Category: Privacy
Hidden Web Page: A Modern Alternative to Numbers Stations
Opposition Research vs. OSINT Analysis
There are so many initial similarities shared by Opposition Researchers and OSINT Analysts, that they are often confused for one another within the political domain. This likely stems from their abilities to utilize publicly available information to achieve their objectives. However, their similarities pretty much end here.
Personal Archival Storage
If you keep up with the news, work in IT or even on a computer, it does not take much imagination to think of a scenario in which one might loose access (temporarily or permanently) to your records and files. These days, stories about targeted events like hackers, home invaders or arsonists seem almost as…
Threat Assessments: OSINT
Over the years, many friends and prospect clients have approached me with a problem: One privacy violation or other has taken it too far and they have to eradicate that one thing from their life. Ironically, the violator is usually a consideration in the latter phases of a privacy consulting project, meaning that it is…
Vulnerability Assessment: OSINT
This is one of the more common types of projects that you will see see while working with private clients and security consultancies alike. As the title suggests, the vulnerability assessment is an analysis through which the client aims to develop detailed, tailored knowledge of the vulnerabilities of a person, campaign, organization or series of…