tag:blogger.com,1999:blog-57608501104895259932024-03-21T15:50:24.833+00:00The OSINT JournalThe OSINT Journal provides news, information, intelligence, analysis and opinions based on open sources, OSINT, on major issues related to global security and intelligence gathering and analysistheosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comBlogger674125tag:blogger.com,1999:blog-5760850110489525993.post-35455413725048037982015-10-10T12:25:00.005+01:002015-10-10T12:25:50.867+01:00Gangs of Detroit: OSINT and Indictment Documents<!--[if !mso]>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
<![endif]-->
<!--[if gte mso 9]>
12.00
<![endif]--><!--[if gte mso 9]>
Normal
0
false
false
false
false
EN-GB
X-NONE
X-NONE
theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-11383487222809836302015-10-10T11:46:00.004+01:002015-10-10T11:46:58.695+01:00Criminal procedure and the digital revolution<!--[if !mso]>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
<![endif]-->
<!--[if gte mso 9]>
12.00
<![endif]--><!--[if gte mso 9]>
Normal
0
false
false
false
false
EN-GB
X-NONE
X-NONE
theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-79164221056751485532015-10-10T11:39:00.000+01:002015-10-10T11:41:10.096+01:00OSINT | Introducing Gavel<!--[if !mso]>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
<![endif]-->
<!--[if gte mso 9]>
12.00
<![endif]--><!--[if gte mso 9]>
Normal
0
false
false
false
false
EN-GB
X-NONE
X-NONE
theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-24042668666299430642015-10-06T11:30:00.000+01:002015-10-10T11:31:31.263+01:00Researcher warns about Security Loopholes in Denmark's Largest Bank<!--[if !mso]>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
<![endif]-->
<!--[if gte mso 9]>
12.00
<![endif]--><!--[if gte mso 9]>
Normal
0
false
false
false
false
EN-GB
X-NONE
X-NONE
theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-44020152381946414342015-07-24T20:25:00.000+01:002015-07-24T20:26:41.247+01:00Ashley Madison Extortion Attack: Critical Lessons For Enterprise Cybersecurity<!--[if !mso]>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
<![endif]-->
<!--[if gte mso 9]>
Normal
0
false
false
false
false
EN-GB
X-NONE
X-NONE
MicrosoftInternetExplorer4
theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-59225513857389177552015-07-24T20:21:00.000+01:002015-07-24T20:27:07.532+01:00Air Force continues to work with DOD, OPM on cybersecurity incident<!--[if !mso]>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
<![endif]-->
Posted 7/23/2015 Updated 7/22/2015
Secretary of the Air Force Public Affairs Command Information
7/23/2015 - WASHINGTON (AFNS) -- The Air Force
maintains its commitment to theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-28359126493106586862015-07-24T20:11:00.000+01:002015-07-24T20:11:14.960+01:00French Surveillance Law Implicates Internet Service Providers, Web Hosts
by Nicole Henderson on Friday, July 24 2015
Internet
service providers in France will have to install black boxes that
analyze users’ metadata and alert authorities of possible terrorist
activity under the country’s sweeping surveillance bill, which the
Constitutional Council approved on Thursday night.
According
to a report by the Wall Street Journal, the law overhauls theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-34861292009611286692015-07-08T13:42:00.001+01:002015-07-08T13:54:48.660+01:00Hacked Opinions: Vulnerability disclosure – Ryan Smith
Credit:
Jen Anderson
Accuvant's Ryan Smith talks about disclosure, bounty programs, and vulnerability marketing
By Steve Ragan
CSO |
theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-12042854240727959442015-07-07T13:23:00.000+01:002015-07-08T13:28:43.779+01:00Hacking Team hit by breach; leak suggests it sold spyware to oppressive regimes
The
elusive Italian spyware and hacking tool provider -- particularly for
law enforcement -- had its corporate insides revealed over the weekend.
By Zack Whittaker
for Zero Day
| July 6, 2015 -- 04:07 GMT (theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-12494662460803260762015-05-23T12:03:00.001+01:002015-05-23T12:07:23.231+01:00Just how lethal is the software flaw dubbed 'Venom'?
