Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Tag: Open Source Intelligence (OSINT)

OSINT stands for Open Source Intelligence, which refers to any information that can legally be gathered from free, public sources about an individual or organization. In practice, that tends to mean information found on the internet, but technically any public information falls into the category of OSINT whether it’s books or reports in a public library, articles in a newspaper or statements in a press release.

OSINT also includes information that can be found in different types of media, too. Though we typically think of it as being text-based, information in images, videos, webinars, public speeches and conferences all fall under the term.
—SentinelOne, “What is Open Source Intelligence (OSINT)?”

OSINT Framework is focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources.
—OSINT Framework

The Certified in Open Source Intelligence (C|OSINT) program is the first and only globally recognized and accredited board certification on open source intelligence.
—Listed in DHS, CISA, NICCS Education and Training Catalog.

a ball peeking out from the corner - Photograph: Serg Myshkovsky/Getty Images
Articles / CyberSecurity

Open Source Intelligence May Be Changing Old-School War

Intelligence collected from public information online could be impacting traditional warfare and altering the calculus between large and small powers.

Open Source Intelligence May Be Changing Old-School War Read More
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
CyberSecurity / Books, Reports, Films & Images

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News

The page-turning inside story of the global team wielding the internet to fight for facts and combat autocracy-revealing the extraordinary ability of ordinary people to hold the powerful to account.

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News Read More
Computing & Technology / Books, Reports, Films & Images

How Bellingcat is using TikTok to investigate the war in Ukraine

The data detectives at Bellingcat showed 60 Minutes how social media is providing evidence of alleged Russian war crimes and other atrocities.

How Bellingcat is using TikTok to investigate the war in Ukraine Read More
Aerial view of civilians walking around destroyed residential neighborhood in Borodianka Ukraine - Photograph: Anastasia Vlasova/Getty Images
Computing & Technology / Articles

The Race to Archive Social Posts That May Prove Russian War Crimes

Painstaking new techniques for archiving social media posts could provide crucial evidence in future prosecutions.

The Race to Archive Social Posts That May Prove Russian War Crimes Read More
How Bellingcat uncovered Russias secret network of assassins - Bellingcat / Getty Images / WIRED
Articles / CyberSecurity

How Bellingcat uncovered Russia’s secret network of assassins

From Sergei Skripal to Alexei Navalny, Russia’s attempts to silence its enemies have been forensically exposed. At the centre of these revelations has been investigative unit Bellingcat

How Bellingcat uncovered Russia’s secret network of assassins Read More
Rescuers carry a wounded person on the stretcher as they respond to shelling in central Kharkiv, northeastern Ukraine, on March 1, 2022. - (Photo by Vyacheslav Madiyevskyy/Ukrinform/NurPhoto)
Articles / Computing & Technology

Hospitals Bombed and Apartments Destroyed: Mapping Incidents of Civilian Harm in Ukraine

With more videos and images coming to light each day, Bellingcat and members of its Global Authentication Project have begun to log and map these incidents on an interactive TimeMap.

Hospitals Bombed and Apartments Destroyed: Mapping Incidents of Civilian Harm in Ukraine Read More
Ukrainian soldier standing on top of a seized Russian military tank in the woods - Photograph: Metin Aktas/Getty Images
Computing & Technology / Articles

As Russia Plots Its Next Move, an AI Listens to the Chatter

With vast amounts of data becoming available to intelligence analysts, new tools will help them sift and interpret it all—but they will introduce new risks, too.

As Russia Plots Its Next Move, an AI Listens to the Chatter Read More
Russian serviceman operating a T72B3 tank of the Russian Southern Military District's 150th Rifle Division in a snowy field - Photograph: Erik Romanenko\Getty Images
Computing & Technology / Articles

Online Sleuths Are Using Face Recognition to ID Russian Soldiers

It takes five minutes to put a name to a soldier’s face using little more than a screenshot, but there’s a catch.

