Blog | The Art of Operating Online

An image of a magnifying class and data, representing end of data tracking by third-party cookies.

The Future of Ad Tracking

Google, Apple, and Firefox are each shutting down support for third-party cookies—also known as “tracking cookies”—citing an increased need for privacy online. Additionally, the U.S. government’s movements towards increased data privacy will lead to further regulations against formerly commonplace data-tracking methods.

Tracking the Olympic Park Bomber

Between 1996 and 1998, American terrorist Eric Rudolph coordinated four bombings in Georgia and Alabama, including the Centennial Olympic Park attack at the 1996 Summer Olympics in Atlanta. In our Timestream case study, we discuss Rudolph’s attacks as well as the lengthy law enforcement investigations established to arrest him.

laptop computer on the table with notepad and coffee cup with Ntrepid logo in foam

IDC Technology Spotlight — Isolated Web Browser

Isolation: Defining a Fresh Approach to Cybersecurity Let’s face it. The 2017 cybersecurity reality is bleak, and the task of guarding cyber assets is increasingly difficult. Discover the four key trends to cybersecurity in 2017 and how to take a fresh approach. Download the IDC Technology Spotlight to learn more. An Isolated...

blue banner person using laptop keyboard

Virtual Interview Tips at Ntrepid

Secure Your Dream Job from Home While COVID-19 has caused many sudden changes, we’re still hiring! Ntrepid is looking for dedicated career seekers to join our company. As we move our interviews to a virtual setting, we’re here to help you maintain your confidence and succeed in communicating your expertise. Follow our tips as you prepare for and engage in virtual interviews.  1. Do your...

Breaking Down the OSINT Cycle

Transforming open source data into intelligence, or OSINT, has become increasingly complex over the last decade. Although more open sources are available to operators, the dramatic increase of false information and adversarial counter attacks online have made the collection of data an even more tedious process. Known as the...

NXIVM Timeline: Chronology of a Cult

NXIVM (pronounced “nexium”) is an organization that began as a multi-level marketing self-help class. Former members and victims of NXIVM have since revealed the underlying abusive tactics used by the leaders of the organization to exploit their followers throughout the organization’s 15-year tenure. This Timestream case study follows the...

Tareck El Aissami: Study of a Wanted Fugitive

Tareck Zaidan El Aissami Maddah is a notorious narcotics trafficker and wanted criminal who currently serves as the Minister of Industry and National Production in Venezuela’s illegitimate Maduro regime. In our Timestream timeline, we chose to create a profile of El Aissami, tracking his political career, narcotics dealings, and...

Defining Active vs. Passive OSINT

Though the open web is typically just that—wide open for internet users to access—modern websites and popular social media platforms now require users to create accounts in order to enter. With this variation in barriers to data, online users have to adjust their information-collection methods in web spaces that...

Aum Shinrikyo: Tracking Cult Terrorism

In this Timestream timeline, we examine the Aum Shinrikyo cult and their infamous sarin attack on the Tokyo subway system. Our evidence visualization tool outlines the cult’s efforts to produce biological weapons, the public’s response to the cult, and the aftermath of the Tokyo violence. 

The Ethics of Social Media Platforms

Social media platform creators have been accused of building technologies that addict and persuade consumers. To study the different methods social media platform designers use to entice and engage users, we created a Timestream timeline. Our timeline contains key facts concerning these social media platforms, accusations against their creators,...