20190825 The OSINT Curious Webcast

20190825 The OSINT Curious Webcast

Articles, Blog , , , , , , , , , , 1 Comment

Alright! Welcome to another
episode of the OSINT Curious podcast Or, to the OSINT Curious project
webcast. How about that? Thank you for joining us. We’ve got a special guest
this week & we’ve got a couple of other people from the OSINT Curious project as
well, so we’ll go around and introduce ourselves.
Tracy, why don’t you go ahead and start. Hi! I’m Tracy Maleeff. I’m also known as @InfoSecsherpa
on the Twitter’s and I’m just delighted to be here. I like to use my
librarian background to help put OSINT research practices out into the world.
Awesome! @DutchOSINTGuy here. I’m really pleased to have you here as a guest, here Tracy. Yeah, I’m really looking
forward to interviewing you. Thank you. Next up. I’m Kirby. I am @Kirbstr on Twitter. Kirby Plessas & my website is plessas.net and I’m really happy that Tracy is
joining us as well. I am so sorry about the last one that we had to kind of bump
to now, but I think this is working out. So yeah.
Yup. Agreed. Hello! @Sector035 here. welcome everybody. Thanks for joining us. Awesome! O.K. So everybody’s here & we are still kind of get into it. So Tracy, we appreciate you coming on. I know that,
like I said, we met in person for the first time back in February during
the SANS OSINT summit . Why don’t you give everyone a little bit
of a background about how you got into OSINT. What you are doing here. You’re a
librarian and maybe tell us about some past experiences up and we’ll catch everybody
else up. Sure! So, I’ll start with a more recent
anecdote and then I’ll explain my past. When I first made the career transition
into information security, I asked Joe Gray- some of you may know him. I
asked him a question and I was kind of you know whispering on a Twitter DM you know
what’s OSINT? What is this OSINT? In my mind I had
thought it was a computer programming language or some like secret squirrel
stealth everything, and him knowing my background, he said to me; you know what it is you you do it. And I was like “what?” No! I don’t understand. That’s when he
broke it down for me, and he said “well, what did you call it when you were a
librarian?” And I said; “me doing my job.” I didn’t have a fancy name for it. So it’s a funny story and when I
speak to other librarians now, and I mentioned that to them you know they’re
like we never had a name for it it was just doing our job. So anyway, like I said; I was a librarian for fifteen years I have a master’s degree of Library and
Information science from the University of Pittsburgh (go Panthers), and
then before that I was a travel agent. So, I’ve always had some sort of research
aspect to whatever job I had, and when I decided to make a career change about
four years ago, I decided that I wanted to pursue something in the tech field. I,
you know, went about it with a very librarian approach I’ve made a lot of alerts for
tech related items and I noticed that I kept gravitating towards cybersecurity.
All the information security news, and that’s when, I had some other people
explained it to me, and they said “I think you would be good at this” and I very quickly
saw, I’m like, oh okay! My research skills and my librarian
skills could very much be useful in information security. And that’s kind of
the bullheaded way empowered my career change, and most most people were
on board with it. I had very few people just telling me I didn’t I actually.. I had
one guy thought telling me I didn’t belong in information security with my
background, and whatever, I didn’t listen to him. I knew I was right, and yeah, so I
just I try to use my library science skills of organizing information and I
also like to give OSINT talks about subjects that many in the
information-security realm may not be familiar with. We were speaking earlier
before we recorded about how I gave a talk at the OSINT SANS summit about
government business and legal research, and it’s
funny things that I used to know just like the back of my hand are very
unfamiliar in Infosec world. I gave a talk called Lawyers Guns and Money
at the layer 8 conference in Rhode Island in June. It was an introduction to
legal government and business research. I’m just delighted that people are
finding resources that I’ve known about all along, and that’s what I try to do
with my blog. I have a blog called OSENTI Goodness, and it’s just a way for me to
kind of pull from my old professional background and share with people some
things that they may not have thought of, and I trust that you you are all
intelligent enough to figure out how that fits into your world. I’m just going
to give you the resource tell you how it works, what you can find from it, and then
it’s up to you to you know piece all that together. Tracy, you also have a news letter, right? Oh right
right. Thank you. Yeah, I have a Nuzzel newsletter, and all I
do for that is curate headlines. I don’t create any original content, but
what I try to do though is I try to find ten stories. Sorry! Actually some news items. I should say that. oh thank you there it is. Find ten news items that are
maybe a little bit under the radar. I’m trying to not regurgitate all the same
stories that people are seeing. The only time I’ll includes something is maybe if
I feel like it’s super important and I want to make sure that people see it, but
I do my best to find things that are maybe a little bit under the radar. I use
different some different keyword searches and things like that. I also
do one that concentrates just on Africa, because Africa is a growing resource not
only for growing cyber security professionals but also the risks that we
we face so it’s an interesting dichotomy there. We have this very intelligent
smart hard-working community of InfoSec professionals, you know, doing their best
to make a name for themselves and to you know carve out
careers but then they also have a lot of risks. Muuh like any a country, but I also have this cybersecurity Africa one. So, yeah, I
just try to use my special touch to create resources for the community. And
shifting from a librarian to morph into InfoSec open source intelligence practitioner. What is the biggest difference, or maybe the hardest difference difference while
shifting into in that landscape? Hmm, well, none of the jobs that I’ve had haven’t really
been OSINT focus. It’s always sort of been a bonus. I would say probably the
hardest is, you know, when you when you do research for anything legal related, you
know you have to be absolutely on point. It has to be correct so not.. and that’s
the the token of care that I take with everything that I do so I guess it’s
just frustrating for me to see people putting things out into the world that
you know or maybe from what I would consider to be dubious sources so I feel
like trying to combat that is a challenge like trying to feed
information to like I used to do a newsletter at my old job when I was a
stock analyst and kind of hearing you know questions from people well like I
read on you know whatever like I would put out a newsletter and then people
would counter it with well I saw on Reddit this and this and this and I try
to be like okay but what’s the provenance of that information you know
so trying to combat a more lackadaisical attitude among a lot of InfoSec people
about from where they get their information yeah really clearly so
really did affect checking and double-checking of..Yes that really.. that
really conflicts with the principles that I have from my library world, so
that’s probably the toughest.Yeah. Interesting! And you just said you were a
stock analyst, and I noticed, correct me if I’m wrong- that recently, you were out
of job, and the community really helped out. if I recall right. Yes I received a notification that a group of us were getting laid off. You know, big company things happen. When I put the tweet out that I was looking for a job it was retweeted over 1,600
times. I was so grateful for that my Twitter
DMs blew; up my LinkedIn blew up. Just amazing! So, I am not prepared to announce my new stuff, but I will in due time. But I am just forever grateful to the
community, for yeah, even when they even.. if they didn’t have a lead for me, just
support. It’s good. it’s just good to know that people are willing to help when you
reach out for help, right? Absolutely. Yeah it was incredible and
people are now follow circling back with me asking for updates, and you know, I
can’t really share anything just yet but um yeah it’s just been it’s been
phenomenal. Awesome. Okay speaking of community, you actually are really strong
as far as community sharing. How did you build such a network? I know that
you you’re basically a force of nature on Twitter. Thank you. Well, the answer is;
I don’t know. I don’t know how that happened. Again, that’s just kind of
ingrained in me as a librarian. That I want to, you know, I want to be that steward of information, and I want to make sure that I’m putting correct
information out there, so that’s what I do. So, I just try to
put information out there, and I’m happy to jump in and help people if they express something. I really don’t know it I’m over 20,000 followers
and it just astounds me. I’m very grateful, and I just really like using
Twitter as a way to be a part of the InfoSec community to help people and to
you know put out information that I think is important for people to learn.