It's not as widespread as the Heartbleed vulnerability, according to experts. But the flaw threatens the security of data centers and virtual computer environments.
By Jaikumar Vijayan, Correspondent May 14, 2015
A recently discovered software bug known as "Venom" could give criminal hackers access to business data stored in the cloud or on in-house systems.
But thetheosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-19371837777790121892015-02-24T08:18:00.001+00:002015-02-24T08:21:23.810+00:00Open Internet Archives
Open Internet
Ensuring that every American has access to open and robust high-speed Internet service.
Open Internet Archives
The "Open Internet" is the Internet as we know it. It's open because it uses free, publicly available standards that anyone can access and build to, and it treats all traffic that flows across the network in roughly the same way. The principle of the Open theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-52118100797209530162015-02-11T13:37:00.001+00:002015-02-11T13:40:58.419+00:00A New Cyber Agency is Born
English: Seal of the United States Department of Homeland Security. (Photo credit: Wikipedia)
E-Notes
Lawrence Husick is an FPRI Senior Fellow, Co-Chair of FPRI’s Center for the Study of Terrorism, and Co-director of FPRI’s Wachman Center project on Teaching about Innovation.
Lawrence Husick
February 2015
On February 10, 2015, Lisa Monaco, assistant to the president for theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-22896707041236558572015-01-30T17:58:00.001+00:002015-01-30T18:00:42.035+00:00Scammers Steal $11 Million in Bitcoins Over Four Years: Study
by Chris Burt on Thursday, January 29 2015, 11:20 am
At least $11 million worth of bitcoins have been stolen via scams in the last four years, according to researchers from Southern Methodist University. The actual total value of bitcoins scammed is likely far higher, as it counts only those scams which the researchers were able to track the revenue of.
Cybersecurity theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-6154822880544824152015-01-30T14:29:00.001+00:002015-01-30T14:36:43.605+00:00DJI Mandatory Firmware Update Will Disable Camera Drones in Washington DC’s No Fly ZonePublished on January 28, 2015 by Michael Zhang
Yesterday we reported that a DJI Phantom quadcopter operator had accidentally crashed his camera drone onto the lawn of the White House at 3 in the morning, causing a security panic among those tasked with ensuring the President’s safety (later reports suggest the man was drunk).
DJI wants to make sure this type of incident never happens theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-77902734214079581402015-01-30T14:14:00.001+00:002015-01-30T14:14:22.220+00:00Islamic State Reportedly Uses Bitcoin for Anonymous Financial Transactions<!--[if !mso]>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
<![endif]-->
<!--[if gte mso 9]>
Normal
0
false
false
false
false
EN-US
X-NONE
X-NONE
<![endif]--><!--[if theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-61927938424335851682015-01-29T18:05:00.000+00:002015-01-30T18:08:18.693+00:00Singapore Creates Central Agency for National Cybersecurity Operations
by Chris Burt on Wednesday, January 28 2015, 1:00 pm
Singapore is tightening its cybersecurity operations with the launch of a central agency and a new minister in charge of cybersecurity, according to a report by Reuters.
Singapore’s national cybersecurity operations will be taken over by the new Cyber Security Agency (CSA) under the direction of the Prime Minister’s theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-3333976170223570542015-01-22T12:28:00.001+00:002015-01-30T18:09:49.027+00:00Researchers create inexpensive versions of NSA's spying tools
Posted on 21 January 2015.
