fbpx

Latest Insights

Protecting Data Privacy in a Public Social Media World

As the world increases its reliance on digital technology, Americans have significant concerns over how private companies collect and use their data. According to Pew Research, 81% of Americans feel the risks of private companies collecting their data outweigh the benefits. An estimated 16 billion records have been exposed since 2019. Personal data is more vulnerable […]

Echo Analytics Group’s OSINT Intern Jocelyn Anderson Welcomed to the Team 

Congratulations to OSINT intern Jocelyn Anderson, who recently completed her internship with Echo Analytics Group—and is being hired as a full-time Junior OSINT Analyst!   Ms. Anderson came to us via the Seton Hall School of Diplomacy and International Relations, where she specialized in International Security and Conflict Management, participating in the National Security Fellowship there.   She […]

Using OSINT to Stop Human Trafficking

Human trafficking is a growing worldwide problem. According to the International Labor Office in Geneva, the 2017 estimate of worldwide human trafficking was 40 million people, including 25 million victims of forced labor and 15 million victims of forced marriage. One in four of these victims are under the age of eighteen.   While the United States has a record of sustained efforts to investigate and prosecute cases of human trafficking, […]

Protecting Critical Infrastructure with OSINT

Ransomware and other malware attacks are on the rise. Criminals are constantly probing online systems to discover their vulnerabilities to hold systems hostage. Meanwhile, U.S. foreign adversaries are increasingly targeting assets in digitally accessible spaces to achieve their political goals.   Open-Source Intelligence (OSINT) is being used by both attackers and cyber security professionals to find ways to exploit critical systems […]

Quiet Professionals Acquires Echo Analytics Group

Quiet Professionals (QP), a locally headquartered government and commercial contractor, announced today that they have acquired Echo Analytics Group (EAG), an open-source intelligence (OSINT) research and analysis company. “We already have several customers in common with EAG and we are both driven by a greater purpose,” says Andy Wilson, president and CEO of QP. “We’re […]
Protect Your Kids Through Online Safety

5 Ways to Protect Your Kids Through Online Safety

As we cannot always watch our children, consider how we can best monitor their online activity and keep them safe. We explore five ways in which parents can protect their kids through utilizing online safety.
Super Cookies

Super Cookies: An Introduction

Super cookies are a Unique Identifier Header that injects information into packets sent from a connected user to its service provider.
How do websites track you and your online activity

How do Websites Track You?

How do websites track you and your website activity? Online tracking is, in essence, the gathering of useful data about users and their actions online.

User-Agents (UA)

Every user makes use of different browsers or devices in accessing web services. Also, once connected, you are more likely to notice different looks for the same website under different browsers. Once a browser directs a request to a web service, the browser recognizes itself through the user agent string attached before retrieving the necessary […]

Internet Protocol (IP) Address

Every system connected to a network features a unique identifier. And similar to addressing letters sent via mail, computers employ a unique identifier in communicating data to other computers on a similar network. Nowadays, most networks, comprising of internet-connected computers, make use of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol as a standard for network […]
HTTP referrer HTTP referer

How the HTTP Referrer Works

The HTTP referer is an optional HTTP header field that recognizes webpage address connected to the resource being requested.
browser fingerprinting digital signature management series

Browser Fingerprinting

Browser fingerprinting offers an incredibly accurate approach of recognizing unique browsers as well as tracking online activities.

An Introduction to Meta Data, Types, and Its Benefits

In IT, the word “metadata” basically refers primarily to the data behind the image, video or software application. Metadata implies data comprising of specific information that includes length, textual makeup, type, description, locational data, and other features or types of data that are used to either build or identify the element. Several types of hidden […]
Forming a Research Question

Forming A Research Question

The development of robust research questions is essential in guiding open-source information gathering efforts. Most information requests require focused thought and problem-solving to properly begin a disciplined approach to satisfying the requirement. With this in mind, it becomes essential to get intricate when forming a research question, and for businesses conducting open-source research for their […]

Academia.edu Still Massive Boost to Research Works

In research, while finding an area of interest is generally the first step, the next step is doing an in-depth search for related literature and research gaps.   Fortunately, there are several search resources available today. Academia.edu, launched in September 2008, offers an abundance of resources for researches. What does Academia.edu offer? Academia.edu is a web […]

