Father
Professional
- Messages
- 2,602
- Reaction score
- 783
- Points
- 113
To find information about a person or company, now just Google it. If there is no information in the search engine, social networks will help.
The Internet has given humanity a sea of open data sources. OSINT analysts know how to use them correctly. What exactly do they do? How did open data intelligence come about? And when is it used most often? About this and more – in the article below.
To better understand what OSINT is, just look at the history of the United States. It was there that the Service for Monitoring foreign broadcasts appeared in the 1940s. Its employees recorded and analyzed radio broadcasts around the world. Specialists created reports and passed them on to the CIA. Such open data could account for up to 90% of the information received by the intelligence agency. And only 10% accounted for the reports of the agent network and other sources.
After almost a century, OSINT has ceased to be something secret. Now, open data intelligence is a tool that is actively used in politics and business.
State structures, according to him, thanks to OSINT receive information about domestic and foreign policy, and scientific organizations - about various aspects of their own research, new technologies and developments in their field.
According to experts, OSINT is increasingly becoming an important component of a comprehensive information security audit. The reasons are clear: an attacker can get information from open sources that can be easily used in attacks. This can include the full names of employees and their contact details, information about the software used, application source codes, and even user accounts and passwords.
However, open source intelligence is no longer limited to the field of information security. Today, HR managers, journalists, PR specialists and other specialists are also taught how to search for information correctly.
Experts specify that it is really necessary to train OSINT, since it is not just a search for information on the Internet. And if the average user stops the research at the surfing stage, then the professional is just starting with it.
Competent analyst is not limited to search engines like Google or Yandex. In the study, he will use OSINT tools. These include solutions for finding information on the darknet, verifying counterparties, AI-based threat analytics, automating the analysis of received data, and others.
One more point – you can go to the exploration alone. All you need is network access, the correct task, and time. At the same time, to find out information, you do not need to communicate with people. All data about them is already available in social networks and other sources.
With companies, according to him, everything is even easier. They regularly publish tax reports, and they have charters that are also posted online. Therefore, you can always find data and draw conclusions about companies.
Conclusions are often incorrect just because the OSINT analyst considered incomplete or inaccurate information. You can get more data than is available in open sources. Only it will no longer be OSINT, experts add.
It also happens the other way around – when there is too much information about a person or organization in the network. In this case, data collection, processing, and analysis require more time and effort for the OSINT analyst, which increases the total cost of research for the company.
OSINT tools are even more actively used in politics and the media today. Thanks to them, responsible publications filter out fake news, and journalists confirm investigations with facts.
All this suggests one thing – the popularity of open source intelligence will continue to grow. And this is understandable without Google.
The Internet has given humanity a sea of open data sources. OSINT analysts know how to use them correctly. What exactly do they do? How did open data intelligence come about? And when is it used most often? About this and more – in the article below.
From the CIA to the world
OSINT, or Open Source intelligence, is an intelligence discipline and a set of tools and activities for finding and analyzing information from open sources. It is used when you need to create a description of a specific person or company.To better understand what OSINT is, just look at the history of the United States. It was there that the Service for Monitoring foreign broadcasts appeared in the 1940s. Its employees recorded and analyzed radio broadcasts around the world. Specialists created reports and passed them on to the CIA. Such open data could account for up to 90% of the information received by the intelligence agency. And only 10% accounted for the reports of the agent network and other sources.
After almost a century, OSINT has ceased to be something secret. Now, open data intelligence is a tool that is actively used in politics and business.
Dmitry Orlov
Head of Security Analysis at Simplicity
Today, OSINT is actively used by commercial companies. This is how they get information about competitors, the market, and customers, as well as data to determine their reputation.
In addition, open source intelligence is of interest to law enforcement agencies. It is used to fight crime, identify terrorist threats, uncover corruption, work with extremist organizations, identify spies and violators of the law.
State structures, according to him, thanks to OSINT receive information about domestic and foreign policy, and scientific organizations - about various aspects of their own research, new technologies and developments in their field.
