What is OSINT?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
2 hours 26 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
Welcome back in the last video, we did a quick overview of this second module, and in this lesson, some of the things you will learn are what else it is. Then we're going to talk about what is the difference between information and data because they are an essential part off any investigation.
00:19
Then we will see where can we find an information? And we we will go through the Internet structure, since it is considered as our main source of open source intelligence.
00:32
So
00:33
what ISO sent,
00:35
except it's an acronym that has two interesting words in it. The the word open and intelligence. I took two definitions off chosen, and the first one which I like the most, comes from Wikipedia,
00:48
and I think that maybe best represents the open source intelligence definition.
00:53
Also, it is data collected from publicly available sources to be used in an intelligence context. I think that in this definition, the term context is the most important one, because data as itself is nothing actually pretty worthless.
01:08
But when you put it in the right context, it automatically becomes information that has the potential to be extremely valuable
01:17
and let me show you with an example What I mean by that
01:19
now, I will tell you the difference between information and data. With an example, I will tell you a few numbers
01:29
to
01:30
three,
01:30
478 43 50.
01:36
Do these numbers mean anything to you?
01:38
These numbers that I have just listed we can look at them as data just like words, letters, different characters.
01:47
There's some random values that I have just made up. But what if I told you they were the next winning lottery numbers? Now this data becomes information and it has a much bigger value, and this is the main difference. The context.
02:04
When you put data in the right context, it automatically becomes information.
02:08
The other definition that I have used for defining goes and derives from the U. S. Department of Defense, which states that all sent is produced from publicly available information that is collected, exploited and disseminated in a timely manner
02:23
to an appropriate audience for the purpose off. Addressing the specific intelligence requirement.
02:30
Since English is not my first language, the word disseminated called my I. I looked it up in the US and context and realized that it was basically reporting, which is probably the hardest part of Hoesen.
02:44
Before we continue, I would just like to share fun. Fact, actually a side fact, as I like to call it
02:50
when you put docent in Google trends with a historical view, how does that term term perform over time? You can see that in the last five years the usage has started to grow.
03:02
Just a little food for thought. Try it.
03:07
As I have previously mentioned, the word open innocent is often Lee getting people confused because when you say open, people tend to think it means free well. In this context, open does not mean free. As an example, you plan together publicly available information,
03:24
but with the use of some tool
03:27
that you're going to purchase. So when you look at it that way, the data and information that together maybe are coming from a free source. But you use the tool which you have paid,
03:38
and also I have to mention that open does not relate to open source software in any way.
03:44
An important thing to say is that Open also refers to avert publicly available sources as opposed to cover sources which are hidden and confidential.
03:55
The left bullet on this slide is tightly connected to our Postant investigations, since we will gather almost all of our information from the Internet. And that's why we can freely say that information is everywhere. Actually, enormous amounts of data are all over the place, but where
04:14
I'll show you an illustration of the Internet, which maybe you have seen before,
04:18
since it is a pretty popular analogy off it. In the next slide, I will show you an illustration of the Internet, which maybe you have seen before, since it is a pretty popular analogy off it.
04:30
So where can we find all that information? A. Zay said. I will mention now the iceberg Internet analogy.
04:40
This is pretty cool, and I think it really points to the merit off it. People often confuse the terms like the Internet, Www Deep Web and the Dark Web.
04:49
Those terms are related, but they mean different things, So I would like to demystify them for you. Now,
04:56
if you look at the Internet, we can say it is a physical connection that is consisted off all the computers around the world, and we look at it as the harder layer or or a big machine.
05:06
On top of that hardware layer, there is the software layer, which we call the W W W or the surface Internet.
05:15
This is where we go to different websites and search engines like Google being Yahoo and so on.
05:20
It basically means that W. W. W is the type off software that runs on top of the Internet. The hardware
05:29
and all of that makes about 4% off total pages available.
05:32
This sounds wrong, doesn't it? Well, I also thought that to myself. But when you hear what is the deep Web, it will make sense. The deep Web, which is below the surface on the picture it basically it's basically all the content that the search engines are not allowed to see. Those areas are usually password protected,
05:51
and search engines can go in
05:54
as an example. Take Facebook. How many content is password protected? Ah, lot, all the profiles and pages right?
06:01
The Deep Web also consists off all the archives, medical documents, physical documents and many more, which shall which are all password protected. When we get to Dark Web, which is on the bottom of this picture with all the scary things. Then we change the software that runs on top of the Internet.
06:19
It is not www or the Web.
06:23
Rather, onion pages, which are accessible via specialized browsers like Tor
06:29
Dark Web, is usually linked to criminal activity and a really good illegal marketplaces. But both of them serve as a privacy preservers, and that is pretty. Discuss a ble, since there are two sides sides off that coin. I won't go there technical into it.
06:44
But I encourage you to learn about it, since you will probably use it in your to arsenal for your ocean investigations.
06:50
Okay, where else can we find information
06:55
next? Their traditional mass media sources like television, newspapers, radio?
07:02
Let's say you read about something in the newspapers. You could also check other media sources like television, to maybe double check the information you have learned. Also listed as potential sources are books,
07:14
maps, journals, conferences, brochures, annual reports, different publications.
07:20
But I have also listed stickers
07:24
actually a car sticker, and I would like to show you an example about it from the information gathering perspective in the next slide.
07:32
This is the baby on board sticker I will only briefly touch on this.
07:38
Here is a real picture off a car's rear end, which I took a while ago just for you to know. Why is it in creation?
07:46
Baby on board Sign on a car could elicit one or more responses. It could stop a criminal for targeting the house off. Fear off waking up the baby. Actually, as you can see on this sticker, we know that the target has probably two little Children
08:03
11 boy and one girl. Also, you immediately know their names.
08:09
Petro Watteau means Peter in the car.
08:11
And based on that all information, someone could do a very good pretext for a social engineer attack via email. Since the bad guys know the targets family situation. In my opinion, those stickers are pretty much unnecessary. And I do not recommend using them
08:30
just a zoo, some additional information. There are also photo and video meta data.
08:35
This could be a very valuable source of information. Actually, For example, it took one photo and when you look at the photos exit data, the metadata, it could contain all kinds of information. Besides what is actually in the picture
08:48
information. Like when was it taken with what kind of camera? What were the technical properties off the picture? And also, where was it taken? You could get the exact coordinates coordinates off the location, look it up on Google Maps. And compared to some other sources,
09:05
if your contacts is to validate was the person from the picture really there at that time?
09:09
This could make potentially make a good case.
09:13
In this lesson, we went over the host and definition learned. What is the difference between information and data? Where can we find all that information? With an interesting example. And we went over the Internet structure, which includes the Surface Web, the Deep Web and the scary dark Web.
09:31
In our next video, we'll talk about the innocent
09:35
types. So see you there
Up Next