Yeah it’s awesome. So one thing that we normally ask a lot of people to come on
here especially for OSINT is in the fields of OSINT there are many
different disciplines and there are things you can do from you know kind of
getting scraping intelligence by or or actually coding or actually humans you
know human intelligence something like that. Is there something special that you’re
trying to learn more about? Is there something you want to get into that you
just haven’t had the time to really put the the stuff behind? Yeah. There are two things. I definitely want to learn Maltego more.
I never really had an opportunity at my old job to really dig into maltego. It
was only a certain percentage of my job, so I only had a specific amount of time
each day to do that. And the other thing that I need to learn is… and I’m kind of
stubborn in old school in some ways, and I know that I need to learn how to
automate more. I am just so used to doing things manually. I feel like I can do
them quicker manually. So yeah. But that’s just something that in
the back of my head is there and it’s whispering “You know you really
need to you know learn Python more to automate this” and I’m like “shut up. I can do it. I know what I’m doing” Yeah I completely understand. I did the.. for the
first time I did the the global what was the online CTF for Trace Labs and stuff, and it would have been a lot easier and more information would have come out had I automated and use some of the scripts and stuff like that that
I’ve been looking at, and telling everyone else to use. But it was such a fast-paced
kind of manual process. I just went through a lot of that stuff. I know I would
have done better.. I did pretty good. I did okay. But yeah. The same thing so
automation is always something that I think everyone on our field can
go through and get better at. I’m sorry I just want to say too is there were times
when I was doing some of my threat intel work at my my old job that
there were things that I found , again I can’t get out for OPEC reasons. I don’t want to get into any details but just things that I found on social media for example
that because of my human brain and the reading that I did I was able to make
connections to things that if it was automated it wouldn’t have made that
connection. So I… that’s why I feel that there’s a value & automated, it wouldn’t have made the connection. I appreciate what automation can do, but at the same time, I’m like.. but I can put
things together together better that you know that that automation cannot. Sure.
I agree. Okay so we do have a question from the audience asking it says; what is the future of OSINT in your opinion within minds of ongoing
centralization and control of data. Interesting one. Yeah, yeah. Let’s start
with the softball questions. Okay come on we’re ten minutes in and everything is in. Is there somewhere I can I can look at that? because I just want to make sure I’m
understanding before. It’s in the the chat there. Okay. What is the future
of OSINT in your opinion. Let’s start with that one. I mean data and visualization..
all that stuff is kind of finite, but what do you think the
the basics of OSINT will be in the next five years? I think it’s going to be even
more like shooting fish in a barrel, because there’s so much data out there
that in itself posted, and you know, very few people.. and I’m talking
about, you know, outside the Information Security industry say you know potential
targets. You know everybody is putting things out there , and not a lot
of people practice OPSEC you know for one reason or another. So I think it’s
just you know we’re gonna have data overload like every other industry and
it’s also going to get more and more personal especially with all these
breaches. It’s gonna be you know you’re gonna be able to locate someone’s blood
type probably a whole lot quicker so I think it’s going to be more invasive
more prevalent it’s gonna be a lot more data and it’s really going to require a
lot more tools to kind of pick through things or like so that we’re skilled
humans to make the connections and I retweeted something this morning it said
you know and you know threat intelligence isn’t isn’t data it’s you
know it’s it’s how you interpret the data or something I’m paraphrasing no
but it’s it’s also the skill set to actually make sense and make stories out
of the data is going to become more important because a data dump isn’t
going to to cut it anymore you know need to actually tell a story and weave
things together so so here I have intelligent answer now you’re riffing to
get to it I think the future is going to be
who can better take data and better interpret it into you know into results
whether that’s going to be a cost-benefit analysis or a threat or you
know some other you know business function it’s going to be more
interpretation skills are going to be needed more data science sure what about
the use of breach data in the future and and how that ties to Oh sense you you
have any opinions on that ethical or not ethical but I mean obviously breach data
is very very ubiquitous now I mean we have Dehashed we have We Leak Info we
have a couple different sources that that really thrive and that’s their
business model is just recently breached down to stuff and you know a lot of
people on information security we use it for social engineering we’re editing
things of that but it also is a pivot point for OSINT. Do you have any opinions oranything on that? Yeah. Kind of harkening back to you know my librarian ethics you
know the terrifying thought is that an insurance company will go through breach
data dumps to maybe try to find something to maybe eliminate at
someone’s policy absolutely things like that I remember a year I mean years ago
and I’m still a librarian without you know with security being my quirky hobby
I stood up at a conference in California and I said you know we have to be wary
of the Internet of Things because you could have you know a chair because
there was some ad coming out about like Oh a chair can monitor your vital signs
and I said well what if it monitors your weight and what is what if that reports
that to your insurance company yeah everyone laughed I think that was
2016 2015 and people were laughing at me and I’m like wake up yeah there was
literally a story I told I’m one of previous episodes of this about there
was a CPAP machine and someone who was given through their insurance and there
was telemetrics on it so it was calling back to the the person that owned it and
they cut him off one day one day just wouldn’t turn on they said well you know
it’s broken a and doing something oh no you cannot
they go why wouldn’t I be covered it’s under my insurance all this stuff they
go well do you have to use it 70% of the time you’re only using a 30 and they’re
like from the record dad that we’re getting every single night while you
sleep and he’s like whoa what yeah exactly so yes that answer your question
is that you know ideally you know that if it’s just you know for OSINT research
ideally that should be off-limits but you know it’s not going to be you know
that it’s gonna be finders keepers yep yeah absolutely
well I had I took an ethics class a legal ethics class you know years ago
when I was a librarian and we had this whole discussion of if you get a PDF
from opposing counsel and they didn’t redact things properly because you know
there’s different you know if they if they redacted it in the docket in Adobe
and then didn’t tree save it then you can just go unredacted things that was a
big discussion of can you know should can you and should you redact something
and you know I there was definitely all kinds of
theories about that of what was you know ethical in the legal sphere yeah yeah
and it all depends on the specific case right yeah yeah I mean I I took one side
at one point of well I took the finders-keepers attitude of well if they
weren’t smart enough to save it correctly but then you know then you get
this twist thrown at you of like well what if it was a matter of national
security you know or something like that yes case by case but yeah it’s it’s an
interesting thing to start talking about especially because like you said with
social media data with more postings with these marketing firms that you know
like hi be Iowa and Kansas City and all that stuff they just got popped with a
breach so like I think it was mostly their credit card information from some
of their gas stations and like the things that they associate with
