Tag Archives: Social Media

How 12 Popular Apps Use Your Teen’s Info

Teens using popular social apps

by Matthew Golabek & Trevor Morgan From calorie counters to food delivery services to secret and deceptive “vaults” to hide info from parents, millions of humans are tethered to smartphones as if they were their only lifeline. With the convenience, however, comes potential risks for the user. IBM’s Cost of a Data Breach Report 2019 identified the […]

Risk Monitoring: Reddit & Predictive Intelligence

by Matthew Golabek Today’s world has people afraid, angry, and traumatized by both COVID-19 and global events. It makes our jobs as investigators difficult. Fear of offending someone or being characterized as falsely reporting something has started to affect security—in and out of uniform. If a protest group is terrorizing the neighborhood or burning down […]

The Advantages of Open Source Intelligence (OSINT)

Cobwebs Technologies is a 2021 OSMOSIScon sponsor. To learn more about Cobwebs Technologies, visit https://cobwebs.com/. Open-source intelligence, or OSINT, is a term used to refer to any information which may be freely gathered from public sources; generally it refers to information that can be found on the internet. The term first came into use during […]

Risk Monitoring: Twitter & Predictive Intelligence

by Matthew Golabek Today’s world has people afraid, angry, and traumatized by both COVID-19 and global events. It makes our jobs as investigators difficult. Fear of offending someone or being characterized as falsely reporting something has started to affect security—in and out of uniform. If a protest group is terrorizing the neighborhood or burning down […]

Risk Monitoring: Instagram & Predictive Intelligence

by Matthew Golabek Today’s world has people afraid, angry, and traumatized by both COVID-19 and global events. It makes our jobs as investigators difficult. Fear of offending someone or being characterized as falsely reporting something has started to affect security—in and out of uniform. If a protest group is terrorizing the neighborhood or burning down […]

Risk Monitoring: Facebook & Predictive Intelligence

by Matthew Golabek Today’s world has people afraid, angry, and traumatized by both COVID-19 and global events. It makes our jobs as investigators difficult. Fear of offending someone or being characterized as falsely reporting something has started to affect security—in and out of uniform. If a protest group is terrorizing the neighborhood or burning down […]

Info Exposed: Social Media–The Enemy in Your Home?

By Cynthia Hetherington Data, at its most annoying, is a commodity with social media sites selling your Likes to data providers. Data, at its most dangerous, allows terrorists and scammers—as near as your neighbor or from faraway lands—to farm from open sources the personal addresses of our military personnel to threaten them and their families. […]

Info Exposed: Identity Theft

By Cynthia Hetherington Data, at its most annoying, is a commodity with social media sites selling your Likes to data providers. Data, at its most dangerous, allows terrorists and scammers—as near as your neighbor or from faraway lands—to farm from open sources the personal addresses of our military personnel to threaten them and their families. […]

Thursday Quick-hit Podcast: Chris Poulter

Introducing OSMOSIS Speaker Chris Poulter Get a sneak peak at the upcoming OSMOSIScon Globalcast session with Chris Poulter, whose expansive career has delivered OSINT training to multi-national teams that service strategic, operational, and tactical objectives. This week, Chris sits down with PI Perspectives’ podcast host Matthew Spaier to discuss his upcoming conference session, Using Social […]

How to Track down Images & People with OSINT Tools

As OSINT investigators, we need to be aware of the hundreds of social media platforms connecting millions of users daily. Some platforms, such as Facebook, require a real-life person to be associated with a personal account. Others, such as Instagram and Twitter, can be created in minutes, and a user can hide behind a made-up handle like […]