Deceptive Techniques to Derail OSINT Attempts
Offered By: YouTube
Course Description
Overview
Explore deceptive techniques to counter OSINT attempts in this 47-minute conference talk from BSides NOVA 2018. Delve into the world of Open Source Intelligence (OSINT), learning about major resources, collection methods, and goldmines of information. Discover mitigation strategies, including the importance of training personnel and understanding the enemy. Examine various types of deception, such as disinformation accounts and deceptive technologies like honeypots and canaries. Gain insights on secure internet usage, the Streisand Effect, and encryption. Learn what to avoid when protecting information and consider the implications of public records. The talk also touches on the Through the Hacking Glass (TTHG) project and concludes with information on future speaking engagements.
Syllabus
Intro
SECTF Trophy
What is OSINT?
Where can one gather OSINT?
Major OSINT Resources
Gathering OSINT
More of "Where"
Goals of OSINT
An example of OSINT
Collecting OSINT
OSINT Goldmines
Mitigations
TRAIN YOUR PEOPLE!!!
Final training rant
Collection Considerations
Know Your Enemy
A note about OPSEC
Opting out links
Secure Internet Usage
Streisand Effect
Types of Deception
Disinformation Accounts
A final layer of OPSEC
A note about public records and info
What NOT to do
Deceptive Technologies
Honeypots
Canaries
About Encryption
Through the Hacking Glass (TTHG) - a Peerlyst project
Future Speaking Engagements
Donating My Birthday
Related Courses
Engagement in a Time of PolarizationDavidson College via edX Strategic Communication to Counter Security Threats in the Disinformation Era
Universidad Rey Juan Carlos via Independent Disinformation, Misinformation, and Fake News Teach-Out
University of Michigan via Coursera Disinformation, Misinformation, and Fake News Teach-Out
University of Michigan via FutureLearn Disinformation Teach-Out
University of Michigan via YouTube