Posts

HACKED! The evolution of Private Sector Cyberwar in the current Ukraine conflict.

Firstly, with this conflict not even 12 months old, its important we clearly state one thing. Historians, analysts and military tacticians at large will dissect nearly every part of this conflict with the intent of drawing out as much information and intelligence as possible however this will have to be done in the future, when some form of peace has been obtained. Assessing current combat strength, effectiveness and ability to conduct operations unimpeded on Ukrainian soil is well beyond the scope of this article. We’ll leave that bit to the historians, today we’ll purely be discussing the Ukrainian response to those initial days and what was done to assist to transitioning Ukraine from a force under pressure and near collapse due to enemy invasions to a first rate fighting force, using tactics weapons and innovations that any tier 1 military can be proud of. As we approach the 12 month anniversary of the “special military operation”, that anyone else would call a war, we’d like to ...

We're published! The first 2 investigator515 books are ready for release.

Image
We're now published!!!!! 2 Live, 2 to go We missed the Wednesday blog cycle this week, for one very important reason. We've just finished our first round of publishing!!! We figured that its never great missing a post during the cycle, but missing it because you're compiling things to be published is mostly acceptable right??? Hold on, cause we're about to fill you in on exactly whats happening for us over the next few months. Firstly, after a short and brief love affair with google and blogspot, the investigator515 blog is now moving to a now home. Originally found at investigator515.blogspot.com, while we configured the site and domain for catfisher.info the new subdomain will be going live this week. We've attatched it to the catfisher.info site to keep everything streamlined, however we will leave most other things unchanged. There'll still be two publications a week, one on Wed and one on Sun, and we'll still rotate through OSINT anaylsis', curren...

Basic Counter Surveillance for Travellers and Tourists.

Note: In this article we've provided some affordable options for those who wish to go a step further in regards to securing their privacy. These are provided through affiliate links, through which we may recieve a small commission. Whilst you wont find commercial counter surveillance devices cheaply on amazon, there are some effective ways to attain affordable peace of mind. When it comes to traveling and staying in a new place, whether it's an Airbnb property or a hotel, there are a number of risks to consider in terms of privacy and security. One of the most common risks is traffic interception, which occurs when someone intercepts the network traffic of a guest, allowing them to see sensitive information such as login credentials and credit card numbers. This can happen through the use of a malicious Wi-Fi network or by hacking into the hotel's network. Some guests have reported finding hidden cameras in their Airbnb properties or hotels, which can be used to spy ...

OSINT. Oh What? How Open Souce Intelligence Connects our World

Image
Jake11 found via OSINT. Jake11 has been extensively tracked providing ELINT data during the ukrainian war. OSINT has become a bit of a buzzword, whilst becoming more blurred on whats actually classified as open source intelligence. Today we'll look quickly at some of the ways open source intelligence connects our world behind the scenes. First, lets get a ChatGPT refresher on just what exactly is defined as open source intelligence, and a quick history of its evolution. Open source intelligence, or OSINT for short, is like a treasure hunt for information. Imagine a group of detectives scouring the streets, looking for clues to solve a mystery. Except instead of physical clues, they're searching for information in the vast expanse of the internet and other publicly available sources. The history of OSINT can be traced back to the early days of intelligence gathering, when spies would sneak into enemy territories to gather information. But with the advent of the internet ...

Online Dating and Metadata: What You Need to Know

Image
Online dating has become a popular way to meet new people, but it also comes with its own set of risks. One of those risks is the potential for metadata to reveal information about your location and habits. In this article, we'll take a closer look at metadata and the other risks associated with online dating apps. First, let's define metadata. Metadata is data that is embedded in a digital file, such as a photo, that provides information about the file and the device used to create it. This metadata can include information such as the date and time the photo was taken, the location it was taken, and the device's unique ID. When you share a photo on a dating app, this metadata can also be shared, potentially revealing information about your location and habits. Location sharing is another potential risk associated with online dating apps. Many dating apps, such as Tinder, allow users to share their location with potential matches. While this can be a convenient feature f...

ad social bar