Big Red Directory Offering AI-backed Directory for the Future

The world population, according to the UN published data, is expected to hit a limit of 9.7 billion in 2050. This analysis also predicts close to 70% of the world’s populace will fit into several urban cities accommodating almost 10 million people. As the number rises, so do the challenges encountered with regards to providing […]

Twitter Advanced Search for Businesses and Marketers

Every second, an overall average of 6,000+ tweets are sent on Twitter, translating to over 500 million tweets daily! Twitter remains a fantastic app, and it allows search for every single tweet. There are quite a few different approaches to searching on Twitter. These approaches include Twitter’s toolbar for a search field, the mobile app searches, the […]

The Library of Congress: A Digital Approach to Online Libraries and Resources

Are there several information gaps in your research? Do you need assistance filling those gaps? Well, help is available with the use of online support provided by the Library of Congress. The advanced search platform allows researchers users to ask a librarian for help. If you have specific questions with no readily available answers, the digital […]

The Benefits Of Live Streams

The concept of live streams with webcams has been around since early 2000. Although live streams at the time do not come with present-day quality, it still had the potential to offer much more, and users globally are starting to realize its potential. Several users today desire fast streaming solutions, even with the growing popularity […]
forensic imaging software

The Applications Of Forensic Imaging Software

Forensic imaging plays a vital role in computer forensics, with significant application in computer-aided analysis and investigative techniques. Forensic images come in bit-by-bit, sector-by-sector alongside other necessary details. Forensic images comprise visible files in the operating system as well as deleted files. The applications and analysis of forensic photos can be performed via specialized software. […]
Mind Map Benefits

Mind Map Benefits: The Concept of Mind Maps

Mind Maps are tools for the brain, which captures the thinking process inside the head. The mind-mapping process aids in thinking, creating ideas, collective knowledge, and remembering. Using mind maps would likely help you become a better thinker. It may be a little tasking to decide on the number of mind maps to use – […]
what is grey literature and how is it used for research

What is Grey Literature and How is it Used for Research

An essential part of any research is finding useful resources to support or improve your findings. And as we all know, research methods offer processes, strategies, and procedures for collecting data and evidence. As a part of your research, have you ever considered grey literature?  In the content below, we discuss grey literature and how […]
google dorking and google hacking

Google Dorking and “Google Hacking”: What Are They?

Practically every person makes use of Google or other similar search engines, but what most do not know is the capability of search engines to handle advanced queries. In the content below, we explore both Google Dorking and “Google Hacking” and discuss how they are useful. What is Google Dorking? A Google Dork query, sometimes […]
how to activate snap map OSINT

How to Activate Snap Map

Snapchat's new social, technological feature allows users to share Snaps on maps alongside their location. We discuss how to activate Snap Map.
Locating Shooters by Smartphone OSINT Open Source

Locating Shooters by Smartphone

Making locating shooters by smartphone now possible, VERA is a new system that can accurately locate shooters based on video recordings from smartphones.

Wayback Machine: Digital Library and its Benefits. 

Since 1996, Wayback Machine has assembled over 400 billion web pages. And there is every possibility your favorite web page is already on a Wayback Machine. In general, if a website allows web crawlers and it is not blocked or passworded, you can archive them for future use.  Wayback Machine is a great resource for open source information collection and analysis and is heavily used by OSINT professionals.  What is Wayback Machine […]
how to stay anonymous online

How to Stay Anonymous Online

Privacy browsing tools galore: will they really protect your anonymity when conducting business-critical research? We explore how to stay anonymous online.

350+ hackers hunt down missing people in first such hackathon

More than 350 ethical hackers got together in cities across Australia on Friday for a hackathon in which they worked to “cyber trace a missing face”, in the first-ever standalone capture-the-flag (CtF) event devoted to finding missing persons. Similar CtFs have been held before, alongside conferences such as DEF CON and B-Sides, but this was […]
OSINT and Money Laundering; is OSINT illegal

OSINT and Money Laundering

OSINT and Money Laundering Let’s take a look at OSINT and Money Laundering. With social media websites and cyber-related intelligence which has given rise to an unprecedented volume of intelligence at one’s fingertips, the internet is an ocean of data that can significantly assist to crack money laundering and terror financing investigations. AML_CTF Investigations Over the last […]

More OSINT Training Online and Tools Launching in 2020: An EAG Update

OSINT Training Online and Tools Launching in 2020 With over 20 years in the Open Source Intelligence (OSINT) field of expertise, we’ve quite literally witnessed the industry explode right before our eyes over the past decade. Of course, when we launched Echo Analytics Group in June of 2014, we never would have imagined our business […]

Why did a state plane fly to New Mexico and back?

