OSINT

In Person and Online Intelligence Training

Cyber Intelligence, Counterintelligence, and Cognitive Warfare Training Courses online and in-person Washington, DC, Miami Florida, New York City, Chicago, Seattle, Los Angeles, Phoenix, Dallas, OrlandoOur In-Person courses cover intelligence, counterintelligence, influence operations, how to build a cyber intelligence program, geopolitical and strategic intelligence, open-source intelligence, clandestine cyber human intelligence, persona development and use, and operational security in online environments. Our courses include the adversary OSINT techniques, methodical procedures for OPSEC, and the use of ChatGPT…

Read More

Studying the Earth’s Surface Using Satellite Imagery

CompilationStudying the Earth's Surface Using Satellite Imagery https://earth.google.com/webExamining changes in terrain over a specific time period - World Imagery Wayback ( example ) https://livingatlas.arcgis.com/waybackObtaining latitude and longitude (+GPS) at an address https://www.latlong.net/convert-address-to-lat-long.htmlAn open map to explore the infrastructure of hydroelectric power plants, nuclear power plants, telecommunications, and morehttps://openinframap.orgDetermine possible location / GEO from imagehttps://labs.tib.eu/geoestimationMap of the Earth 750 million years ago https://dinosaurpictures.org/ancient-earth/#750Mars exploration map from Googlehttps://www.google.com/mars

Read More

Atypical OSINT Guide

The most unusual OSINT guide you've ever seen. The repository is intended for bored professionals only. PRs are welcome! Feel free to submit a pull request, with anything from small fixes to translations, docs or tools you'd like to add. Disclaimer: All information (tools, links, articles, text, images, etc.) is provided for educational purposes only! All information is also based on data from public sources. You are solely responsible for your actions, not the author ❗️…

Read More

Cyber war – large-scale destruction without the use of military force

Cyber war has the potential of large-scale destruction without the use of military force and can be used without an official declaration of war. As a strong current, the "soft" paradox is a good guide to dealing with hybrid threats and hybrid warfare and its responses and countermeasures, as well as resilience and vulnerability. https://cybershafarat.com/2023/02/18/cognitive-warfighter/ To achieve success, one cannot focus only on difficult defense or security issues and only look for war. This can…

Read More

Limitations of the Cognitive Domain?

https://cybershafarat.com/2023/04/11/65021/ The cognitive domain should not be limited to influencing information operations, social engineering and the conceptual approach of "controlling hearts and minds," but should include all domains in which there is a possibility of ideological attacks. https://cybershafarat.com/2023/04/22/miami-cyber-cognitive-warfighter-training/ The corruption of the mind is not just the public but cyber functions since these groups are now on the front lines. One problem is the lack of realization by organizations that this is a fact. We…

Read More

Miami – Cyber Cognitive Warfighter Training

Cyber Cognitive Warfighter Training This course includes the use of ChatGPT and other AI solutionsMay 15-19 Monday through Thursday 7:45-5 PM, Friday 7:45-12 PM.Weston, Florida (Miami-Fort Lauderdale) Course lectures demonstrate browser setup (extensions/plug-ins/add-ins) for operational security, multiple browser configurations and containers for the alignment to and tracking of personas. Students learn how to test browsers for leakage. Students must maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during…

Read More

Cyber Cognitive Warfighter Training with Open AI / ChatGPT functions

Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - New York City Jun 12-16 OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting…

Read More

RU OSINT Weekend Update

In Russia, cases of the use of encryption viruses are increasingly being recorded , which disable computer systems beyond the possibility of recovery. Diablo 4 Beta Bricks Your Graphics Card 3080Ti after 20 minutes of play. Blizzard is working with Nvidia to investigate. Investigation of journalists on the activities of a number of foreign media agents working on the anti-Russian agenda for money. Unknown people hacked the popular YouTuber Linus Tech Tips with 15 million…

Read More

How Russia Sees It – Information Diversions Ukraine

INFORMATION DIVERSIONS IN THE CONFLICT IN UKRAINE To identify and classify the forms and methods of information warfare in the modern conflict in Ukraine (in the context of the war in Ukraine). Procedures and methods. The study was carried out using the methods of analysis, synthesis, generalization and interpretation of the results. Results. The forms and methods of conducting information warfare in Ukraine under the conditions of the war (strategic information operations, special propaganda, fakes…

Read More