wahlburger stuff but you know they’re they’re not the only grocery store or
other you know food place that as the marketing down or whatever which every
time you swipe and you get the discounts also measures against what you purchase
and you know which card you use and things like that
so there are things that I think eventually will get leaked or breached
and and we will have 5,000 points of data profile stuff whatever per person
per you know card or whatever it is and that type of stuff is going to get out
there and it’s it’s scary but it’s something that we need to at least be
aware of so we can kind of attack to defend kind of thing at least make
people aware of this stuff there exactly yeah yeah awesome okay well there will
be some other questions I’m sure put through let’s see we have another one
from I think exa so since as a librarian or former librarian what interesting
information have you found in books that may not have been seen so much on the
Internet hmm well it’s interesting that I I’ve saved a lot of my my online
research books from the olden days of 2006 things like that there are a lot of
resources that are still in existence today that just get overpowered and
outshine by Google and other search engines so that’s what I’m starting to
do with my blog is to try and pull some of these websites that I’ve only ever
seen in my library and books and I’ll go to the sites and yeah in some cases the
site’s been you know bought out doesn’t exist or has turned into something
completely different than its original intention but I’m finding ones that are
still operating but you just don’t ever hear about them because they get
overshadowed there’s also you know a lot of just kind
of just discussion and ethics and things like that and and you know principles
sort of things that are better in books that you don’t necessarily see online
too much I mean maybe there’s blogs about them but again it is also a lot
easier to narrow down a topic like you know research ethics to a book rather
than try to find things online but again all about provenance you know where is
that information coming from who’s writing this blog is this you know
someone just you know trying to pull a trick and be sarcastic or not so so
things like that um you know yeah and also a lot of legal information I
cover this in the talks that I give you know not every court not every
jurisdiction is online and they’ll have printed materials no and you know also
as far as the legal system goes this is probably a whole other hour loan subject
but that’s there’s this whole thing called you know the the digital divide
and there’s also an information divide if you make all this legal information
only available digitally well you may be circumventing parts of the population
that needed the most but they may not have computers at home or they may only
have limited access to computers through a library or a prison or something like
that so there is a lot of legal information that isn’t available online
or is out of reach for people who you know may be disadvantaged and don’t have
the same access but may be needed so that’s that’s definitely some issues
there. Awesome. Okay! We’re getting we’re getting along in regards to the
interview, but I want to ask you one last question for we get into the news and
stuff here. We can circle back if people have questions. So this is this is also
information that’s why we keep paying you an stuff :). So the question is
from Steve, and it is: “I know that she went through her career change to get an
OSINT. Any advice for those who are trying to get into similar career changes well?”
I didn’t do my career change specifically for OSINT. I did it, yeah, well I just knew
that it was.. I mean, remember, I didn’t know that OSINT was a word.
yeah I just knew that my research skills would be useful in InfoSec I didn’t I
had no idea that there was a whole like subfield of it. So so take your boo
back, Sir. So, the question was how did I get into it? Yeah. Any advice
for people who are looking to make dramatic shifts from a librarian to
a stock analyst from, you know, from from different culture aspects, and so
you can tell them. Yeah. Sure. So first of all, you know, I went
about this in a very methodical way. I set up, you know, Google Alerts to see news
items. I followed, you know, I really just figured out you know what books; what
newsletters what you know websites; what blogs; what Twitter handles I should follow to absorb information. So you need to absorb
a lot of information at first. And then the second is networking with people you
definitely need to reach out to people you know ask questions be a sponge and
absorb I would go to conferences that the first after I quit my job at the law
firm in 2016 I went to some crazy amount of conferences I wanna say was 12 or
something mmm I would go to conferences I would sit in
these sessions and I would phonetically spell
times that I didn’t know what they were saying and then I would go ask someone
and I would sound it out I’m like they mentioned this and someone would correct
my spelling on my pronunciation and tell me what it was or I would look it up
later so you need to be curious you need to connect with people you know for the
most part most InfoSec people are very friendly and want to share information a
tip to try and break the ice if you’re trying to speak just maybe an
established person that you might be intimidated to speak to them ask them
about some of their failures and how they recovered I found that a lot of
people love to maybe humble brag about you know maybe some trouble they got
into and how they fixed it you know that’s that’s always worked for me if I
wasn’t really sure what to say to someone I would I would ask about you
know tell me about a time that you failed at something and you know and how
you’ve recovered you know how you got how you fixed it or something like that
you know and just just be a sponge be alert you know and then just like make a
lot of notes and things like say for jobs you know maybe create a folder or
you know some taskbar you know saving some sort of system to organize save
jobs that look interesting to you read what the requirements are and then start
to study that if you save ten jobs and you notice that each you know eight out
of ten of them say must be you know good at Python okay well then that’s your
sign up okay well let me start taking some Python classes you know even if
you’re not qualified for the job right now just save jobs that look interesting
to you and learn from that that’s how you’re gonna learn your fundamentals is
by looking at jobs that are interesting to you
are good really great points for the failures and then tracking jobs would
look interesting and then seeing what the common denominator between those are
that’s awesome really good. I wish you gave me these tips 20 years ago. It would
have been useful. Oka. We’re going to move a little bit further into the program now. I just
want to say thank you to Hunchly. And not just because Justin is here, but he is. So, hi Justin! But I also want to say thank you SANS. SANS is our sponsor that
have come out to help us, and really does make it so we can afford to go
through and keep the zoom channel going keep the the lights on the WordPress
site go on all that stuff whatever so we really do appreciate our sponsors and
those two in particular. Also anyone who’s on patreon and who is helping us with that stuff.. Amazing, amazing! We really
that’s tough amazing amazing stuff we appreciate all the
community and the support as well. And then, I think we have a new perk for the
five-dollar level as well. I don’t know who wants to talk about that. Well I
think we just had a new patreon named Whiskers who did the $5 level. Okay.
Yeah. So people, if you want to support us become a patreon. Yes. Consider that perks though. So, you get some whiskers. That’s what I was wondering! Just trim a little bit of my beard and send it to
you at the five-dollar level every year. Oh boy! I was thinking cat food. The whiskers
factor. No. That’s cool. It’s definitely my beard. It’s fine. Yeah. Okay. Awesome. So like we said in the beginning, you know, especially; Tracy’s blog is boosting
to goodness? Is that the website? Is that correct? Yeah. You have it up here it’s on
medium, and then the handle, and I call it… Yeah. So I call it. Yeah. That’s an
interesting one. That’s my most recent one. It’s a like a nuclear regulatory.
Like some sort of a national nuclear group and they have a whole bit on
cybersecurity. So, yeah. I’m embarrassed July 30th. Yeah. I need to update.
Believe me! Summer is a time for, you know, kicking back and actually
enjoying the fruits of your labor. And then, once you get to September October,
everyone is going to be nose-down and working on stuff anyway. So, yeah. So
for the people who are on the podcast and won’t be able to see this live, she has a Medium blog. https://medium.com/@InfoSecSherpaMedium.com/ and then her newsletter is Nuzzle. And it’s https://nuzzel.com/InfoSecSherpa as well. So you guys can check that out, but
it will also be in the show notes, so make sure and check it out. Great. Awesome. Well, let’s move into some of the news. We have an article here by
Martin Vigo. This is a new OSINT approach to finding
emails, or actually, from emails to a phone number. Who wants to go ahead and take this one? Well, I want to talk about because I tested it. I don’t know if somebody else on the team tested it. But, it’s ah… I forgot his name. I need to look it up. Sorry for that. But I think it’s Martin. Martin? Yes. It’s Martin Vigo. Yeah. Okay, Martin Vigo. He made a tool which kind of enumerates pieces of a phone number from several websites. Say for instance, you get the last two digits from a partial and a recent
request at eBay. And you get the first four digits from a password reset. Or a user name
lookup from PayPal, or grom Google. You know when you try and reset someone’s account, or your own account, because you forgot it, and it will tell you, “do
you want to send this verification via SMS to this number?” Because you have the 2 factor authentication set up. For instance, for partials reset, it will always show at
least two digits, and this guy figured out, really smart, if you combine all
those digits from the several websites, you will have a complete number. And that
combined with, I think it was the numbering plans from postal codes, area
codes, and all the subscriber codes – you can even enumerate almost half of
all fields and digits. And in the end, you’ll have everything. And it works
particularly well within the USA, because I tried it for European numbers and I didn’t have as much success. But looking at the code, it’s also looking up almost only U.S.-based numbers, plans and this kind of stuff. It works, kinda, but for European
purposes, It’s not that good. But for U.S. purpose it is really awesome. Yeah! Really cool tool and it’s an open source tool. I think it’s on Git-Repo. The repo is there. And he gave an awesome talk about it on, I think it’s one of the b-sides. Yeah.
B-Side Las Vegas, I think it was. Yea. It’s a really cool tool. Yea. The demo I did watch is very cool. It does kind of enumerate all those through. I
think it works both for landline, and cell phone providers. So basically what
it’s attacking is the area code, and then what they call; the exchange. And then, the
last are for the subscriber number. Back in a past life, I used to work a
little bit on telephone stuff, so I know at least a little bit about the local, you know,
the intra exchanges and stuff like that. So, yeah. It’s kind of neat and I’m a huge proponent of attacking the phone number. I really believe the phone numbers are the keys to the kingdom nowadays. Everyone is using the two-factor authentication, using their cell phone. Or, you know, their social media is attached to their cell phone. Or, anything else. It’s all tied. Email used to be the thing, because that’s what it was. With the onset of mobile technology and stuff like that I think that really any time
that you have true to life carrier cell phone number, then you can really go through and do a lot of pivoting from that to get a lot of information. And this is just another tool to go through while trying to get that
stuff. It is awesome to see that people are still working phone numbers
as an OSINT type pivot. I love it. It’s a cool tool. It’s called Email to Phone Number for the Podcast listeners. Anything else on this one? It’s really really neat. Yeah because sim swapping, SS7 attacks.. actually finding your phone number.
attacks where we’re actually finding Yeah. There’s a ton of stuff you can do with this. It’s really really neat. Okay. Anybody
else have a comment, question or concerns of any kind? Yeah. Sorry. I just have a quick question. So as far as recommending defense measures for people, is this where the password on the account through the phone provider comes into play? Yeah, a lot of that. Anything that you can set up before the actual
you know social engineering attack that happens at the the provider level, or
something. The other thing that I preached very very heavily is you know
when you are there are things like Sudo that are only available on iphone
but there are Google Voice and other things you can get that will be the tie
back to the original number or they will be you know the burner numbers that you
can give out and so you can kind of compartmentalize with what you get out
to people so that people aren’t tracking back to your original cell phone number
and then once you start flexing that muscle it’s a little bit easier to go
through and give out those my pseudo numbers or your Google Voice number and
say okay if a call comes in I know what’s coming in there and also if
you’re getting spam calls you know exactly where that phone call came from
or who leaked that information so it’s just a way to kind of compartmentalize
and set that the stuff out there so oh you reminded me. May I share a quick and funny story related to having a separate
number? So to your point of the security. I one day received an incoming text
saying that it was American Express and that there was something wrong with my
account, and it looked very realistic and blah blah blah but I it only took me two
seconds to realize that it was fake because I knew which number it was
coming in on and I knew that the credit card company didn’t have that number for
me. So I wound up giving them screenshots and reporting it to them and
everything but that’s something that when I speak to you know to librarians
and to tell their their patrons just be mindful of what you know what contact
information you have on file with your bank and with your credit cards because
if something comes in from something else
you know be wary of that because I I said you know a bank isn’t gonna sit
there and find your like alternate yahoo account to send you something
no yeah and it sorry just one other funny
comment I want to mention is I mentioned burner phones I was at a conference a
year or two ago and this there was an academic there
just being very condescending to everyone and saying you need to all go
home and and convert all your grandparents over to burner phones and I
was like really you know and I tried to challenge him on that I was like ok but
does that really help their situation you know by having something disposable
you know considering you know the you know maybe memory loss issues and and
things like that and he kept fucking you know that’s a finally I just said I
really don’t think that’s not a pop ups threat model like I get the reason why
you’re talking about burners but like why he’s oh all elderly people should
have burner phones like it’s know well maybe for the long batteries and larger
knobs when they get out yeah but I just yeah it just made me frustrated I know
if you’ve ever had the pleasure of speaking to a information security
academic that I just found his his condescension and advice didn’t feel
like it was based in like what we see it’s good for all is not always good for
all so yeah now I understand okay Awesome. Alright. We will move on to the
next topic here, which is something Dutch is gonna have to pronounce because I
will murder it. I’m sorry. Yeah. Well, I think someone will yell at me for this too, but
it’s called.. It’s made by the people from forensic architecture. It’s
basically a really impressive open-source intelligence investigation tool
using machine learning and all kinds of algorithms to detect military military
vehicles during the battle in Ukraine in 2014. And, it was just really impressive
to see how they used techniques. For instance, we at Bellingcat have used it, but they did it in an automatic way. So maybe this will give you
kind of inside how the future of open-source intelligence can look like,
because that’s what I initially found particularly interesting. These are just
a bunch o… the people of Forensic Architecture are really good at automating stuff; making up the timeline where battalion of Russian army tanks… or at least, initially they were labeled as rebel vehicles or rebel group vehicles. But they all had unique identifiers bringing them back to, at least being delivered or spotted . identifiers bringing them back to at
least being delivered or sponsored by the Russians. So.. and it’s a nine minute
video, and it tells in real great detail how they did it and how you can
do similar research, or at least by thinking of. For instance, they had
hundreds and hundreds of hours of video footage within the battle area, and they
made an algorithm, which detected only that a specific maker model of battle
tank. And then, on top of that they wanted to detect.. all those tanks had a
white dot on, which make them fairly unique to recognize. So they made a lot
top model on top of that with different angles of view, where a specific tank was
stranded during the battle. So, it’s really interesting. Just go and look it
up. We’ll put a link up in the show notes. it’s called, and I am probably pronouncing it really wrong, but it’s the ilovaisk.forensic-architecture.
