1 hour 56 minutes
Hi, everyone. And welcome back in the previous video, we have made another view off the Austin types, and in this video we will talk and learn about who actually uses. Absent this list that I have prepared, it's probably not big enough, since docent is used almost by everyone.
First on the list would be governments and different agencies associated with those governments together Intel for different kinds of purposes
such as counterterrorism, national security, foreign politics, affairs and so on.
And then there is military whose actions are very much based on oh sent results. Actually, intelligence
military is considered the largest consumer off. Austin Resource is also have to mention private investigators who make a living out of those investigations.
Next, corporations and business in general. They can use us in to investigate new markets, monitor competitors activities and all kinds of data leak it fighting. But also there are customers and clients who use Austin, and
I won't lie to you. I use these techniques on a regular basis for my work.
If I have a potential client or ah customer, I will probably make a good investigation. Should I even go to business with them
It is very similar when company cars or does recruiting, and that process could also work in the other direction. If you're looking for a job or you see a job ad,
probably the first thing you are going to do is to investigate that company a little bit. Check their corporate website may be linked in profiles who are their clients and are there even relevant in their field and so forth?
One of the users of Oh Sint and are often for gotten our algorithms A K machines,
because algorithms could be designed together and classify information and then publish it as news for public use here. I would like to mention a great example how a machine made a mistake.
The Big Notredame Fire in Paris, France
People and Different News recorded the fire and uploaded it to YouTube. But YouTube classify that information is fake news and did not announce that it through its platform the way it should after they noticed the error. The incident lasted for about an hour. They immediately fixed the error. But this is the reality.
Accidents, errors, mistakes happen. And unfortunately, we have to check everything more than twice
back to our list. Next on the list, which I put our penetration testers. Better to say, White hat hackers.
Olson is used extensively by them together intelligence about specific Target online before conducting the attack. The first phase off any penetration testing methodology begins with reconnaissance. In other words, with innocent
like we, the good guys who use ozone for studies, business pleasures like traveling in all kinds of things. The bad guys also use it like thieves, cameras, stalkers and so on.
The other big group of those end users are journalists. And, as you may notice, for some time now you could often seen
on television that as a relevant source of information about something is considered. When you get that information from a Twitter or Facebook, and they put that as the official source regarding that, I just want you to think about the fake news phenomena. Sounds interesting, doesn't it?
As I have mentioned before, this list could be a much bigger one. This is just foreign illustration, and for you to get familiar who uses or could use oh sinned
in this video we went through who uses a lesson, and the next month we will talk about the open source intelligence cycle, so see you in the next video