Interested in Competitive Intelligence qualifications. We are faculty members of the Institute of Competitive Intelligence offering Accredited CI & MI training.
No matter how good your company’s cyber hygiene is, a targeted attack will penetrate your networks and systems. The Idaho National Lab suggests another approach. It's not perfect but may be safer than current approaches.
Learn to think like your adversaries. You might go as far as to build an internal team charged with continually assessing the strength of your defenses by trying to reach critical targets. The team should include experts in the processes in question, control and safety systems, and operational networks.
Even if you can maintain consistently high levels of cyber hygiene, you must prepare for a breach. The best way to do that is to create a cyber safety culture similar to those that exist at elite chemical factories and nuclear power plants. Every employee, from the most senior to the most junior, should be aware of the importance of reacting quickly when a computer system or a machine in their care starts acting abnormally: It might be an equipment malfunction, but it might also indicate a cyberattack.
Finally, a Plan B should be ready for implementation if and when you and your team lose confidence in systems that support your most critical functions. It should be designed to allow your company to continue essential operations, even if at a reduced level. Ideally, the backup system should not rely on digital technologies and should not be connected to a network — particularly the internet. But at a minimum, it should not exactly replicate the one in question, for an obvious reason: If attackers were able to breach the original, they’ll be able to easily invade one identical to it.
Based on US data derived from Quantcast and Global Data from Alexa and SimilarWeb. No surprises in top 3 or 4 but some interesting survivors in bottom ranks. #Search #SearchEngines ... See MoreSee Less
The Best Private Search Engines — Alternatives to Google
Private search engines have seen huge growth over the past few years. Until recently, it was unthinkable that anyone could compete with Google in the search realm. However, there are now many smaller players in the search game that are growing rapidly. Google’s market share has declined from 78.7 percent in February 2017 to slightly below 70 percent in February 2018.
A few of these search engines, including DuckDuckGo and StartPage began as normal search engines with no privacy enhancements. However, after they realized the massive risk associated with storing so much data, they decided to take a different approach. Your privacy really matters, and these search engines can help you stay private online.
Competitive Intelligence is legal and ethical. However often there can be blocks on what is done put up by the legal department because they either do not understand what CI is, or they are hypersensitive to how it is done and the implications (especially if they've heard about when things go wrong).
Brian Reuter's blog post gives some good advice on what to do and how to overcome legal objections. (He doesn't mention aspects such as when social media is blocked as this is now such an important part of CI collection. However the principles he gives apply to this too).
It's also essential to know the law yourself. I once did some work for a US based client - and included detailed finances on the company of interest. Shortly after, their legal counsel called me and said that they would not be paying me as I'd breached CI ethics in that there was no way I could have legally obtained the level of detail I'd provided on a private, non-quoted company. They would have been correct if the company being looked at had been based in the USA. In fact it was British and there is a legal requirement to file detailed company accounts. I'd used the official registry data and once I'd explained this and showed it was legal, there was no issue.
I've had other cross-border situations - e.g. the law relating to recording conversations differs across jurisdictions. In the UK it is currently legal to record a phone conversation without letting the other party know. In some locations this is not the case - so you need to know what you can and can't do.
Essentially the mix of legal and CI is a mine-field - so make the legal department your friend so you stay within the law, but also make sure they also know how important CI is for the company and hence their own jobs within your company. ... See MoreSee Less
FindSubDomains.com allows you to identify subdomains for a website. Often these will not be indexed by search engines and so can give hard-to-find intelligence.
Michael Bazzell, one of the world's best #OSINT researchers, emphasises the importance of checking for subdomains and gives a case example of how this can help in research - specifically for an emergency landing after a SouthWest flight - where he was looking for additional information that was not available on the normal pages. He shows this can include hyperlinks to subdomains, IP addresses and countries of origin - all information that can really help an in-depth competitive intelligence or OSINT investigation.
I have stressed the importance of searching subdomains for several years. Online services for this come and go, and application-based solutions such as Knock and SubBrute have various levels of succes...
- You want to complain to the CEO of a company that's given you poor service: send an email but will it get through? Of course not unless you get to their main / private email that's not filtered to their spam box. - You want to check somebody out - are they who they say they are? Find their email. - You need to contact somebody - for pretty much anything - but either don't have their phone number or don't actually want to phone them. Find their email and contact them that way. (You may not care whether or not they contact you back - the key thing is you've got to them. And with some email systems you can add a "read" receipt marker so you know the email was opened and didn't go straight to delete).
Finding email addresses when you don't have them in your address book can be tough. These 12 tricks can help. #OSINT #EMail #CI ... See MoreSee Less
When Solving Problems, Think About What You Could Do, Not What You Should Do buff.ly/2I7rvn6
Sometimes following the rules doesn't solve the problems. It's not what you should do but creatively thinking "what you could do" that gets the top results.