Online Sleuths Are Using Face Recognition to ID Russian Soldiers Read More
Aerial view of the Pripyat River on the border of Ukraine and Belarus taken by a Capella Space SAR satellite - Courtesy of Capella Space
Computing & Technology / Articles

High Above Ukraine, Satellites Get Embroiled in the War

While the Russian invasion rages on the ground, companies that operate data-collecting satellites find themselves in an awkward position.

High Above Ukraine, Satellites Get Embroiled in the War Read More
Tower struck image - Sergei Supinsky / AFP via Getty Images
Computing & Technology / Articles

How Open-Source Intelligence Is Helping Clear The Fog Of War In Ukraine

From high-resolution satellite images to TikTok videos, governments no longer control information from the front lines.

How Open-Source Intelligence Is Helping Clear The Fog Of War In Ukraine Read More
Collage of images of people wearing Ukrainian flags taking pictures rubble in Kyiv and the ICC flag - Photo-Illustration: Sam Whitney; Getty Images
Computing & Technology / Articles

What Russia Is Doing to Ukraine Must Be Preserved—Not Just Seen

Images of crimes against humanity are in danger of being lost. Fortunately, best practices exist, and the international community needs to implement them.

What Russia Is Doing to Ukraine Must Be Preserved—Not Just Seen Read More
Troops and equipment remain deployed along Lake Donuzlav and the Novoozernoye area. Artillery units remain deployed in the fields near the garrison and troop tents also remain nearby. Several large sets of armored equipment were positioned in convoy nearby. Photograph: Maxar Technologies
Computing & Technology / Articles

If Russia Invades Ukraine, TikTok Will See It Up Close

As troops amass on Ukraine’s border, civilians capture it all on camera. Online sleuths are now unpacking the details.

If Russia Invades Ukraine, TikTok Will See It Up Close Read More
Roman Dobrokhotov is founder and editor in chief of the Insider, a Russian news site that's played a key role in identifying Moscow's most brazen alleged military spies and killers. Photo: Max Avdeev
Articles / CyberSecurity

The Russian Sleuth Who Outs Moscow’s Elite Hackers and Assassins

Roman Dobrokhotov has been playing a dangerous game for a Russian reporter: identifying agents of the GRU military intelligence agency.

The Russian Sleuth Who Outs Moscow’s Elite Hackers and Assassins Read More

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • A Data-Driven Exploration of the Race between Human Labor and Machines in the 21st Century
  • It Takes a Community: The Open Source Challenge
  • Wasatch Backcountry Skiing Map, 4th Ed.
  • Information: ‘I’ vs. ‘We’ vs. ‘They’
  • Toward Justice in Computer Science through Community, Criticality, and Citizenship
  • Cybersecurity as Illuminator for the Future of Computing Research
  • Two Paths for Digital Disability Law
  • Raising Robovoices
  • Modern Tech Can’t Shield Your Secret Identity
  • A Call to Action

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

• Dictionaries, Glossaries and Other Resources
• Glossary of Terms (Tag Terms)
• Links

Categories (Number of Articles in each)

  • — Broad Topics (611)
    • Climate (19)
    • Computing & Technology (305)
    • CyberSecurity (216)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (37)
      • – WSU Resources (9)
    • Street Art (3)
  • — Form Types (595)
    • Articles (505)
    • Books, Reports, Films & Images (63)
    • News & Information (29)
    • Organizations (4)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (50)
  • Artificial Intelligence Research (6)
  • Avalanche Education (7)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (10)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (5)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (6)
  • Computer Crimes (5)
  • Computer Science Education (10)
  • Computer Security (17)
  • Coronavirus-Covid19 (14)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (10)
  • Ethics (30)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (6)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (11)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (29)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (18)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (9)
  • HTML (5)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (14)
  • Law & Policy (6)
  • Machine Learning (11)
  • Malware (9)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (5)
  • Passwords (7)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (8)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (7)
  • Resources (6)
  • Russia (41)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (25)
  • Spyware (8)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (5)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (7)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Accessibility (5)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

Featured Books

Book Cover - A Biography of the Pixel
Book Cover - Steve Jobs
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2023 Wallace Web Design, LLC
Scroll to Top