pronounced it really wrong what’s the when you look that up in Google, it will pop up as the first thing. So, it’s really interesting. it’s about all about the battle of Ilovaisk during, well ah, August- September, 2014. That’s so cool. And this brings me
back to another point that I always to, again, get people’s minds wrapped around. It’s the time-frame for OSINT. LIke, you know, this stuff is just now coming to fruition with machine learning and all of that, and it’s back in 2014. This is
almost five years ago, but they’re able to go through and keep doing
research on this stuff in current day, which is awesome. It’s the same thing with,
you know, with the blockchain the Bitcoin, the drug transactions in the darknet. All that stuff is, you know, that stuff was happening back in 2012, 13, 15 whatever it
is, but just now are people getting into all those old transactions and all those,
you know, pictures early social media stuff like that. Yeah. The long tail
on OSINT is really where a lot of researchers are going to find a lot of
gold; just because we have the time to go through and towards this stuff, and you
know, the internet never forgets. So yeah. It’s those little things where it’s it’s really
awesome. Yeah. And this is field I really want to learn more about, especially the
machine learning because it helps you shift so much faster through, lets say, terabytes of video footage. It’s just.. it gives you the ability and recognition too, the ability to start really in-depth analyzing of vast amounts of more data. For instance, genocide data. Yes. True. Well, I just I wanted to
point it out. It’s really impressive work. It’s awesome. Yea. Especially since this is a model that other people can take away and say; okay, maybe I’m not doing
war-torn situations, but maybe if I want to do something similar with with
visualization, and just to see how, you know, for business intelligence or so. How
cities are racking up and things like that. There are things to overlay
on top of this. It’s a really neat and different way to tell a story. Which, back to Tracy’s point; is how are we going to move forward in regards to OSINT with a lot of the stuff. You can data it up all you want, but if can’t tell the C-level, or to the common layperson. If you can’t tell them what the actual vulnerability is, or the possible threat behind all this stuff being out there is, then it makes no difference for all your research. because you have to be able to go out there and explain it. So it’s awesome.
Yeah. There’s a saying if you’re when you’re speaking to the c-suite be brief
be brilliant and be gone. Yeah. It’s like the old PowerPoint thing where it’s
the 10 20 30. You know. 10 slide, 20 points and 30 minutes max. You know. Otherwise, you’re just going to be… yeah. Awesome. Okay. So next we will get into an update from Twint. Yeah. Well, it
was, well, it was released, I think about two weeks ago. They released twint
2.0. So it was a really huge update which gave you a lot of new filters like “filter on member lists” or “filter on a certain
amount of likes” or “filter popular tweets on specific topics” And, well, I just
clicked on it now and it’s already on to the dot 1.0 version. Yes. I just wanted to point out this
this is really actively being maintained Twitter information gathering, and also analysis tool, because when you hook it up to what was it elk or
something else you can visually graph a lot of information through elastic search for instance, so that’s well, I almost use it on a daily basis, because it
doesn’t take that much of an amount of resources here. You won’t have trouble
of API rate limits and stuff, and especially if you want to quickly scrape
for instance someone’s whole user account + all the tweets ever, and you want
to just have it in a comma separated file or something. It’s particularly
useful. It looks very very powerful. I mean, like, with the usernames with, you
know, I mean even here it’s – s for pineapple so any tweet containing
pineapples so it’s, you know, it’s focused on keywords, usernames, emails, phone
numbers geolocation. You know, a lot of that stuff there and it’s all dumps out
to JSON so it’s it’s searchable and you can build a database around that stuff.
And selfish shameless plug, whatever, there is a channel over on OSINT.team
that is dedicated for the Twint project and also the other project the gentleman has
a in telegram. So he’s an awesome dev very very responsive. He’s very very hard working for the OSINT community so if you are interested in talking with him
specifically or an adding or helping or doing anything else even just testing
for him. OSINT.team and I think the channel is just Twints.
I am, yeah, correct. Yeah. Awesome. Yea. So just a huge update, which I
wanted to point out and give a shout out. That’s really cool. I didn’t know you use this almost daily. I’ve heard of a lot of people using it and I know there are a lot of use cases but
that’s that’s that’s a good recommendation. That’s awesome.
Yeah. I’m just a hoarder of data. Yeah. There you go. Awesome. Okay. So let’s move
on to FIRMS if I believe this is through NASA? Is that correct? Yeah. Well, I never heard of it heard, heard of this one until last Tuesday. I was in a workshop
and a colleague of mine pointed this out, and I found it particularly
interesting because there was a story about it when for instance there are
these ships on fire in sea which are really hard to geolocate, but this
detection system when its live. I think that you will always see the last seven
days or at least the last 24 hours so if you know from the news breaking news
there’s a specific incident about a fairly large scale fire so for instance
recently we had those boats up in the Strait of Hormuz which were with a mine
limpet mine or torpedo for instance and oh yeah you would you would see that and
you would also see those fires within urban areas so in my personal experience
I had some cases for a for instance where there were some shelling or there
were some bombings within Syria and people on social media were talking
about well there are bombings here and here but it was really hard to geolocate
because the area was already so heavily bombed that it was hard to distinct
within satellite imagery and now you at least get a decent region to searching
within other satellite imagery once you know where a fire was so I found this
one really useful and interesting for very particular youth searching for
fires bombing shellings and such but could be useful and it’s just NASA yeah
it lights up in the skies and they just openly share this information you can
even export okay Nelson yeah yeah some people just want to see the world and that was pretty good off of that
yeah now that’s awesome that is and like I
said visualization and all that stuff is very cool it does do like the quick you
for today 24 48 72 7 days and then there’s some other filters and it looks
actually pretty robust so yeah that’s kind of cool yeah you can even set up
alerts for certain areas and export data over a fast amount of time I think yeah
it’s it’s well check it out just play with it does yeah it hasn’t some
advanced searches and like one of those is like a time frame so you may be able
to get back in time to go through and check that stuff out also you can do it
grids versus points and things like that so there’s some visualization stuff on
there really really neat this is very cool yeah and I recently I talked to
someone at delegate and it’s well we also use it for a deforestation because
they burn down a lot of force it’s I believe that yeah there’s all kinds of
uses for this one. This is awesome. Okay! Well, yeah. So, it’s FIRMS
https://firms.modaps.eosdis.nasa.gov/map/ – finding fires from space And again; don’t drive
your car into a ditch for that. We will put it in the show notes and make
sure that you guys have clickable links. Yea, right. Otherwise, just Google for NASA and fire map. You have to Bing for Google and then Google… (laughter) Yeah. So, onto the next thing. A big shout out to Gonzo on the
OSINT.Team site. We were looking for, you know, I think deep dot web was a
lot of people’s kind of go-to for a lot of dark markets, or for
what’s going on in the the deep web stuff. That one got shut down a couple
months ago. Dark.Fail I think it’s still up, but this one is it looks like a
little bit better and more in-depth and it’s DarknetLive.com So, it goes
through some of the news some of the markets that are still up. It gives you all
the onion links to that stuff, and also gives you the forums. It gives you a little bit
of a description of…some of that stuff I found to be kind of spotty on here-just
because it’ll say, you know, do you want to know more about this? So you go to it and there’s a dead link. So it’s it seems like it’s it’s updated to a point but
only for the more popular kind of the forums and the markets and stuff out
there. So, this is just another resource for people who are doing any
sort of deep web, or dark web type of investigation- and things like that.
