• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Security Consultant
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence & Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Plan
      • Business Continuity Consultant
      • Identity Theft Consultant​
      • Security Consultants
      • CCTV and Security Cameras Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

The More You Know: A Primer on Intelligence Gathering (Open Source Intelligence)

You are here: Home / Security News / The More You Know: A Primer on Intelligence Gathering (Open Source Intelligence)

Intelligence gathering is vital to maintaining or securing your business assets.  By having the right information at hand, policymakers, business leaders and security officers can make cool-headed, informed and efficient decisions during critical events.

Having historical facts; understanding context and knowing where to find answers are key aspects of critical thinking and strategy.  In essence, good decision making comes from having all of the right facts – those facts can only be obtained with good research.  Knowing the online history of a suspected terrorist by obtaining their social media comments or knowing what kind of hacking software is available online can help you assess a threat and implement preventive or protective measures.  This is precisely what intelligence gathering is all about.

Gathering intelligence may sound like the speciality of government spies and informants; where hidden documents are passed around under cloak and dagger.  In reality, any good business can gather intelligence.  The easiest way to do so is by gathering Open Source Intelligence, or OSINT.

OSINT is accessing and gathering information from sources that are openly available to the public.  This includes social media and anything found on the world wide web.  Further, it is also possible to access databases (some with paid subscription) and sites on the deep web and dark web.  So long as the information is not classified, it is possible to access this type of information legally and relatively safely.

Searching and using OSINT may require digging through layers of websites and finding links to other related pages that, in turn, may provide further information on the subject.  Search engines such as Google or Yahoo can only provide websites that have been indexed for public viewing.  Likewise, finding and reading through all these sites can be time consuming and overwhelming.

There are easy to access (and easy to use) tools that can help you search the web more comprehensively.  These tools include:

  • Meta Search Engines – these are search engines such as Deeperweb[1] by Google that cluster websites together that discuss or relate to the search subject – they are then classified into contextualised sub files for easier browsing. For example, if you search for ‘fraud’ the search engine will find all websites containing the subject, but will also cluster them by theme such as ‘financial fraud’; ‘fraud in the news’, or ‘people who committed fraud’.  This way, you can focus on the specific  ‘fraud’ subjects that are more specific to your search.
  • Internet Archives – all websites get cached and archived. On the Internet, nothing is ever truly deleted.  Websites such as Wayback[2] maintain a database of snapshots of deleted social media comments and inactive websites.
  • Tor – this is required software to access the deep/dark web. By using Tor, you can search for websites that are not indexed for the public and would not be otherwise found on standard publically available search engines.

As there is so much information to access, it is important to ‘separate the wheat from the chaff’.  The Internet can provide an embarrassment of riches in terms of information.  It is important to be critical in analysing the online information that is accessed.  As can be seen in current social media campaigns, it is easy to spread disinformation that can affect decisions that lead to disastrous results.  For example, The USA government was misled to believe that Iraq (back in the early 2000s) had acquired weapons of mass destruction (WMD).  There was not enough verification of the intelligence obtained during that time, but it still motivated the US government enough to decide to invade the country.

A business decision or the execution of a security protocol or procedure can lead to failure if the research turns out to be incorrect.  On the Internet, it can be tricky to determine if information being broadcast about a critical event, such as the movements of a terrorist, for example, are accurate.  This was recently exemplified by ISIS’ false claim that the Las Vegas Shooter of last Sunday 2 October 2017 was a radicalised convert.  There are tools online that can help any business or agency verify or clarify any information you might come across online to determine whether the incorporate is both valid and correct. Some tools are outlined below:

  • Google Image Search – this is a simple tool that functions in Chrome. You can right click on an image and ‘search’ for it on other websites.  This helps verify the provenance of the image, as well as ascertain whether it has been used in the right context.  Some ‘fake news’ sites can easily take photos from anywhere on the Internet and caption them for their own purposes.  This ensures that you can actually believe what you see.
  • Search Referral Sites – Search Engine Optimisation software (SEO) can be useful in data mining websites by finding out who or where they are linked or connected to. This is particularly useful as some sites may have affiliate links that can be fake sites or spam news pages, set up only to garner webpage hits or divert viewer traffic.
  • Fact checking Sites – There are some websites that search out the truth for you. Sites like Snopes.com[3] are quick to verify any news items.  More often than not, they are quicker to verify online information than some news sites.

Critical thinking can only be informed by good critical information.  Gathering intelligence is essential in creating successful security procedures and business plans in general.  Intelligence gathering also means that you may learn of new security issues – such as discovering the expanse of the deep web or finding out that certain news items are completely false.  Learning to understand the information available to us can be hard, but managing how we understand it is the first step to optimising online security and driving intelligence gathering.

If you believe your organisation would benefit from the use of open source intelligence, do not hesitate to contact Agilient for advice and assistance in intelligence gathering activities.

The Agilient Team

 

[1] https://deeperweb.com/

[2] https://archive.org/web/

[3] https://www.snopes.com/

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2023 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane