Difference between revisions of "Open-Source Intelligence - OSINT"

From
Jump to: navigation, search
m
m
Line 5: Line 5:
 
|description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools  
 
|description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools  
 
}}
 
}}
[https://www.youtube.com/results?search_query=ai+cybersecurity+security+RSA+malware+detection YouTube]
+
[https://www.youtube.com/results?search_query=ai+Open+Source+intelligence+OSINT YouTube]
[https://www.quora.com/search?q=ai%20cybersecurity%20security%20RSA%20malware%20detection ... Quora]
+
[https://www.quora.com/search?q=ai%20Open%20Source%20intelligence%20OSINT ... Quora]
[https://www.google.com/search?q=ai+cybersecurity+security+RSA+malware+detection ...Google search]
+
[https://www.google.com/search?q=ai+Open+Source+intelligence+OSINT ...Google search]
[https://news.google.com/search?q=ai+cybersecurity+security+RSA+malware+detection ...Google News]
+
[https://news.google.com/search?q=ai+Open+Source+intelligence+OSINT ...Google News]
[https://www.bing.com/news/search?q=ai+cybersecurity+security+RSA+malware+detection&qft=interval%3d%228%22 ...Bing News]
+
[https://www.bing.com/news/search?q=ai+Open+Source+intelligence+OSINT&qft=interval%3d%228%22 ...Bing News]
  
 
* [[Case Studies]]
 
* [[Case Studies]]
 
** [[Cybersecurity]]
 
** [[Cybersecurity]]
* [[Government Services]]
 
** [[National Institute of Standards and Technology (NIST)]]
 
** [[U.S. Department of Homeland Security (DHS)]]
 
** [[Defense]]
 
*** [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration|Cybersecurity & Acquisition Lifecycle Integration]]
 
* [[Capabilities]]
 
* [[Prompt Injection Attack]]
 
* [[Cybersecurity References]]
 
* [[Offense - Adversarial Threats/Attacks]]
 
* [[Cybersecurity Frameworks, Architectures & Roadmaps]]
 
** [https://aka.ms/MCRA-MVA Cybersecurity Reference Architecture] | [[Microsoft]]
 
* [[Cybersecurity Companies/Products]]
 
* [[Cybersecurity: Evaluating & Selling]]
 
* [[(Artificial) Immune System]]
 
* [[Telecommunications#5G Security|5G Security]]
 
* [[Time#Assured-Positioning, Navigation and Timing (A-PNT)|Assured-Positioning, Navigation and Timing (A-PNT)]]
 
* [[Algorithm Administration#AIOps/MLOps|AIOps/MLOps]]
 
* [[Games - Security]]
 
* Useful Models [[...find outliers]]:
 
**[[One-class Support Vector Machine (SVM)]]
 
** [[Variational Autoencoder (VAE)]]
 
** [[Autoencoder (AE) / Encoder-Decoder]]
 
** [[Radial Basis Function Network (RBFN)]]
 
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]]
 
* [[Telecommunications#Physical Layer Security (PLS)|Physical Layer Security (PLS)]]
 
* [[Time]]
 
* [[Quantum]]
 
 
[https://www.youtube.com/results?search_query=Open+Source+intelligence+OSINT Youtube search...]
 
[https://www.google.com/search?q=Open+Source+intelligence+OSINT ...Google search]
 
 
 
* [https://osintframework.com/  OSINT Framework | Justin Nordine]
 
* [https://osintframework.com/  OSINT Framework | Justin Nordine]
 
** [https://github.com/lockfale/osint-framework OSINT Framework GitHub]
 
** [https://github.com/lockfale/osint-framework OSINT Framework GitHub]

Revision as of 10:52, 21 May 2023

YouTube ... Quora ...Google search ...Google News ...Bing News

Open Source Intelligence (OSINT) is the collection, analysis, and dissemination of information that is publicly available and legally accessible. It is used by organizations such as governments, businesses, and non-governmental organizations. OSINT operations use advanced techniques to search through visible data to find information that many don’t realize is public.

AI can be used to turn the challenge of large data volumes into an advantage and ultimately create a symbiotic relationship with OSINT. AI, machine learning and automation tools are able to scan massive amounts of data and conversations, proficiently identifying connections and risks that warrant further investigation. AI has dramatically increased the volume of data that can be analyzed in real-time. Today’s AI-enabled platforms empower intelligence analysts to leverage OSINT as the foundation that can help uncover hidden threats, corroborate classified reporting, and pinpoint the targets that warrant resource-intensive, traditional intelligence gathering.


The most common OSINT resources are as follows;

  • Metadata search
  • Search Engines
  • Social Media
  • Online Communities
  • Email Addresses
  • Usernames
  • People Search Engines
  • Telephone Numbers
  • Online Maps
  • Code search
  • Documents
  • Images
  • Videos
  • Domain Names
  • IP Addresses
  • Government & Business Records
  • Virtual Currencies
  • Advanced Linux Tools
  • Geospatial Research
  • Data Breaches & Leaks


Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT!
This course focuses on Open Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game.

OSINT: You can't hide // Your privacy is dead // Best resources to get started
You cannot hide. Your privacy is over. Want to learn OSINT? Want to learn how easy it is to find information online? Time to learn Open Source Intelligence from the best. - OSINT Curious