I’m seeing, especially in the past six months, maybe even a year.. how much has changed, and that kind of.. that community out there that space out there with a lot of,
rightly so, a lot of markets being brought down and there are a lot of exit
scams. There’s some other stuff that’s going on, so it’s another resource for you. I personally still use the Huntley darknet. The Excel spreadsheet that comes up every single day, I think. I kind of live
by that stuff. It’s very detailed and I like it a lot. But yeah. I am sorry. I’m reading and talking at the same time It’s not working. Tracy, what do you have? Do you have some fun OSINT related stories? Yeah. I’m sorry. I just saw the time, and I thought; if you won’t mind, I’ll share a couple of stories of when I was a law firm
librarian of the types of things that we researched. Because I was also
realizing that I don’t think people fully understand what a law firm
librarian researches is. So a couple of stories. Something that Nico was just
showing about the fire map reminded me of this one time when I had to research whether across the Atlantic Ocean. I had to follow a freighter. The true reason why this was a law firm issue is that the freighter was loaded with Italian
shoes. Leather shoes. And, at some point during the journey from Italy to the
U.S. water leaked inside the containers and ruined the shoes. So a
couple things came to mind. First my colleagues and I were like “Okay. So you’re saying that somewhere there are shoes they can’t sell” But what the the lawyers wanted to know was for jurisdiction liability reasons. They wanted to know at what point during the journey did it rain so that they could try to figure out if it rained at the beginning of the journey and then they were negligent to, you know, patch the situation or did it happen at the end of the journey, or somewhere in the middle. Unfortunately
this was so long ago I don’t remember all the tools I utilized, but I also use
just a lot of, you know, not HUMANT, but just humans. You know. A lot of calling. you know, calling geographic libraries Geography libraries. As you know, I
have a degree from Penn State. So through the Alumni services, I have access
to libraries which is another tip that if you are in a alumni of an institution
you most likely have some sort of at least digital access to the holdings of
a library. So I phoned the, you know, the Geo sciences library at Penn State to ask
for, you know, their tips on resources to locate that. So in the end I was able to
piece together a basic weather map of what this this ship did, so that they
could figure it out. I also used to be on catastrophe watch. At least it’s what I called it. The first law firm I worked for specialized in insurance, so anytime there was something insurance-related. So, I was on
catastrophe watch. Many years ago, there was a New York Yankees baseball pitcher
who flew his plane into a building. Cory Lidle. Yeah. So I had to then quickly
figure out who owned the plane; who owned the building; you know, figure out all
that information. While Manhattan was going through a big growth spurt, there
was a lot of building & there were, unfortunately, a lot of crane accidents
and a lot of construction accidents. Something that I worked on a lot at this
one firm was the Ted Williams tunnel in Boston. There was an.. unfortunately, there was inferior slurry. Slurry is the adhesive that holds the panels together. One of them unfortunately
killed someone and I had to just research everything about the tunnel. Who
made the slurry, and then, who they were associated with and all this stuff. And
then fast forward to 2015, I flew to Boston for a librarian conference and I
was in a taxi with.. or an Uber, or something like that. I was with my husband, and we’re going through the tunnel , and all of a sudden, I start poking my head out the window. And the driver and my husband are like ” What is wrong with you?”
And I’m like… I’m having serious deja vu right now, and I don’t know why because I
hadn’t been to Boston in like 20 years before that trip. So I’m like “why is this
so familiar to me?” So, I asked the driver. I said “wait a minute. is this the Ted
Williams tunnel?” And he’s like “Yeah lady. Why?” And I was like “I’ve looked at
photos of this tunnel for so long” That’s why I was like “oh my” like “wait! I
know this place” So it’s it’s things like that, I mean, I don’t know. I think that a
lot of people hear, you know, a law firm librarian and they think it’s heavy-duty
with legal research, and it can be but one of the reasons why you have
librarians on staff is to do all these subject matter specialty areas. You know. You can give the heavy-duty legal research to, you know, the first-year associates for example. Or, you know, things like that that they’re gonna be more familiar with it. Where we would come in were a lot of these things. You know. Weather. Construction, you know. There is a lot of… especially with insurance stuff.. there’s a lot of investigating things And you know who parent companies are. A lot of connection-making too. I’d imagine with the law stuff, if you’re actually presenting You have to… just like you said. You have to be more diligent so you have to go through and find out all that stuff just
so you can build the picture for the jury for whoever else is looking at that stuff. You know, notes and all that stuff. It’s not enough to go thin and say okay. “The guy drove through the tunnel” If you can build the backstory and say who was commissioned to get them build. Who did they sublet that to. What machinery they used. To go through and do that. And if there have ever been recalls on that stuff. You can start building case doubt in regard to that stuff and I can completely see the research going into the backstory of the event
prior to. So yeah. That’s is really interesting. Yea. And you’ve mentioned
recalls. I briefly worked as a librarian for QVC, you know, the home shopping
channel. I know! People are always like “what is a librarian doing at QVC?” I’m like I make sure that those items that people are selling, you know.. that
nobody died from using them. So one of the things that I did was work in conjunction with the legal department. And somebody would want to
sell a product on QVC and I would need to do the due-diligence. I would.. do they.. you
know.. they claimed to owned a trademark, or copyright for this product. Do they
realy? Have they were ever been sued? Has this product ever been used as
another name, and you know did they change the name to cover up things like
that. So yeah. You have to really dig in. So that’s why in my mind hopefully
everyone understands now why I was so persistent of you know the the
library science background was so key to InfoSec because there’s all this kind of
research that you’d have to do to pull this pull this together. So I just sorry I thought people should know. No. This is good information. I think a lot of people, especially in OSINT
interested in Oh sent you know they see They see InfoSec as the main way that you
can go through and get into that but there are a lot of opportunities outside
of cyber security that really use OSINT. Like I said; my
back story is in elections and finance Like, I do a lot of fraud investigation. I
did a lot of skip tracing for collections. So I was using OSINT
just like you I didn’t even know it was a word. But yeah. I was doing
literally that same thing in tracking people down using social media and all
that . So yeah. I really like to hear all those stories, because
the different perspectives always give me new inspiration for future
investigations. Yea. Absolutely. Really cools. Okay. So we are running a little bit
long. I did want to look at two other real quick things. One I don’t know if anybody
else has heard of Yippie. So, I don’t Yippie is something to do… the company does something with Machine Learning and AI as well. They have a free search tool. It’s called Yippi.com and I don’t know if anybody else has ever worked with anything
called Carrots. Carrots V2. It’s kind of a cluster search engine. I love it.
