10 - October 2024
Last updated
Last updated
Welcome to the October issue of the OSINT eZine (#44). This issue includes topics such as report by OpenAI on cyber operations; Apple AI features not available in EU; Neo-nazis moving to SimpleX Chat; ENS integration in Google; a report on Advertisement Data; Emmanuel Macron security leaks; consequences of misinformation campaigns; how to perform geolocation investigations... and much more!
Hey Ho, Lets Go!:
Apple users outside the EU are starting to benefit from this month from the AI functionalities on their devices. Apple Intelligence provide features from writing tools to help refine your writing, to summarized notifications that surface what’s most important, to the ability to search for almost anything in your photos and videos by simply describing it. Bad times for EU users I guess...
https://www.apple.com/newsroom/2024/10/apple-intelligence-is-available-today-on-iphone-ipad-and-mac/
There is an increase need to identify AI-generated content. From images to video or texts, AI content is achieving a degree of realism that it is difficult sometimes to distinguish between human or machine. Google has made a real-world demonstration, in chatbot responses, were they showcased the possibility to label and watermark AI produced material.
https://www.nature.com/articles/d41586-024-03462-7
Another report by OpenAI, creators of ChatGPT, exploring how bad actors abused AI technologies to perform different operations such as influence campaigns.
Google has officially integrated ENS (Ethereum Name Service), allowing users to search for any .eth name and check associated balances directly within Google Search. Google began its integration with Ethereum addresses in May 2023. The search giant introduced a feature allowing users to search for these addresses and view the ETH balances directly in search results and now, it is possible to perform that searches by using ENS names.
In July of this year, Coinbase and Polygon Labs co-hosted a round-table in Brussels, with public and private sector participants, industry, academics, researchers and policymakers, to address key policy questions related to decentralized finance (“DeFi”). They released a summary with some of the key aspects of the discussions.
The field of misinformation is facing several challenges, from attacks on academic freedom to polarizing discourse about the nature and extent of the problem for elections and digital well-being. This article shares academic insights on the topic of misinformation and what resources can be used to combat it effectively.
An impressive report by the UN Office on Drugs and Crime (UNODC) titled "Transnational Organized Crime and the Convergence of Cyber-Enabled Fraud, Underground Banking, and Technological Innovation: A Shifting Threat Landscape". It covers a lot of techniques and methods used by cybercriminals to commit criminal acts, from money laundering with crypto-assets to the world of fake online casinos or scam romances. A must read for any expert or curious professional interested or dealing with cybercrime.
https://www.unodc.org/roseap/en/2024/10/cyberfraud-industry-expands-southeast-asia/story.html
This entry has the two sides of the history. The first one, is an article from Wired, informing about the transition of right-wing extremists groups from Telegram to SimpleX after Telegram's CEO arrest in Paris and the advantages they found on this new platform. Based on this article, SimpleX also reply with an statement about their platform and their understanding of users privacy.
https://www.wired.com/story/neo-nazis-flee-telegram-encrypted-app-simplex/
https://simplex.chat/blog/20241016-wired-attack-on-privacy.html
Another episode of relevant information disclosed on Strava, in this case, the security team of Emmanuel Macron. By browsing the public data shared by the President's security agents on the sports social network, the journalists of "Le Monde" were able to track some of the President's international movements, or even anticipate them. On their investigation, they found at least 12 members of his unit composed of gendarmes and police officers, to have published their performances in running on the social network (which records sports activities via GPS) with place of departure and place of arrival.
Google's latest flagship smartphone raises concerns about user privacy and security. It frequently transmits private user data to the tech giant before any app is installed. Moreover, the Cybernews research team has discovered that it potentially has remote management capabilities without user awareness or approval.
https://cybernews.com/security/google-pixel-9-phone-beams-data-and-awaits-commands/
We often hear the question, “Is my phone listening to me?” Generally, the answer is no, but the reason you may think that your phone is listening to you is actually quite complicated. The EFF (Electronic Frontier Foundation) has launched a new website called "Digital Rights Bytes" were they explain in detail these kind of topics.
https://www.digitalrightsbytes.org/topics/is-my-phone-listening-to-me
PQC (Post Quantum Cryptography) algorithms are already being rolled-up on different technologies, from instant messengers such as Signal to web-browsers like Brave. This post delves into the topic and provides several examples of software and platforms that already using these cryptographic advances.
This blog post covers extensively the topic of mobile advertising data. Based on portable devices Advertisement ID or AdID, this technologies allows companies and data brokers to create profiles of users with data such as localization, language or applications used.
https://krebsonsecurity.com/2024/10/the-global-surveillance-free-for-all-in-mobile-ad-data/
In the largest public analysis of Israeli military strike footage, Airwars, in collaboration with Sky News, reviewed hundreds of clips of strikes the IDF said were targeting Hamas and other militant groups in Gaza that were posted on official military social media accounts in the first month of the war. Despite the grainy videos published with few details on targets or locations, Airwars matched 17 strikes to specific Geo-coordinates.
https://idf-tweets-gaza.airwars.org/
A lot of different resources and techniques to improve your skills to investigate geolocation information. This blog post covers tools and online resources that can help you to enhance your searches when performing investigations on geolocation and location data.
This research article talks about a phenomena we call a Social Media Overt Covert Reaction Network (SOCReN). This is a hidden network of people established solely through social media post reaction emojis. In this paper we talk about how it was discovered, it’s characteristics, ways to currently detect it, and who would find this information useful.
https://bsquaredintel.com/social-media-overt-covert-reaction-network/
This article explores how OSINT and GEO-OSINT (geospatial OSINT) can be applied to identify Jonny Lee Miller’s apartment in Dumbo, Brooklyn, as reported during Angelina Jolie’s 2021 visit. With a mix of visual analysis, Google Earth, and Google Maps, this investigation shows the steps to gather location-based insights responsibly and effectively.
Domain Digger is a full toolkit for domain analysis. By using an attractive web interface, the tools allows to access detailed DNS information, get precise IP information and also, perform certificate checks and WHOIS.
https://github.com/wotschofsky/domain-digger
Chain Traverser is a service that indexes the Ethereum blockchain in memory and provides graph data through an API. It enables users to explore transaction relationships and find paths between addresses on the Ethereum network.
https://dictynna.com/graph/orb
Any fool can write code that a computer can understand. Good programmers write code that humans can understand.
~Martin Fowler, British Software Engineer.