The SIGINT-SAK Project (alpha Release)
My initial response (alpha test-release) to Radio Contra EP. 196: A lightweight, multi-platform toolkit for signals intelligence.
OSINT, Privacy, Security & Applied Research
My initial response (alpha test-release) to Radio Contra EP. 196: A lightweight, multi-platform toolkit for signals intelligence.
The question of privacy & security (or lack thereof) for mobile devices is among the most frequent questions I am asked on a daily basis. Here are my considerations and recommendations.
Starting at some point around World War I, numbers stations have operated as a simple and foolproof method for government agencies to communicate instructions to assets working undercover. Lets build a new one!
There are so many initial similarities shared by Opposition Researchers and OSINT Analysts, that they are often confused for one another within the political domain. This likely stems from their abilities to utilize publicly available information to achieve their objectives. However, their similarities pretty much end here.
If you keep up with the news, work in IT or even on a computer, it does not take much imagination to think of a scenario in which one might loose access (temporarily or permanently) to your records and files. These days, stories about targeted events like hackers, home invaders or arsonists seem almost as…
Over the years, many friends and prospect clients have approached me with a problem: One privacy violation or other has taken it too far and they have to eradicate that one thing from their life. Ironically, the violator is usually a consideration in the latter phases of a privacy consulting project, meaning that it is…
This is one of the more common types of projects that you will see see while working with private clients and security consultancies alike. As the title suggests, the vulnerability assessment is an analysis through which the client aims to develop detailed, tailored knowledge of the vulnerabilities of a person, campaign, organization or series of…
As I’ve mentioned in other posts, Open-source Intelligence (OSINT) analysis is not my day job – not at the time of this writing at least – but its definitely one of the categories of work and challenges that I am most passionate about. As such, it often comes up in conversation with friends of friends…
A brief overview of my new favorite daily-driver: Pop!_OS, some of the privacy & security features that I like, and my personal use case for context.
A general overview on collecting breach data: Another unhealthy hoarding habit or rich set of OSINT pivot points?