Who Uses OSINT?
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hi, everyone. And welcome back in the previous video, we have made another view off the Austin types, and in this video we will talk and learn about who actually uses. Absent this list that I have prepared, it's probably not big enough, since docent is used almost by everyone.
00:18
First on the list would be governments and different agencies associated with those governments together Intel for different kinds of purposes
00:27
such as counterterrorism, national security, foreign politics, affairs and so on.
00:33
And then there is military whose actions are very much based on oh sent results. Actually, intelligence
00:40
military is considered the largest consumer off. Austin Resource is also have to mention private investigators who make a living out of those investigations.
00:50
Next, corporations and business in general. They can use us in to investigate new markets, monitor competitors activities and all kinds of data leak it fighting. But also there are customers and clients who use Austin, and
01:06
I won't lie to you. I use these techniques on a regular basis for my work.
01:11
If I have a potential client or ah customer, I will probably make a good investigation. Should I even go to business with them
01:18
It is very similar when company cars or does recruiting, and that process could also work in the other direction. If you're looking for a job or you see a job ad,
01:30
probably the first thing you are going to do is to investigate that company a little bit. Check their corporate website may be linked in profiles who are their clients and are there even relevant in their field and so forth?
01:44
One of the users of Oh Sint and are often for gotten our algorithms A K machines,
01:51
because algorithms could be designed together and classify information and then publish it as news for public use here. I would like to mention a great example how a machine made a mistake.
02:04
The Big Notredame Fire in Paris, France
02:07
People and Different News recorded the fire and uploaded it to YouTube. But YouTube classify that information is fake news and did not announce that it through its platform the way it should after they noticed the error. The incident lasted for about an hour. They immediately fixed the error. But this is the reality.
02:28
Accidents, errors, mistakes happen. And unfortunately, we have to check everything more than twice
02:35
back to our list. Next on the list, which I put our penetration testers. Better to say, White hat hackers.
02:44
Olson is used extensively by them together intelligence about specific Target online before conducting the attack. The first phase off any penetration testing methodology begins with reconnaissance. In other words, with innocent
02:59
like we, the good guys who use ozone for studies, business pleasures like traveling in all kinds of things. The bad guys also use it like thieves, cameras, stalkers and so on.
03:12
The other big group of those end users are journalists. And, as you may notice, for some time now you could often seen
03:20
on television that as a relevant source of information about something is considered. When you get that information from a Twitter or Facebook, and they put that as the official source regarding that, I just want you to think about the fake news phenomena. Sounds interesting, doesn't it?
03:38
As I have mentioned before, this list could be a much bigger one. This is just foreign illustration, and for you to get familiar who uses or could use oh sinned
03:49
in this video we went through who uses a lesson, and the next month we will talk about the open source intelligence cycle, so see you in the next video
Up Next
Instructed By
Similar Content