How to Conduct an Influence Operations Investigation
Manage episode 371682883 series 3427248
#Episode 14
How to Conduct an Influence Operations Investigation
Ari Ben Am is an Open Source Investigator.
Previously an analyst at Cobwebs and Active Fence, he is the founder and CEO of Glowstick, which supports organizations and their intelligence teams with the processes and tools to conduct better analysis using OSINT and WEBINT techniques.
The areas that interest him most include China, extremism, influence operation, and threat intelligence.
Topics discussed:
- How are investigations conducted?
- The challenges of content vs. network-led investigations
- How to investigate nation-states, people, and groups?
- What did influence operations look like before the online era?
You can find Ari and his work via these links:
Ari’s Influence Operations blog - https://memeticwarfareweekly.substack.com
Ari’s closed-beta Telegram search engine. Register now to be invited to join once its launched -
Glowstick Intelligence - https://glowstickintel.com
You can find Ari on LinkedIn - https://www.linkedin.com/in/arieh-ben-am/
Glowstick on LinkedIn - https://www.linkedin.com/company/87391588
Relevant tools:
Epieos https://epieos.com/
OSINT Industries - https://osint.industries/
DNSLytics - dnslytics.com\
DISARM - https://www.disarm.foundation/
Structured Threat Information Expression (STIX™) - https://oasis-open.github.io/cti-documentation/stix/intro.html
Digital Threat Analysis Centre - China research referenced by Ari - https://miburo.substack.com/p/the-one-like-one-share-initiative
Too Much (dis)Information
The podcast that explores everything related to disinformation and online networks. To help us make sense of the global town square that is social media, in every episode, our host speaks to a fresh voice to uncover the good, bad, and fake online.
This podcast believes that we are at a pivotal moment in the fight against disinformation. Many people apply the word disinformation to everything from fake news, bot networks, malicious actors, influence operations, manipulation, inauthentic accounts, social media imposters, OSINT threat intelligence, and much more.
So do we...
From the trends to the tools, Too Much (dis)Information brings you the experts on the front line fighting disinformation, and all its forms, across the public sector, brands, cyber security professionals, and academia.
Brought to you by Cyabra
23 episoder