Guest: Jake Robinson.

    29 min

Ratings & Reviews

4.6
out of 5
9 Ratings

About

This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.

You Might Also Like

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes, and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada