Open source intelligence, or OSINT, involves finding and analyzing publicly available information to produce actionable intelligence. Some common OSINT tools include Maltego for mapping relationships, AnonPaste Monitor to track leaked data, and social media monitoring on platforms like Twitter and Facebook. A case study example discusses using OSINT to analyze the "Lords of Dharmaraja" criminal network through tools like Nostradamus, which integrates diverse data sources and enables relationship analysis and pattern detection.
2. Shameless Self Promotion
Founder, ClubHack
Mentor, ClubHack Magazine
Awarded as Microsoft Most
Valuable Professional 2012 in
Enterprise Security.
Advisor eGov - Science &
Technology park, DST
Ex- Head of Technology,
Commonwealth Game(s)
6. What is it?
OSINT: Open Source INTelligence
“Is an information processing
discipline that involves finding,
selecting, and acquiring
information from publicly available
sources and analyzing it to produce
actionable intelligence.”
12. LeakedIn
The primary purpose of leakedin.com is
to make visitors aware about the risks of
loosing data.
This blog just compiles samples of data
lost or disclosed on sites like
Tools
pastebin.com.
20. Nostradamus
Geographically
spread sources of
different types and Databases of security services
formats and other law enforcement
authorities
Mass media articles and other
public sources (including the
web)
Police reports, recorded at the
Nostradamus
regional police departments
Life scan systems
Tools
Information from the field on: Communication
accidents, incidents, interviews, records
etc
21. Nostradamus
A complete, powerful analytical tool
Analysis of Relationships, Graphical visualization of Relationships
Detection of Direct and Hidden networks, patterns, trends
GIS Analysis, Space-Time Analysis
Telephone Call Analysis, Contacts Analysis
GIS enabled Analysis; Movement & Location Analysis
Crime Pattern Analysis, Proactive Analysis
Multi-lingual Phonetic & Semantic Search & Query
Intelligence Accumulation
Completely web-based; includes online & real-time capabilities
Tools
Automated data capture. IP, GPRS, SMS enabled
Structured information access privileges
Client side Platform independent. No special requirement w.r.t. the
User PC
Efficient operations even with low communication capabilities