What the paper basically explains is the basics of passive OSINT however it also includes a detailed explanation on the actual use of cybercrime-friendly forums to gather threat intelligence potentially signaling a "bad taste" trend further enticing users into joining these forum communities potentially contributing to the overall increase of cybercrime internationally.
What should be taken clearly into consideration in terms of possible recommendations for this research guide is that it doesn't take to become a cybercriminal in order to catch a cybercriminal and that on the majority of occasions the majority of information required to launch an investigation into the whereabouts of high-profile cybercriminals is actually publicly accessible.
Users who are interested in joining the world of threat intelligence gathering should consider going through my "The Threat Intelligence Market Segment - A Complete Mockery and IP Theft Compromise - An Open Letter to the U.S Intelligence Community" post including to actually join forces in my currently ongoing Law Enforcement and OSINT operation called "Uncle George" where the idea is to obtain a direct download copy of my "Cybercrime Forum Data Set for 2019" and participate in the actual enrichment and analysis of the forum communities for the purpose of assisting U.S Law Enforcement on its way to track down and prosecute the cybercriminals behind these forum communities.
Stay tuned!
No comments:
Post a Comment