HOME
new webiste header

The blog

We write about OSINT methods, tools and techniques.

U.S. Politics and Nonprofit: a case study in corruption

One of the most important but unnoticed changes in the field of investigative research in recent years is the...

Read More

Cyber Defence Case Study

With more and more business taking place online, preventing hacking attacks has become a critical function for all...

Read More

The Challenges of Data Integration

One of the biggest challenges when developing institutional knowledge is the consolidation of many different...

Read More

The OSINT problem of social media policies [Twitter, Parler, Gab]

Social media is now more than ever a place to socialise and connect with people. Additionally, a significant...

Read More

The 8 Most Common Misconceptions About OSINT

Intelligence is often referred to as a cloak and dagger tradecraft. Associated with mystery, intrigue, espionage,...

Read More

10 examples of OSINT used for good

With the democratisation of OSINT, more and more ordinary people began using it. But did you know some of them have...

Read More

Mapping the 2016 Russian Hack into the DNC

 

Cyber attacks are rarely a purely technical fist. Most rely on a mix of social engineering targeting humans'...

Read More

How Prigozhin wins friends and discredits foes in Africa

 

 

Analysts tracking Wagner have frequently speculated on the relationship between shadowy organisations conducting...

Read More

Why is due diligence important [Case Study]

Due diligence has become an essential step in any business decision. Whether it is for investment purposes, client...

Read More

Leave Comment