WP Cybersecurity
WP Cybersecurity
OSINT
IN CYBERSECURITY
in CYBERSECURITY
WHAT IS OSINT?
An acronym standing for ‘open-source intelligence’, OSINT Although open-source intelligence has now spilled over
refers to the extraction and analysis of open-data – to commercial sectors, where it is leveraged in various ways,
information which is in the public domain and legally its importance for law enforcement agencies (LEAs) and
accessible to all. While the name evokes espionage,
intelligence bureaus has become ever more profound.
the publicly open nature of its sources gives OSINT broader With 80-90% of crucial modern intelligence data rumoured
from what we might think of as traditional intelligence. of modern reconnaissance and investigation processes.
and objectives.
and private sectors.
2022 01
DEFINING OSINT AND ITS USES
in CYBERSECURITY
2022 02
DEFINING OSINT AND ITS USES
in CYBERSECURITY
AGAINST CYBERCRIME
T hreat
OSINT methods and technologies are commonly used to identify breach surfaces,
In tell igence which could take a multitude of forms across open platforms. For instance, an
employee’s social media account publishing adverts would be a clear indication
of hacked credentials which could give the hackers access to a company’s critical
assets by extension. Sweeps performed by open-source intelligence tools can quickly
home in on an array of such vulnerabilities.
Data Leak Even with the most throughgoing precautions, companies must prepare for potential
Detect ion breaches, since they are almost inevitable. Open data is a uniquely effective resource
for finding evidence of a leak or security breach connected to the target. Indications
of data leaks appear online, but are often buried in the general flood of open data.
OSINT tools can continually monitor sources across the Surface, Deep, and Dark Web
so that when a breach does occur, it is identified promptly. This can save companies
millions of dollars.
Digi tal
Quality cybersecurity assessments often hinge on OSINT methods of profiling and link
Footprin t ing
analysis: by bringing together a subject’s interests, connections, affiliations, modes
of interaction, a detailed picture of the subject emerges. Such pictures can map out
Inciden t
IR is a procedure for ensuring that an organization can effectively respond to security
Response breaches or cyberattacks as they arise. The process involves investigation, mitigation,
and recovery from security breaches, as well as prevention against future incidents.
By filtering open sources for the most up-to-date data iterations, OSINT solutions
allow security breaches to be accurately understood, greatly facilitating the challenge
Social Corporate security units often leverage open data to determine employee
Engineering susceptibility to threat actors. By scanning employee accounts across social media
Coun termeasures and other services such as Outlook, Dropbox, etc., the subject’s activities can be
checked for phishing content, and the employee can also be assessed for their
capacity to deal with such threats.
Blockchain While there is a perceived anonymity to bitcoin and other cryptos, by using OSINT
Analysis tools to explore blockchains intelligently, laundering systems can be unpacked, and
transactions can be linked to other identifiers on the Surface Web, or even user crypto
addresses themselves. Also, because malicious addresses tend to appear in scam
reports, ongoing investigations, and social media discussions within the crypto
community, OSINT tools can quickly flag up suspect crypto entities.
2022 03
DEFINING OSINT AND ITS USES
in CYBERSECURITY
A SHIFTING LANDSCAPE
CHALLENGES SOLUTIONS
AMOUNT
OSINT investigators have to scour huge IT companies and governmental
OF DATA
volumes of data at demanding speeds. departments have developed
The gathering process is complex, automated solutions specifically
propaganda is rife throughout the web, This process leads to a higher degree
of false or warped data that can mislead in turn, indicates the degree of reliability
investigations. for many types of information.
WORKFLOW
People continually need to vet the output The ever broadening use and versatility
SPEED
generated by OSINT to establish how of AI technologies such as machine
AND QUALITY
reliable the retrieved data actually is. learning and natural language
Such routine work consumes time and processing can take care of many
human resources, and often has
aspects of data retrieval, organization
a detrimental impact on a case’s and processing. AI models can quickly
progress. A major difficulty is that sort diverse, nebulous data into
investigators suffer from research coherent, workable material.
fatigue and make increasingly ineffective This means investigators can devote
decisions. Furthermore, since open data more energy and headspace to the
is naturally diverse, making connections decision-making process, which results
to ascertain accurate and current results in faster data extraction, more
can compound these pressures. sophisticated analysis, and ultimately
refined, superior intelligence.
DATA
Traditional databases used for criminal In providing totally up-to-date data
2022 04
DEFINING OSINT AND ITS USES
in CYBERSECURITY
INDUSTRY POTENTIAL
As the necessity of OSINT techniques and tools has become The OSINT industry now comprises multi-million euro markets
ever more widespread and apparent, the field has seen
in all major regions of the globe – figures which are expected
an immense increase in investment. Huge commercial interest increase over the next decade to reach an estimated growth
from Law Enforcement, Cybersecurity, and Corporate Security value of 17.9% by 2028.
sectors have propelled the industry to its current, booming
international status, which is only set to continue expanding.
15% 18%
e urop e SL
12% custom e r s
22%
25% 247 18%
n a SL gb
custom e r s us
36 nl
26%
106 96 22 DE
fr
35 10%
23% 17 ch
24
es
IT
16 30 8% 13%
il
13% 9% 17 apac SL
mx
In
custom e r s 21%
12
m e a SL
16
39% 100
19% custom e r s
34%
53 9%
7%
5% 10% sg
11
17% Id
22
latam SL 21% br
custom e r s
40
15
39%
za
16% 11
EUROPE
CAGR: 19.3%
latAM APAC
CAGR: 10.7%
CAGR: 20.9%
* Note: The CAGR values in the figure have been Business Consulting Cybersecurity Edu Energy
estimated for the period of 2020-2028.
Finance Government and LEAs Healthcare IT (non-cybersecurity)
** Source: The Insight Partners Analysts Manufacturer Media / Journalism NGO Private Security
Retail & FMCG Companies Telecom Companies Other
2022 05
DEFINING OSINT AND ITS USES
in CYBERSECURITY
GROWTH DRIVERS
01
Global
02 03 04
The Explosion
Migration
The Maturity
as laundering tools,
blockchains have become
an indispensable resource
2022 06
DEFINING OSINT AND ITS USES
in CYBERSECURITY
ABOUT SOCIAL LINKS
Since the company’s foundation in 2015, Social Links has been With many clients from among the S&P 500 as well as
empowering LEAs, governmental bodies, businesses, and organizations operating at the highest levels of state, we have
commercial enterprises to harness OSINT in accomplishing established ourselves as a key company within the OSINT
core objectives, saving vast resources, and making the modern industry and continue to develop products that operate
digital world a safer place. at the forefront of a range of sectors including law enforcement,
national security, cybersecurity, insurance, banking, due
diligence, and more.
book a demo
2022 07