Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,930 --> 00:00:09,130
In this video, we're talking about what is isn't so Wikipedia's entry about URLs that I really like
2
00:00:09,130 --> 00:00:09,490
a lot.
3
00:00:10,330 --> 00:00:12,520
And it states open source intelligence.
4
00:00:12,820 --> 00:00:20,290
Olson is data collected from publicly available sources to be used in the intelligence context in the
5
00:00:20,290 --> 00:00:21,650
intelligence community.
6
00:00:21,670 --> 00:00:29,890
The term open refers to overt, publicly available sources such as covert or clandestine sources, is
7
00:00:29,890 --> 00:00:33,340
not related to open source software or public intelligence.
8
00:00:36,150 --> 00:00:40,440
So what are some things that we could actually find with those?
9
00:00:40,620 --> 00:00:47,220
Well, using those whom we could find things like email addresses, phone numbers, addresses, identities
10
00:00:47,760 --> 00:00:53,430
we could do, background checks we could use social media account when social media accounts and information
11
00:00:53,430 --> 00:01:01,200
on social media accounts, criminal records, we can investigate potential scams and other things such
12
00:01:01,200 --> 00:01:06,300
as passwords, deleted content from the internet and whatnot.
13
00:01:07,640 --> 00:01:12,140
There's quite a variety of things that we could actually use open for and to search for.
14
00:01:13,660 --> 00:01:16,240
So who uses Ozone?
15
00:01:16,780 --> 00:01:23,230
Well, a lot of people will use Olsen, such as law enforcement security professionals, most attackers
16
00:01:23,230 --> 00:01:28,180
even use illicit businesses, investigators, journalists and home users.
17
00:01:30,460 --> 00:01:39,860
Now, using the different tools of Open-Source tools and open source records and whatnot, such as trace
18
00:01:39,860 --> 00:01:45,610
like Linux, which we're going to be getting into later in the course Maltego, Google fans, operators
19
00:01:45,610 --> 00:01:51,370
et cetera, we could take all this data and actually begin to build a larger picture.
20
00:01:53,670 --> 00:01:54,120
So.
21
00:01:55,240 --> 00:01:59,980
By taking this information again, we can piece together the information into a bigger picture.
22
00:02:00,430 --> 00:02:04,600
So see a Facebook user name.
23
00:02:04,600 --> 00:02:07,000
We're doing an investigation on a Facebook user.
24
00:02:07,180 --> 00:02:12,700
Well, that Facebook user could potentially lead to a specific Facebook post.
25
00:02:12,970 --> 00:02:17,170
The fact that Facebook post may have been what originally brought us here the specification.
26
00:02:17,920 --> 00:02:23,260
So from the Facebook post, we might be able to generally find their Facebook name.
27
00:02:23,260 --> 00:02:30,190
Their Facebook may name a lead of the user's email address, location, listing work and so on and so
28
00:02:30,190 --> 00:02:30,430
on.
29
00:02:32,170 --> 00:02:37,420
And from there, we might be able to take that email address and then research a data breach, don't
30
00:02:37,780 --> 00:02:44,140
that data breach don't will most likely come up with a user's password hash that password hash on hashing.
31
00:02:44,140 --> 00:02:47,770
It will most likely reveal that a unique password, hopefully.
32
00:02:48,790 --> 00:02:55,630
And that unique password could then be used and searched to find a user's real email address, potentially
33
00:02:55,840 --> 00:03:01,060
that real email address could potentially lead to the user's real identity in location.
34
00:03:01,360 --> 00:03:06,280
And this would all start from, say, a Facebook username or a specific post on Facebook.
35
00:03:07,450 --> 00:03:07,840
Now.
36
00:03:08,970 --> 00:03:15,360
As we gather and analyze this data on our target, again, the data can lead to and to other users in
37
00:03:15,360 --> 00:03:22,110
that in that can Iraq, whether that particularly Iraq with our target rather and by collecting information,
38
00:03:22,110 --> 00:03:25,740
we ultimately build a broader picture of what we're looking for.
39
00:03:26,160 --> 00:03:31,290
So again, all these little pieces that we're finding username a post somewhere.
40
00:03:31,650 --> 00:03:33,480
Well, password, a data breach.
