examples.md
1 ## Table of Contents 2 3 - [Criminals: Leveraging OSINT for Malicious Activities](#criminals-leveraging-osint-for-malicious-activities) 4 - [Sony Pictures Hack (2014)](#sony-pictures-hack-2014) 5 - [Ashley Madison Breach (2015)](#ashley-madison-breach-2015) 6 - [Civilians: Utilizing OSINT for Advocacy and Investigation](#civilians-utilizing-osint-for-advocacy-and-investigation) 7 - [Identification of Russian Soldiers in Ukraine Conflict](#identification-of-russian-soldiers-in-ukraine-conflict) 8 - [BBC Investigation into Cameroonian Military Abuses](#bbc-investigation-into-cameroonian-military-abuses) 9 - [Law Enforcement: Applying OSINT in Investigations](#law-enforcement-applying-osint-in-investigations) 10 - [Tracking Stolen Property Online](#tracking-stolen-property-online) 11 - [Use of ShadowDragon's SocialNet](#use-of-shadowdragons-socialnet) 12 - [OPSEC Failures: Lessons from Real-World Mistakes](#opsec-failures-lessons-from-real-world-mistakes) 13 - [Guccifer 2.0's VPN Error](#guccifer-20s-vpn-error) 14 - [Silk Road's Ross Ulbricht](#silk-roads-ross-ulbricht) 15 - [References](#References) 16 - back to [main guide](../README.md) 17 18 [This Readme, guide or how-to](../README.md) provides a comprehensive collection of tools and guidelines related to Operational Security (OPSEC) and Open-Source Intelligence (OSINT). These resources are applicable to various groups, including criminals, civilians, and law enforcement. Below are real-world examples illustrating how these tools and practices have been utilized across these groups: 19 20 --- 21 22 ## Criminals: Leveraging OSINT for Malicious Activities 23 24 ### **Sony Pictures Hack (2014)** 25 Attackers conducted extensive OSINT to gather information about Sony's network infrastructure and employees[^6]. They utilized publicly available data from social media profiles and company websites to craft targeted phishing emails, leading to a significant data breach. 26 27 ### **Ashley Madison Breach (2015)** 28 The "Impact Team"[^5] exploited OSINT techniques to access and leak sensitive user data from the Ashley Madison website. The breach exposed personal information of millions, leading to blackmail and public shaming. 29 30 --- 31 32 ## Civilians: Utilizing OSINT for Advocacy and Investigation 33 34 **Identification of Russian Soldiers in Ukraine Conflict** [^7] 35 Online investigators used facial recognition tools like FindClone and PimEyes to identify Russian soldiers involved in the Ukraine conflict. By analyzing publicly available images and videos, they were able to match faces and uncover identities. 36 37 ### **BBC Investigation into Cameroonian Military Abuses** 38 The BBC[^1] employed OSINT techniques to verify the authenticity of a video showing Cameroonian soldiers executing civilians. By analyzing metadata, geolocation, and other open-source information, they confirmed the video's legitimacy. 39 40 --- 41 42 ## Law Enforcement: Applying OSINT in Investigations 43 44 ### **Tracking Stolen Property Online** 45 Law enforcement agencies[^2] have increasingly used OSINT to monitor online marketplaces like Facebook Marketplace and OfferUp for stolen goods. By analyzing listings and user information, they can trace and recover stolen items. 46 47 ### **Use of ShadowDragon's SocialNet** 48 Agencies utilize tools like ShadowDragon's SocialNet[^3] to collect data from over 200 online sources. This assists in mapping social networks and identifying relationships between individuals, aiding in criminal investigations. 49 50 --- 51 52 ## OPSEC Failures: Lessons from Real-World Mistakes 53 54 ### **Guccifer 2.0's VPN Error** 55 The hacker known as Guccifer 2.0[^4] failed to activate a VPN before logging into a social media account, inadvertently revealing their real IP address. This mistake led to the identification of the hacker as a Russian GRU agent. 56 57 ### **Silk Road's Ross Ulbricht** 58 Ross Ulbricht[^8], the founder of the Silk Road marketplace, made critical OPSEC errors, such as using his personal email address in early communications. These mistakes facilitated law enforcement's efforts to trace and apprehend him. 59 60 --- 61 62 These examples underscore the dual-edged nature of OSINT and OPSEC tools. While they offer powerful capabilities for information gathering and security, improper use or lapses in operational security can lead to significant consequences. Whether employed for malicious purposes, civic investigations, or law enforcement, adherence to best practices in OPSEC is crucial to safeguard individuals and operations. 63 64 --- 65 66 ## References: 67 68 [^1]: Human Rights Watch. "Cameroon: Soldiers Get 10 Years for Murder of Civilians." *Human Rights Watch*, 23 Sept. 2020, https://www.hrw.org/news/2020/09/23/cameroon-soldiers-get-10-years-murder-civilians. 69 70 [^2]: MPA, Brandon Burley. “OSINT Tools for Investigators to Track Criminal Activity Online.” Lexipol Media Group, 23 Aug. 2025, www.police1.com/investigations/thinking-like-a-criminal-how-osint-can-take-your-investigations-further. 71 72 [^3]: Department of Homeland Security. Freedom of Information Act (FOIA) Activity for the Week of March 20, 2025- March 26, 2025 DHS Privacy Office March 31, 2025 Weekly FOIA Report. 31 Mar. 2025, www.dhs.gov/sites/default/files/2025-07/25_0731_PRIV_Chief_FOIA_Officers_Weekly_Report_March_31_25_to_June_30_25.pdf. 73 74 [^4]: Department Of Justice. “Grand Jury Indicts 12 Russian Intelligence Officers for Hacking.” U.S. Department of Justice, 6 Feb. 2025, www.justice.gov/archives/opa/pr/grand-jury-indicts-12-russian-intelligence-officers-hacking-offenses-related-2016-election. 75 76 [^5]: Schifferle, L. W. (2016, December 14). *Ashley Madison settles with FTC over data security.* Federal Trade Commission. https://web.archive.org/web/20250801210212/https://www.ftc.gov/business-guidance/blog/2016/12/ashley-madison-settles-ftc-over-data-security 77 78 [^6]: “North Korean Regime-Backed Programmer Charged With Conspiracy To.” United States Department of Justice, 6 Feb. 2025, https://web.archive.org/web/20251006082434/https://www.justice.gov/archives/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and. 79 80 [^7]: Bhuiyan, Johana. “Ukraine Uses Facial Recognition Software to Identify Russian Soldiers Killed in Combat.” The Guardian, 24 Mar. 2022, www.theguardian.com/technology/2022/mar/24/ukraine-facial-recognition-identify-russian-soldiers. 81 82 [^8]: “Ross Ulbricht, a/K/a ‘Dread Pirate Roberts,’ Sentenced in Manhattan.” U.S. Department of Justice, 29 May 2015, www.justice.gov/usao-sdny/pr/ross-ulbricht-aka-dread-pirate-roberts-sentenced-manhattan-federal-court-life-prison.