ShmooCon, the hacker convention that welcomes individuals interested in all aspects of computer and information security, was held last week in Washington, D.C. Among the speakers invited to share their knowledge and projects were also Michael Ossman, a wireless security researcher who makes hardware for hackers, Dominic Spill, a developer working on many theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-30717267685674480682015-01-21T17:40:00.001+00:002015-01-30T18:14:05.140+00:00Hackers Hit Lizard Squad DDoS-as-a-Service, Leak Customer Data
by Chris Burt on Wednesday, January 21 2015, 11:23 am
Hacker group Lizard Squad’s DDoS-for-hire service has been hacked, and a list of all 14,241 customers, complete with payment method and account information, has been leaked, KrebsonSecurity reports. The groups troubles were further compounded when one alleged member was arrested on Friday by UK law enforcement and chargedtheosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-37743435445038937902015-01-21T15:53:00.001+00:002015-01-30T18:11:53.820+00:00Poland Launches Tactical Drone Tender
By Jaroslaw Adamowski 2:49 p.m. EST January 19, 2015
(Photo: CARL COURT, AFP/Getty Images)
WARSAW — Poland's Ministry of Defense has launched a tender to acquire 12 sets of middle-range tactical unmanned aerial vehicles and 15 sets of mini-UAVs for the armed forces. The ministry says it is aiming to significantly boost the military's surveillance capacity.
All initial bids are theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-79156388689807163352015-01-21T13:41:00.001+00:002015-01-30T18:15:10.808+00:00Open source tool trawls Github repositories for sensitive data
Michael Henriksen, a member of the SoundCloud security team, has been recently tasked with creating a system that will constantly check the company's GitHub organizations (i.e. repositories) for unintentionally leaked sensitive information.
He did it, and at the same time has developed an open source, command line tool that can be used for occasional checks of the same nature both by companiestheosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-68631015191420211452015-01-20T17:48:00.000+00:002015-01-30T18:13:00.827+00:00Physical Breach Highlights Security Holes at Canada’s Electronic Surveillance Agency
by Chris Burt on Tuesday, January 20 2015, 3:14 pm
The new headquarters of Canada’s electronic surveillance agency had an “extreme vulnerability” which was inadvertently breached by firefighters responding to an emergency call, the Toronto Star reports. The Canadian Communications Security Establishment (CSE) revealed the vulnerability by sending uncensored documents in theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-71292628004850049672015-01-19T19:35:00.001+00:002015-01-30T18:16:36.611+00:00Outage of Several French News Sites Not Caused by DDoS: Web Host Oxalide
by David Hamilton on Friday, January 16 2015, 2:49 pm
Starting at around 8:30am CET Friday morning, several French news websites including L’Express and Libération, were offline for approximately an hour.
These sites were all hosted by Oxalide, a web host with colocation space in Equinix data centers north of Paris, which has stated on Twitter that the incident went to the theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-20044303566153116882015-01-17T14:13:00.000+00:002015-01-30T18:17:54.086+00:00Hackers Wage ‘Jihad’ on French Websites, Name Swiss Bank Account Clients and Surveil Pyongyang Newsreaders
View of downtown Pyongyang, capital of the North Korea // Maxim Tupikov/Shutterstock.com
By Aliya Sternstein January 16, 2015
In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches:
Official North Korean News Site Injects Spyware into Visitors’ Computers
DPRK’s Korean Central News Agency is serving up more than just theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-25648663071948718582015-01-17T07:52:00.000+00:002015-01-30T18:19:30.999+00:00Cyber Intelligence Report – January 15, 2015
Cyber Warfare
Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI - January 15, 2015
ISRAEL
New agreement signed between Israel and Japan regarding cyber
The cooperation between Israel and Japan was recently announced. The purpose of this agreement is to strengthen and tighten relations between Israel and Japan, even attempting to reach levels of relations similar to other theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.comtag:blogger.com,1999:blog-5760850110489525993.post-87525372246743351582015-01-16T19:27:00.000+00:002015-01-30T18:20:43.542+00:00Thousands of French Websites Face DDoS Attacks Since Charlie Hebdo Massacre
by Chris Burt on Thursday, January 15 2015, 1:16 pm
Nineteen thousand French websites have been attacked since the Charlie Hebdo terrorist attacks last week, according to French military head of cyberdefense Adm. Arnaud Coustilliere. The attacks have been carried out by a variety of hackers, including “more or less structured groups” and some well-known Islamic groups, theosintjournalhttp://www.blogger.com/profile/01714034800752350857noreply@blogger.com