Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
hi, everyone In less video, we touched on operations security and open source intelligence. And in this one, I would like to increase your level of awareness concerning innocent with show off. Two interesting examples. Allow me to share something I noticed people are doing on social networks all around.
00:19
And since I like Lincoln, I've seen there also on numerous occasions.
00:24
At this moment we're facing this terrible cove in 19 situation. The whole world is involved.
00:31
Because of that. The number of people who started working from home increased exponentially in a very short period of time. And for some reason, people are posting pictures off. Their home office is sharing with the rest of the world how they're working from the comfort of their homes,
00:46
being efficient than putting pictures of other people's home offices because they post screenshots off online meetings.
00:53
But it's even worse. Pictures contained technical info like meeting I DS and user names. This is not just a security issue. This is a privacy issue, but when you look at it from a notion perspective, you can acquire a lot of data that could be used in almost any context in for the future activities.
01:11
Now. I named the second example answering the phone, and I would like to tell you that if you live a legitimate life, you do not have privacy as you think you have. But you can still be little more aware and be better at protecting yourself. Here is how the story goes,
01:27
actually an observation from a privacy of where person like myself
01:32
Have you noticed when people answer their mobile phones? Actually, they speak very loudly and share their most intimate things, which you could over here without a special effort. But if you were to ask them directly some personal questions, you would be frowned upon it best.
01:48
They talk about their financial situations. Love life's really personal stuff, but when they hang up, they continue to talk with discretion to the other person.
01:57
This is usually the case on the street coffee shop, terraces in public transportation and similar locations where there is some background noise present as a nose in person and a hacker, you could easily add that information to the whole profile making process off your target.
02:14
In this video, I hope we raised DEA Vernon's bar a little bit higher at least in the Olsen context.
02:21
And then the next one, we will do module summary. So see you there.

Up Next

Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By

Instructor Profile Image
Tino Sokic
CEO at DobarDan
Instructor