OSINT Part 2 - The Digital Lens Into Personal Security with Jon BlakeUntitled Episode
Manage episode 482353631 series 3306745
OSINT Part 2 - The Digital Lens Into Personal Security with Jon Blake
In the second part, Philip and Jon delve deeper into technical aspects of OSINT and digital security:
- VPNs (Virtual Private Networks): They discuss how VPNs create secure, encrypted connections through virtual "tunnels" and their benefits for security, particularly when using public Wi-Fi. They also address limitations, including potential impacts on speed and some websites detecting and blocking VPN access.
- The security risks of public Wi-Fi networks, with Jon recommending always using a VPN when connecting to hotel, airport, or other public networks.
- Using OSINT for due diligence, including understanding a person's "digital footprint" (information they know about and control) versus their "digital shadow" (information they may not be aware of, like data breaches).
- Techniques for conducting effective searches, including using Google Advanced Search rather than basic searches, and applying filters strategically.
- The challenges of images online, including metadata that can reveal sensitive information like location data, and the use of reverse image search technology.
- The emerging role of AI and automation in OSINT investigations, with Jon
cautioning that while AI tools can be helpful, they need human verification and should be used carefully.
- Deep fakes and their security implications, particularly for high-profile individuals and organizations, with Jon emphasizing the need for verification processes and code words as potential safeguards.
The podcast concludes with Jon highlighting his company's training programs and customizable "cyber investigator pathway" courses available through Cyber Ops Global.
Subscribe to 'Defuse News', our weekly update of the week's events on our website.
Follow me on X /Twitter
Connect with me on LinkedIn
Chapters
1. Introduction to OSINT podcast series (00:00:00)
2. VPNs: Security benefits and limitations (00:02:27)
3. Public WiFi risks and protection strategies (00:08:00)
4. Secure messaging apps and group chats (00:11:57)
5. Due diligence using OSINT techniques (00:21:20)
6. AI and automation in investigations (00:29:12)
7. Image analysis and digital footprints (00:35:33)
42 episodes