Why did a state plane fly to New Mexico and back? A LearJet owned by the Kentucky State Police flew to Albuquerque on Sunday, stayed for a little over an hour, then flew back to Lexington. Why? For some time, news organizations across the state have been asking the Bevin administration to account for the […]
social media risk management

Social Risk and Why Businesses Should be Prepared

Teaching businesses to maneuver social media risk management. Social Media Risk Management is now an ever-growing need that should be implemented in businesses across the globe. Here are a few examples of Social Risk and how to be prepared for it, from tips to training.
Child Abuse and Open Source Intelligence (OSINT) Landscape

Child Abuse and Open Source Intelligence (OSINT) Landscape

Europol’s Child Abuse Image Geo-Located In Ukraine using OSINT: A Forgotten Story Hidden Behind A Landscape The following report contains a reference to a child modeling studio producing child sexual abuse material in 2001. All names related to the studio are fictitious. The original source did not contain any explicit material. All the images accessed […]
Social Media Could Ruin Reputation and Business

How Social Media Can Ruin Your Reputation

How Social Media Can Ruin Your Reputation Whether it comes from hackers, disgruntled customers, or is simply a backlash against something you post, negative social media content can destroy trust in your brand in a matter of minutes. “Social media is the most immediate threat to your company’s reputation,” says Pete Knott, digital consultant at […]

Password Reset Functions Opening the Door to Hackers

Opening the Door to Hackers At the DEF CON security conference earlier this month, researcher Martin Vigo demonstrated a technique using open-source intelligence (OSINT) to compile a target’s phone number through public sources and password reset functions.
3 Ways Criminals Can Get Your Data social engineering

Social Engineering: 3 Ways Criminals Can Get Your Data

Social Engineering: 3 Ways Criminals Can Get Your Data When we hear social engineering, we immediately think phishing. Those of us in the industry may also think about vishing, dumpster diving, or the SECTF held at DEFCON and DerbyCon. Whether you are technically inclined or not, you are probably familiar with the “Nigerian Prince” or […]

Influencer Accounts Being Stolen

Hackers are Stealing Top Instagram Accounts By: Taylor Lorenz, The Atlantic In early October, a publicist received an irresistible message via email. The publicist’s client is a top “influencer”—someone who leverages a social-media following to exert influence and, usually, make money, often by selling sponsored posts. “We would be extremely interested in a business partnership,” a […]

Stealing Social Media

A look at how it can happen. Some employees have direct access to the corporate social media platforms, giving them the power to rename social media channels or post whatever they like. Say a former employee moves to competitive business, changes the name of the original social media channel, and immediately starts contacting the fans […]
How to remove digital footprint from internet - digital footprint

How to Remove Your Digital Footprint

Digital Footprints and OSINT When we talk about the work of gathering intelligence and erasing digital footprints, most people conjure the image of a James Bond-esque spy, infiltrating an enemy organization under an assumed identity. But there’s another kind of intelligence gathering, just as important to commercial, military, diplomatic and political operations: open-source intelligence, or […]
social media after a catastrophe

Navigating Social Media After a Catastrophe

After the attacks on London bridge, Londoners rallied on Twitter using the hashtag #SofaForLondon, offering their sofas, and spare rooms to residents without homes. During Hurricane Harvey, hashtags like #sosHarvey were used to call for civilian helpers when phone lines were down. The world turned to social media to grieve, lend a hand and show […]

Even the royals need social media intelligence

Duchess of Sussex Meghan Markle has been taking heat through social media since her relationship with Prince Harry went public in 2016. Things were so bad that the prince ended up issuing an official statement condemning the “wave of abuse and harassment” she experienced. Markle apparently isn’t the only member of the Royal Family who gets hounded […]

The Fight that is Waging in Social Media

The importance of social media intelligence doesn’t lie in the business world only, the government deployed a new division in the fight that is waging in Social Media. “We need to develop our asymmetric edge and bring focus to the orchestration of intelligence, information operations, cyber, electronic warfare and unconventional warfare,” Lieutenant General Ivan Jones, the […]