Managed Attribution

vector image of a deepfake

Advances in Age Verification for Facebook

The social media company, Facebook, has never allowed users below the age of 13 to make accounts on its platform. However, preventing the creation of underage accounts hasn’t always been a successful effort. As Facebook strives to prevent children from utilizing their platforms, new regulations will make it more difficult to engage on the platform without proper age verification. But how will Facebook manage to keep underage users off the platform? The social media company promises to leverage numerous approaches, including new advancements in artificial...

blurred law enforcement vehicles with flashing lights

Stand-alone Laptop: OPSEC Failures During Investigations

Challenges for Law Enforcement Agents Using Stand-Alone Laptops The internet of things (IoT) is now part of virtually all investigations, bringing significant new complexity to gathering evidence or conducting undercover activity especially when using stand-alone laptop methods. Consequently, internet-based investigations create a whole new category of risks. Not unlike detectives who...

man with glasses looking at a computer screen with blue overlay

Mobile Operations Disclosed: A Case Study

Mobile devices have simplified how users access web-based services. Smartphone owners have a constant connection to the internet in their pockets, and this connection is available to hundreds of millions of people that don’t have access to standard computers or home internet services. More apps, such as Instagram and TikTok, are being created on mobile first before being...

Ntrepid headquarters, managed attribution solutions for government

Dark Web Access for Investigations

  How Can I Access the Dark Web? The dark web can be accessed through the onion router, or Tor, which is a network that routes your internet traffic through a series of proxy servers, adding a layer of encryption each time. You may be wondering how to access this network. Fortunately,...

The Challenges of Using Commercial-Off-the-Shelf (COTS) Technology for OSINT Analysis Within the U.S. National Security Community

The OSINT Race  Criminal actors are aware of the vast amount of data available to understand and undermine United States policy, democratic processes, and the economy. Therefore, the internet becomes a powerful weapon for both sides of the cyber war. In order to operationalize OSINT, the U.S. Department of Defense must have access to the most innovative technologies. They must also master the information domain in order to plan for and counter the...

Defining Active vs. Passive OSINT

Though the open web is typically just that—wide open for internet users to access—modern websites and popular social media platforms now require users to create accounts in order to enter. With this variation in barriers to data, online users have to adjust their information-collection methods in web spaces that are...

scary hacker in front of a computer with a blue overlay

Operation DisrupTor: Bringing Down the Dark Web

The Justice Department announced last month that Operation DisrupTor, an internationally coordinated effort to dismantle criminal activity on the dark web, had arrested 179 individuals involved in opioid trafficking. This successful operation, following many other high-profile dark web takedowns, is causing turmoil among the online drug trafficking community.

scary hacker in front of a computer with a blue overlay

Long Live the Dark Web

The dark web is in decline. Once the preferred means for anonymizing users’ online activity, the dark web has now been supplanted by encrypted mobile applications and alternate solutions. Similarly, aggressive law enforcement actions have shuttered many of the dark web’s largest forums, making it a much more fleeting and...