Blog | The Art of Operating Online

blurred law enforcement vehicles with flashing lights

Stand-alone Laptop: OPSEC Failures During Investigations

Challenges for Law Enforcement Agents Using Stand-Alone Laptops The internet of things (IoT) is now part of virtually all investigations, bringing significant new complexity to gathering evidence or conducting undercover activity especially when using stand-alone laptop methods. Consequently, internet-based investigations create a whole new category of risks. Not unlike detectives who...

vector image of a deepfake

Advances in Age Verification for Facebook

The social media company, Facebook, has never allowed users below the age of 13 to make accounts on its platform. However, preventing the creation of underage accounts hasn’t always been a successful effort. As Facebook strives to prevent children from utilizing their platforms, new regulations will make it more difficult to engage on the platform without proper age verification. But how will Facebook manage to keep underage users off the platform? The social media company promises to leverage numerous approaches, including new advancements in artificial...

laptop computer and woman using smartphone

NSA Cautions for Mobile Device Threats

With over 90 percent of the global internet population using mobile devices, the National Security Agency (NSA) is appropriately focused on providing best practices for mobile users to ensure their security and safety. Cybersecurity threats to users continue to increase in frequency and complexity, stressing the importance of heeding the NSA’s threat-mitigation suggestions.  The NSA Mobile Device Best Practices guide provides strict guidance on a couple rather common practices. For instance, mobile users should not open links...

man with glasses looking at a computer screen with blue overlay

Mobile Operations Disclosed: A Case Study

Mobile devices have simplified how users access web-based services. Smartphone owners have a constant connection to the internet in their pockets, and this connection is available to hundreds of millions of people that don’t have access to standard computers or home internet services. More apps, such as Instagram and TikTok, are being created on mobile first before being...

Ntrepid headquarters, managed attribution solutions for government

Dark Web Access for Investigations

  How Can I Access the Dark Web? The dark web can be accessed through the onion router, or Tor, which is a network that routes your internet traffic through a series of proxy servers, adding a layer of encryption each time. You may be wondering how to access this network. Fortunately,...

The Challenges of Using Commercial-Off-the-Shelf (COTS) Technology for OSINT Analysis Within the U.S. National Security Community

The OSINT Race  Criminal actors are aware of the vast amount of data available to understand and undermine United States policy, democratic processes, and the economy. Therefore, the internet becomes a powerful weapon for both sides of the cyber war. In order to operationalize OSINT, the U.S. Department of Defense must have access to the most innovative technologies. They must also master the information domain in order to plan for and counter the...

Commercial-cyber-security

Cyber Security: Technology Alone Will Not Win the Cyber War

Setting Priorities in Cyber Security  Folks are running out to pay $4.00/gallon for Super Unleaded gas because that’s all that’s left, if any, after the Colonial Pipeline ransomware attack has initiated a toilet-paper-like hoarding event. We’ve been blogging for years about the increasingly sophisticated tools and techniques the bad guys are using that could...

An image of a magnifying class and data, representing end of data tracking by third-party cookies.

The Future of Ad Tracking

Google, Apple, and Firefox are each shutting down support for third-party cookies—also known as “tracking cookies”—citing an increased need for privacy online. Additionally, the U.S. government’s movements towards increased data privacy will lead to further regulations against formerly commonplace data-tracking methods.