Difference between revisions of "OSINT:Intelligence Group"
From sanctions
m (Woody moved page Open Source Intelligence to OSINT:Open Source Intelligence) |
|||
Line 2: | Line 2: | ||
The work of the OSINT group is done on the OSINT mailing list (which you're [https://lists.sanctions.net/mailman/listinfo/osint welcome to join], or you can consult its [https://lists.sanctions.net/pipermail/osint/ archives of past discussion]) and its results are published here. | The work of the OSINT group is done on the OSINT mailing list (which you're [https://lists.sanctions.net/mailman/listinfo/osint welcome to join], or you can consult its [https://lists.sanctions.net/pipermail/osint/ archives of past discussion]) and its results are published here. | ||
+ | |||
+ | ---- | ||
+ | === Notes and References === | ||
+ | * 22 March, Emile Aben: [https://labs.ripe.net/author/emileaben/how-is-russia-connected-to-the-wider-internet/ How Is Russia Connected To The Wider Internet?] |
Revision as of 16:12, 26 March 2022
The Open Source Intelligence (or "OSINT") group investigates and catalogs the Internet resources held by sanctioned entities. These include the IPv4 and IPv6 addresses their computers and networks use to communicate, the Autonomous System numbers that identify their networks in the Internet routing system, and the domain names by which their services are reached. Equally important, the OSINT group ensures that the identified resources are not used by civilians.
The work of the OSINT group is done on the OSINT mailing list (which you're welcome to join, or you can consult its archives of past discussion) and its results are published here.
Notes and References
- 22 March, Emile Aben: How Is Russia Connected To The Wider Internet?