It’s brilliant! It’s very visual. It breaks stuff down into a lot of really nice
things for pivoting and stuff like that. This does something similar. And again, it
breaks it down by, you know, either the sources. I lost it. Sources sites times
and topics and then you can get more specific if you drill down. So it’s a
search engine that kind of clusters and then from the clusters it allows you to
go through and deep dive kind of into that. So Yippee.com is something else
if anybody has any… It’s powered by I just, it’s popped up by IBM Watson. Yes. Yes, which is kind of neat and scary. Lastly, I wonder if we can talk about something that Baywolf88 found and I’ve been kind of playing with obsessively. It’s called Sphere. Yeah. The new browser. The really cool thing about this browser is that it allows you to go through and set
just like maybe my pseudo kind of kind of like that. You can actually
go through and set profiles, so it’ll allow the browser to go through and be
responsive and have unique signatures in regards to what it does. You can play
it over torrent. I mean, over Tor. It allows you to go through and set up
custom DNS stuff. You can go through and tell it.. even if you’re running a
Windows machine.. you know to use a different operating system. It is kind of
neat. It’s a little clunky. You have to download it and kind of set it up and
stuff but it’s not difficult to setup. The profiles are kind of the fun
part about it, but I haven’t been able to go through and really find a way to go
through and have multi tabs open at once so that’s it’s it’s not as I don’t like
functional as like Chrome or Firefox but this one does claim to be absolutely
free secure and anonymous and the anonymity kind of comes from you back
filling the information so that when you’re when you’re getting pinged and
when you’re getting tracked on some of that they’re getting new
not-so-great information which is kind of fun all right so I wanted to put that
one out there as well yeah I was. I found it particularly interesting, because I
always like to figure out new operational security tools; add-ons;
tricks.. and this is basically.. oh it’s it’s the 1.3 version, so I think it’s fairly new One day, if maintained actively, I can
see a large fan base for this one because you, well like you say, your
browser fingerprint; your GPS location or your proxies. Everything is in there. It even goes through what update of Chrome you’re using
what what what update chrome that you’re and regards to the extension stuff. So
even though you’re going through Sphere, it will send out the what is it?
sixty six point seven updates. That that’s the current browser, you know, model that you’re on. So that’s cool. Yea. It’s… you can really tweak it to your own, well, threat model for a specific case. So yeah. I really like it. It’s a good point. Yeah. Yeah. Okay. So, let’s see. Lastly, I
think we wanted to get into some of the SOINT Curious blog posts. I think that,
you know, we’ve had some really awesome stuff coming out here lately and I think
we just wanted to kind of touch base on some of that stuff. We had a guest post for the cell tower data. That went over really well. I think a lot of people enjoyed that. Dutch you’re not talking. Oh! I think
that’s something I just did that did my do not make sounds trick. Yes. I think
that’s really interesting because I know a lot of people especially with
governmental backgrounds are really interested in this subject, particularly.
And it’s always so hard to make sense of cell tower information, or at least
that’s what I hear. Mostly, analysts talk about this. This
write-up was fairly straight forward in my opinion. It went well. I read it and I was like “well, it made sense. I couldn’t have figured this out” So, yeah. It is a little bit more on the digital
forensic side of the house but think that that’s still a welcome Avenue for a lot of OSINT. I think
that’s where a lot of people start to get you know into jobs and start playing
with a lot more the OSINT side of stuff like DFIR. So, It’s always welcome. Thanks Jeff
Lomas for that one. Yeah! We’ll have to have him on and talk about that
sometime. Actually, yeah, unfortunately Kirby couldn’t stay, but Kirby, you know
updated a little bit more about her Facebook matrix stuff so that was
awesome then did the blog post about the Facebook one and two I think just came
out in his last week for the second wonder bleep yeah yeah yeah well that
was I think the most of the work was done by Kirby and especially technisset.
Yeah. She’s done a lot of work on this and well, I think it was well
received by the community because everyone was looking and finding and
figuring out their way through Facebook searching and she summed it up. I
think with the.. also the blog post from Micah about the JSON and web encoding that helped, because a lot of people found it very hard to.. at first.. to deal with the Base64 encode because that’s something you don’t do on a daily basis, or at least I don’t. So all in all, I think the combination of those blog posts are really valuable, and
yeah. A lot of the skills keep building on themselves as well which is really
nice and it’s kind it’s kind of fun to see like the 10 minute tips versus the
blog posts that do kind of connect and if you are looking at it the right way
like Tracy said you know we’ll give you the resource but putting it into your
own frame and using it in your day to day or even something that you never
even thought about using app or it really helps to go through in getting a
different perspective on that stuff so it’s awesome good see that yeah exactly
and I see Lorenzo asking if we tested the brand new tool for Facebook Graph
search yes I did test it out this afternoon someone dropped I think you
dropped it Lorenzo within the the OSINT.Team channel but it was also pointed out
by Kirby to us on the git Yeah. It’s some kind of an API, which I
still need to play with a little bit more about but it works is it brings back you
can see comments and that’s kind of stuff but I do not want to go too much
in depth to it because people on phonebook are listening in and they’re
killing our fun tools. You brought up a good point about the API going through their server
type stuff whatever and we don’t know you know if they’re, I
mean, I don’t want to claim as a man the middle type thing, whatever, but
like at what point does the information gets, you know, siphoned or
whatever by your searches and things like that. So it’s kinda OPSEC there too.