41
00:03:33,780 --> 00:03:35,730
A unique, unique username.
42
00:03:36,390 --> 00:03:41,880
All these little things will potentially splinter off to other places in other information they will
43
00:03:41,880 --> 00:03:45,300
find and ultimately when we bring all the information back together again.
44
00:03:46,350 --> 00:03:48,120
It helps build a larger picture.
45
00:03:50,620 --> 00:03:57,580
Now, people that use Olsen, for example, employers might check their social media so.
46
00:03:58,690 --> 00:04:04,000
Employer checks or social media, it could be potentially be for, well, finding out what people think
47
00:04:04,000 --> 00:04:11,230
about their company potential grievances people have with the company in this case.
48
00:04:11,410 --> 00:04:18,700
KFC worker fired after Facebook show photos show her looking potatoes and also the person that took
49
00:04:18,700 --> 00:04:22,870
the photo, so doing some investigation potentially could lead to this.
50
00:04:23,890 --> 00:04:29,290
I'm sure some like this would quickly hit the news and come up in their radar anyways.
51
00:04:29,290 --> 00:04:37,270
But being proactive, a company doing an investigation, runny nose and searches on a periodic or regular
52
00:04:37,270 --> 00:04:43,360
basis may potentially get a hold of this before it actually gets out and damages her reputation.
53
00:04:43,750 --> 00:04:48,730
So again, employers may use those in to monitor social media activities related to their company and
54
00:04:48,730 --> 00:04:51,010
or its employees, for example.
55
00:04:53,930 --> 00:05:00,880
It can also be used for, say, dating sites like Tinder or any number of online dating services.
56
00:05:01,750 --> 00:05:07,750
And this can be for in this in this representation, it's a woman sort of going on online dating, and
57
00:05:07,750 --> 00:05:14,620
of course, it can be anyone but individual may use open to verify the individuals who are considered
58
00:05:14,620 --> 00:05:15,310
going on a date.
59
00:05:15,310 --> 00:05:19,090
With that, they're accurately representing themselves.
60
00:05:20,660 --> 00:05:27,110
Again, people being online tend to, well, exaggerate sometimes or flat out lie.
61
00:05:28,310 --> 00:05:31,460
And when it comes to online dating, they can be especially dangerous.
62
00:05:32,480 --> 00:05:34,460
Unfortunately, more so for women.
63
00:05:35,370 --> 00:05:42,780
So again, a woman may use it to if they see someone that that there seem to be getting along with,
64
00:05:42,780 --> 00:05:47,820
they might use those and actually dig deeper into this purse and find out will they say they work here
65
00:05:47,820 --> 00:05:54,690
and they and they have a home and in this and that and it does he know something maybe potentially dig
66
00:05:54,690 --> 00:05:55,600
through and go, well, OK.
67
00:05:55,600 --> 00:05:56,490
And our photos fake.
68
00:05:57,240 --> 00:05:59,220
They use some stock photo.
69
00:05:59,410 --> 00:06:00,820
Oh, that's not really them.
70
00:06:00,840 --> 00:06:03,390
That's not really the location that they say they're coming from.
71
00:06:04,230 --> 00:06:06,930
Or they may have a criminal background that they denied.
72
00:06:07,170 --> 00:06:12,990
Things like that it could help protect a person from potentially potential.
73
00:06:13,260 --> 00:06:17,610
Well, we could say fraud or misrepresentation of themselves.
74
00:06:19,570 --> 00:06:24,610
Now, law enforcement or network admins could potentially use those to go after a malicious hacker.
75
00:06:24,820 --> 00:06:30,970
So who can help track down malicious hackers a compromised network or try to compromise the network
76
00:06:31,240 --> 00:06:38,710
again by taking the information such as wherever they have email address, a IP address, whatnot?
77
00:06:38,710 --> 00:06:44,410
They could potentially use that to trace back to whoever attacked their network or again attempted to
78
00:06:44,680 --> 00:06:45,760
protect their network.
79
00:06:46,450 --> 00:06:48,040
So these are all different things that.
80
00:06:49,090 --> 00:06:52,240
That also could be used for essentially what Osama is.
8777
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.