Welcome to the Authentic8 blog

Friday, November 25
Dark web FAQs

Dark web FAQs: how to access, security precautions and more

Venti latte with an extra shot of malware
Why conducting sensitive online research from Starbucks is a bad idea
Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller
man with smoke flare
OSINT news roundup: wildfires and the war, de-platformed extremists, DOD social media policies

Latest blogs

Man working at computer

Well, factually: 6 tips for diligent fact-checking

We compiled the best of the best tips and tricks from the NeedleStack podcast's fact-checking series, so you don't have to.

Floating boxes

Using open-source information to combat organized retail crime

It's the season of online shopping and with it comes organized retail crime. Lucky for financial firms and law enforcement, OSINT can help…

OSINT news roundup: OSINT for defense, the NOFORN caveat and diversification

OSINT news roundup: OSINT for defense, the NOFORN caveat and diversification

Stay up to date with the latest OSINT news from around the world

What can Ukraine tell us about Taiwan?

What can Ukraine tell us about Taiwan?

Many analysts are warning China is gearing up to invade Taiwan. Could Russia be a predictor of their strategy?

The four pillars of Russian disinfo

The 4 pillars of propaganda: Russian disinfo techniques and how to be more discerning

Chris Paul of Rand Corporation joined NeedleStack to outline their research on Russian disinformation tactics and what researchers can…

missile programmers have been ID'ed

OSINT news roundup: missile programmer IDs, economic impact analysis, arctic energy delays and monitoring foreign investment

Stay up to date with the latest OSINT news from around the world

How to avoid pitfalls when building an intel team

Dentists aren't heart surgeons: pitfalls of building an intel team

If you don't want your dentist operating on your leg, NeedleStack guest A.J. Nash asks, why are you putting incident response in charge of…

Reflection of crowd in glass pieces

How OSINT can give you an outsider’s perspective of your network

OSINT is a powerful tool to identify vulnerabilities in your organization. But with all the information out there, how do you zero in on…

compromised crops

OSINT news roundup: compromised crops, bridge saboteurs and tech surveillance

Stay up to date with the latest OSINT news from around the world

silo logo

Start your 7-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Close
Close