Yeah! Sure. Awesome!Yeah. But I still I think it’s fun to see that everyone is still just jumping in on Facebook searching. And that’s why I like communities that much I do have a question. Did anybody see the great hack that was that Netflix special that came
out of a Cambridge analytical everything else I think it just came out a couple
months ago I I ended up watching it like two weekends ago whatever and I wondered
if this was the you know because Facebook and a lot of the search stuff
has kind of changed rapidly over the last four months I wonder if this is
kind of the wave crash of those things whatever that happened because of that
stuff happen I think that’s a combination I think it’s creamier and
Lanigan and I think it’s also gdpr oh yeah yeah I think it’s a combination
of those privacy scandals swarming around Zuckerberg and Facebook so yeah
yeah yeah and it’s all gonna get weirder I think so yeah it’s it’s good it’s bad
but it does Drive you know researchers analysts so some people who ever to go
through and to see you know what other things can be used if your your URL
jacket and you’re doing the combinations whoever and your copy and pasting all
that stuff whatever what you can actually still get the websites we’re
tongue you know you’re kind of bouncing up against that that data warehouse
essentially and seeing what plugs out so it’s kind of Awesome yeah really like
that one yeah I think it’s also good every now and then things should change
just because people will get lazy and like well everything works fine and now
you keep on edge and trying wanting to try and figure out new stuff I agree
let’s see here I think we’re wrapping up we’ve been about an hour around a little
bit long here which is always okay especially on the Sunday I did want to
ask sector because he’s been quietly just back here you know not not really
help but not really sharing anything Webber if he wanted to talk about his
little project that just came to an end what today or yesterday is that right
I’m I’m really busy on the background here for you guys yeah I don’t tell you
you always are very busy doing things we’ve been appreciated yeah the show
notes and we’ll be on the website too yeah we really need some backlinks we
really need to SEO this this part. Mattias also in the webcast he’s
listening in ideas we spent weeks on and just going back and forth and analyzing
how scammers work because i got a new follower who said worked in the north
and helpdesk and I thought this is wrong and that’s when a little venture started
with me and Matthias and for weeks on end we try to get a grasp on how do they
work how big is this and it turned out bigger than we thought
and seven blog posts we explained all the techniques that we used we got
figures we get numbers we got images we get graphs we got everything in the open
so people can try and learn something from this and hopefully we educate
people to like don’t take everything for granted and research a little bit when
someone follows you or where you see a number someone posts itself yep really
awesome thing and yeah finished just in time because well and the Voorhis it’s
time for me to also maybe yeah take some time of except for my
newsletter maybe maybe some different chapter love what you’re doing next and
stuff yeah yeah I really like this this series because I think it’s really cool
to see actually it felt like you were as a reader you were part of a life ongoing
online research investigates and especially the techniques use are
interesting when you want to learn those techniques and I really found it really
cool to see the whole process instead of just most box are just like
summarizations of a whole investigation and this had everything into a little
even littlest details so yeah really cool tip my hat for the that series yeah
we didn’t really work in a chronological order we tried to jump back and forth
but each and every blog has a certain topic one of them goes to like ownership
one of them is just going into detail on domain name so we try to pull it up
different parts of the investigation and I I learned a ton from Matias and I hope
I also taught him a few things and it was really great working on this and
really great to share this with the community and we just now hope to trying
it gets better rankings in Google so people will see our blogs first before
the scammers yeah absolutely no it is an awesome walkthrough and really really
cool that you guys were able to go through and team up and work on that
stuff and it all kind because just a an innocuous little thing like you got a
follower and then from there this entire seven part blog post about scammers came
out of that it’s just incredible it’s really really neat so no one wants to
follow you now anymore because Timbre right you will surely look into them alright
awesome well okay would that I do recommend everyone go out and read the
entire blog post there’s some awesome infographics that he put up there as
well and Mattias did some amazing work sector jism
work on this stuff so give them some love and then and send that out to the
interwebs and all that’s up there and we will kind of wrap it up so we’re going
to go around and cut here ourself shameless self emotions where we can be
found anything you guys got coming up anything you want to highlight shout out
you wanna give out to anybody all that stuff so Tracy guess the broader please
go ahead anything that you have that you want to go through and and just let out
there’s people who find you and connect with you make it even forty thousand
followers well thank you yes I guess the show notes you’ll have my my blog and my
nuzzle I’m infestation I will be speaking at
Derby con oh nice about two weeks it’s way sooner than I’m ready for it very
soon ask if you’re running Derby yeah so that’s awesome yeah so it’s my my first
time ever Derby I am giving a talk called
empathy as a service to create a culture of security it is not Osen related but
it is based on a library science principle of the reference interview and
I correlate that to Incident Response oh very cool that is awesome
yes very quips are in Dutch I think it’s the sixth of the night there’s something
else like that so yeah sounds about right and I believe I’m speaking on
Sunday at one o’clock and track too but definitely can if you’re going
definitely consult the schedule on-site ox I’m sure things can change but yeah
please come see my talk and look you know please if you’re there give a shout
out you know to say hi I’m friendly so but thank you so much for having me on
here today pleasure really really nice time with you awesome all right deaf
sorry go ahead no I just wanted to point out I think
Derby con is always recorded right so we’ll probably be on the youtubes or
something yeah yeah because we UV Europeans always miss out on these cool
cons yeah oh and this is the last one bring one who does who doesn’t know
Derby Khan has been going for nine years is the last one they’re gonna do this is
called finish line so it’s kind of a special thing I’ve been every kind of
twice I’m really really it’s one of the bigger conferences that
I’ve been to that I still feel like I got a lot of value out of and met a lot
of nice people and so it’s very cool but ya know cool alright find you they can
find me most of the time on the Twitter’s that’s underscore OSINT guy
and I’ll be attending a few closed conferences and there will be some open
conferences coming up which I cannot disclose yet but working on stuff and
working on new blocks frozen curious especially a part two of the Twitter
searching and during the algorithm so very cool yeah she’s mean or in the near
future so that’s it awesome sector where can people find you a third geomancer
well of course you can find me on the Twitter’s everything I do are usually
post on there whether it’s quest time related I wasn’t curious related
weathers private stuff Monday morning tomorrow that is let’s see 6 yes 6 a.m.
UTC useful news letters coming out almost finished and yeah out of
September I’m I think there are still some tickets available citizens of
evidence I’ll be building together with a minimal Intel and we will be looking
at the sky looking at air traffic signals and how you can catch it with
just like 20 years of materials and a laptop and that your SDR talk is that
right that’s the ser talk that’s correct is awesome and I love so the key
findings blog yeah so all that stuff yeah how about yourself games Oh meet no
one no one needs to know where I am no I will be at Derby con we are going
to try to get some most at meet up time for some stuff there’s nothing specific
but there’s so many different groups in regards to ocean community so you know
you got people I mean I think thud crowd was on here listening earlier and they
they don’t get into a whole Auto set but there
pretty good with arrows and stuff you got trace labs you got assent curious
you got all the guys we’re going to be over at the ocean CTF for the social
engineering village so that’s almost getting fun so we’re gonna find some
time we try to get everybody together and and just you know have a couple
drinks or grab something or something so there we gotta be good then I think in
October is hacker halted and I’m actually speaking up there and Atlanta I
think it is so I’ll be doing that Kansas City will be doing our ascent meetup
group I think is the last Thursday of the month hear the news the 27th so I’ll
get the the information out on the Twitter’s for this up but I think it’s
going to be at one of the local libraries here we’re gonna go through
and have a couple people and maybe work on some posts and stuff locally but
that’s about it for me I think that is gonna wrap us up as well for the Osen
curious project anybody else got anything last-minute anything else
before we go no I just want to thank all the attendees awesome day tune in again
yeah 20 people total on the the webcast today that’s you know the the panelists
and the the attendees so awesome that people keep showing up we really
appreciate the support and questions really really gives us a lot of momentum
to keep doing this live because it is something where we like to interact with
people and some changes every single day in the OS a community so it’s one of
those things where it gives us an opportunity to really flush out stuff so
it’s awesome so yeah shout out to ocean duck team
hosting furious tech KC and I think we will leave it at that
everyone have a good day and if you have any questions you know where to hit us
up at thank you

One thought on “20190825 The OSINT Curious Webcast

Leave a Reply

Your email address will not be published. Required fields are marked *