OSINT on protecting companies on the web
OSINT methods are especially popular in information security. Thanks to them, companies find security vulnerabilities, possible threats, their sources and focus. In addition, information security specialists use publicly available sources to identify cybercrimes and detect information leaks.Anton Menchits
CEO of Compliance Soft
OSINT's roots in information security grow from methods of conducting security analysis: collecting preliminary information about the object, technologies, IT infrastructure, and so-called reconnaisance intelligence.
Gradually, with the automation of this area, a separate class of security products appeared – Attack Surface Mapping. Common OSINT frameworks are often hidden under them.
According to experts, OSINT is increasingly becoming an important component of a comprehensive information security audit. The reasons are clear: an attacker can get information from open sources that can be easily used in attacks. This can include the full names of employees and their contact details, information about the software used, application source codes, and even user accounts and passwords.
Alexey Vinnichenko
Head of the Information Security Department of Tsifromatika
In practice, OSINT is more often performed as part of independent penetration testing and comprehensive information security audits. Less often, it is done on their own by specialized departments, which is more relevant for businesses with well-developed information security systems.
This practice is due to the fact that OSINT is better used as part of a set of checks that allow you to confirm or deny the possibility of implementing attack vectors using the information found.
However, open source intelligence is no longer limited to the field of information security. Today, HR managers, journalists, PR specialists and other specialists are also taught how to search for information correctly.
Sergey Gataullin
Dean of the Faculty of Digital Economy and Mass Communications of MTUCI
OSINT is actively developing as a separate discipline for studying in universities. And not only the training areas "Information Security". The methodology for collecting information from open sources that is currently being developed is useful for all specialists working with data analytics.
Experts specify that it is really necessary to train OSINT, since it is not just a search for information on the Internet. And if the average user stops the research at the surfing stage, then the professional is just starting with it.
Competent analyst is not limited to search engines like Google or Yandex. In the study, he will use OSINT tools. These include solutions for finding information on the darknet, verifying counterparties, AI-based threat analytics, automating the analysis of received data, and others.
Everything ingenious is simple, or the Advantages of OSINT
The Internet is an ideal environment for searching for data, especially if it is shared. This is why OSINT research is faster. For the same reason, they are usually cheaper than other options.One more point – you can go to the exploration alone. All you need is network access, the correct task, and time. At the same time, to find out information, you do not need to communicate with people. All data about them is already available in social networks and other sources.
Dmitry Ovchinnikov
Chief Specialist of the Integrated Information Security Systems Department of Gazinformservis
People are social creatures and like to share information about themselves on social networks. So the field for OSINT is created just fine. And all that is required of specialists is to collect and process information correctly. The main thing is that the person does not turn out to be a hermit in social networks and a non-public person.
With companies, according to him, everything is even easier. They regularly publish tax reports, and they have charters that are also posted online. Therefore, you can always find data and draw conclusions about companies.
Are there any disadvantages and risks?
Unfortunately, yes. Experts warn that OSINT research is not as simple as it may seem at first glance. If you look closely, sometimes they are even dangerous.Anton Menchits
CEO of Compliance Software
The biggest challenge in OSINT is the correct interpretation of the received information. Any extrapolation is unacceptable here.
Experts, product developers, and investigative professionals who practice OSINT methods are not entitled to "highly likely"judgments. Only a pragmatic approach and a reliable interpretation are important.
Conclusions are often incorrect just because the OSINT analyst considered incomplete or inaccurate information. You can get more data than is available in open sources. Only it will no longer be OSINT, experts add.
It also happens the other way around – when there is too much information about a person or organization in the network. In this case, data collection, processing, and analysis require more time and effort for the OSINT analyst, which increases the total cost of research for the company.
Conclusions
OSINT in Russia is gradually moving into the category of mandatory business protection measures. Open source intelligence already helps entrepreneurs avoid questionable deals, and information security specialists see their company through the eyes of a hacker.OSINT tools are even more actively used in politics and the media today. Thanks to them, responsible publications filter out fake news, and journalists confirm investigations with facts.
All this suggests one thing – the popularity of open source intelligence will continue to grow. And this is understandable without Google.