One example: Captain Chesley Sullenberger - the pilot of a USAirways jetliner that, shortly after taking off from La Guardia Airport hit a flock of birds and lost both engines. The most obvious course would be to head to the nearest airport — likely with catastrophic results. Sully allowed himself to think about what he could do. He decided to put the plane down on the Hudson River, and everyone was saved. ... See MoreSee Less
Telling stories is what humans have done since we lived in caves. It was how we used to pass on knowledge - and still do when we read to our children. However at some point this skill was seen as childish. To show expertise you had to show that you had mastered something complex and could talk about it in technical terms. This ignored that to really show mastery you need to be able to explain things in simple language. To really communicate you need to engage with the recipient and that needs to be in terms that are easy to understand. Often a story is the way that works best.
In fact you can go further - and make up a story or parable to illustrate something complex - and not only will be understandable but if done correctly it will be memorable. The catch is to be able to create a story that is accurate. It's not a technical skill. It needs creativity and that may not come from the PhDs and technicians but those that can understand the technology and explain it in non-technical terms. ... See MoreSee Less
Google, Bing, Amazon, Facebook - they all store your searches. The aim is two-fold. 1) These services get to know you and what you want or like - so they can give you results that match your interests. This is NOT a good thing as it can mean that your results are biased. It's often called a "filter bubble" in that these services filter what you get - ensuring you get more of the same. As you like the results, you'll be happy with the service (unless you are a professional searcher and don't want biased results - the bias is giving you more of the same). 2) These services get to know you and what you like - so they can give you targeted adverts. That's how they make money and the more targeted the advertising, the more likely you are to click and buy - making the advertisers happy and likely to spend more money advertising.
So if you don't want to be tracked in this way - how do you purge your search histories. Each service is different.....
The Hidden web refers to the parts of the web that's hard for search engines such as Google to access. Whether looking for ancestry, legal records, local history and more, knowing how to access the hidden web can make you more effective for finding information on people, products or places that's held in password protected databases rather than on the "open web" that's easily searchable.
This article gives a number of methods and sites that can kickstart knowhow on navigating those parts of the web that Google and Bing don't reach.
For some time, Google Scholar has ruled the roost for academic search - followed by Microsoft Academic (buff.ly/21SySBA). Now there's buff.ly/1Trkznz. Although this is a quarter of the size of Microsoft Academic's claimed 174m publications (with 40m) it claims its approach using Artificial Intelligence will help it become better than its competitors.
Currently Semantic Scholar is limited on the areas covered. (It started with neurology, computer science). It was founded by Microsoft's Paul Allen and the Allen Institute for Artificial Intelligence (allenai.org). Semantic Scholar says it uses machine learning rather than keywords to improve its “understanding” of a research paper with the help of semantic analysis, natural-language processing, and computer vision. It goes beyond text by extracting information from images, tables, and captions. It also claims to weight citations based on how a citation has been used in further research or overall relevance so has the potential to give better results. .
Although Semantic Scholar is currently limited in what it covers, its aim is to be an alternative to Google Scholar and so is worth watching. ... See MoreSee Less
The news now often includes items mentioning the deep web. The Deep web refers to any Internet content that, for various reasons, can’t be or isn’t indexed by search engines like Google or Bing. This includes dynamic web pages, blocked sites, limited access networks, intranets, and more. However this is NOT the dark web which is what most of this article talks about. #OSINT professionals will be familiar with the first six items listed. The 7th is the challenge: to catch criminals using the dark web to hide their operations - without getting confused about the legitimate deep web! ... See MoreSee Less
You’ve probably heard about the Deep Web; it become more well-known circa 2013 when the FBI took down the Silk Road drug marketplace. This brought widespread attention to the level of underground ac...
Researchers have developed a new generic method to detect fake accounts on most types of social networks, including Facebook and Twitter. The new method is based on the assumption that fake accounts tend to establish improbable links to other users in the networks. buff.ly/2H7TbGX #OSINT #FakeNews ... See MoreSee Less
“Webhose takes aim at the Dark Web”. Webhose.io scours the #DarkWeb looking for illegal activity - including BitCoin transactions - offering #Cybersecurity threat intel, homeland security, fraud, anti-money laundering & law enforcement services. buff.ly/2JOaa2M #OSINT ... See MoreSee Less
Using Google to search onion sites is like using a hammer to screw in a nail. You don't get the same result and you may end up breaking something and/or hurting yourself.
This is a list of 11 alternatives for searching TOR or for anonymous browsing. (Or maybe 10 - as Parazite timed out when I tried to access it. That's not unusual with dark-web sites. They do have a tendency to disappear, although some, like the Hidden Wiki, have been around for a long time even if not always in the same place). The list includes favourites like DuckDuckGo and also other lesser known search sites. #OSINT #DarkWeb #search ... See MoreSee Less
11 Best Illegal Search Engines - Do you want to know about the illegal search engines that offer hidden internet results if yes this post can help you because post have 10 best hidden search engines t...
Gmail is secure. Netflix is secure. Together they're a phishing threat - and the reason is dotty! buff.ly/2Eyo05M
Gmail emails ignore dots so firstname.lastname@example.org is the same as email@example.com or even firstname.lastname@example.org.
Many other systems don't ignore the dots and treat them as separate emails. This means that someone could register using a gmail account they'd harvested BUT add dotl. The system (in the example) Netflix would be happy and the new account could then be used to phish in a way that would look as though it was a real email from the service. When you'd reply the hacker would now have your details! #OSINT #CyberCrime #Phishing ... See MoreSee Less
Often you need a particular sort of image for a presentation, document or just to check and compare something. It may be a particular colour, size or type, or perhaps you need something that is copyright free i.e. can be used without paying the owner / creator.
Sadly Google changes image search options - in the same sort of way that it changes its main search options. A recent change has been the removal of the "View image" option - due to Getty Images protesting that this led to copyright theft. Now you have to visit the page holding the image (and hope it's still there - sometimes it isn't).
Google's image search facility offers capabilities that help in this search - and this guide gives a starting point. Search is not static and it's important to keep up-to-date. There's much more - reverse image searching for example. There are also other search engines with image search capabilities. TinEye.com for reverse image searching, and Bing's image search is an excellent Google alternative with some useful variation. ... See MoreSee Less
Voice #search is growing. ComScore estimates that by 2020, half of all searches will be voice searches. This will impact #SEO as the way people make voice search queries is different to typed searches. #Marketing ... See MoreSee Less
Finding a phone number used to be done with a phonebook. Today there are many more ways - including reverse-lookups to find out who phoned you. Here are 8 ways you can check a phone number online. They may not all work but they are worth a try. (One way is to use Facebook. You can also search for people on Facebook - here are 8 ways to find people on Facebook too: buff.ly/2FCIWOb)
As the world becomes increasingly global, the importance of searching in multiple languages grow. A document may be in Chinese but the tags and abstract could be English. Parts of a German document may include terms from French.
It's easy to translate search terms but what happens if you don't know the language an article will appear in. What's needed is a "cross-lingual" search where terms are translated automatically. This is not as easy.
Martin White looks at some of the implications of cross-lingual searching - and this is an area that will increase in importance. ... See MoreSee Less
What is the importance of competitor analysis to a business? Many small and medium enterprises do not consider competitor analysis as one of their primary tasks. Yet a competitive environment is necessary for the growth of any business. Hence knowing what all your competitors are doing is very important.
Ever wondered why an organization offering the same set of services/products is much more successful than your business? Here comes the need for competitor analysis. It helps your business stay ahead of the competition and helps measure the success of your business idea.
The primary task here is to identify the real competitors who belong to the same league or industry. In other words, look out for the brands that offer the same range of services and products and are at par with your business level. This makes you well aware of the outcome of strategies when they would be implemented. The ultimate aim for analyzing a competitor is to identify the right audience that could convert into your potential customers.
A well framed analytical strategy helps a business to know its faults as to why a particular idea is not working well for the company. Competitor analysis helps you understand how you can rule your competitor’s market. Here are the advantages of competitor analysis:
Identifying your Audience Predict Demand and Supply SWOT Analysis for Marketing your Business Brand Reach Understand the Competitor’s Market Know their Strengths and Weaknesses
For your business to continue to grow, there are really only two ways to get customers. One way is to take customers away from an existing player, and the other is to create a new market with a new product or service that didn't exist before.
Examples of recent "new market" big wins include Apple with iTunes for digital music, Uber for ride sharing, and Airbnb for renting a spare room.
Business growth by creating new markets is now popularly called the "blue ocean strategy," based on a classic book with the same name. The alternative is a "red ocean strategy," where everyone is swimming within the same predefined industry boundaries, and cutthroat competition is turning the ocean a bloody red.
A blue ocean means new and uncontested territory.
The Blue Ocean authors, W. Chan Kim and Renee Mauborgne, have recently published an update, called Blue Ocean Shift, It compares the successes and failures of blue ocean business efforts in recent years, and offers some specific guidance on shifting to this strategy - with 5 steps that are needed. .
1. Target the area where you have to most to offer and gain. 2. Build an objective view of the strategic landscape. 3. Uncover hidden pain points that limit your industry. 4. Reconstruct market boundaries to allow new solutions. 5. Finalize your move with market tests and business models.
These steps are essentially the same, whether your business is mature, or a startup. However it's a lot more fun to systematically explore new territory, than to endlessly chum the existing sharks.