-
The Tao of Open Source Intelligence
- Narrated by: Peter Silverleaf
- Length: 3 hrs and 23 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Psychology of Intelligence Analysis
- By: Richards J. Heuer Jr.
- Narrated by: Scott R. Pollak
- Length: 7 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Psychology of Intelligence Analysis has been required reading for intelligence officers studying the art and science of intelligence analysis for decades. Richards Heuer, Jr. discusses in the audiobook how fundamental limitations in human mental processes can prompt people to jump to conclusions and employ other simplifying strategies that lead to predictably faulty judgments known as cognitive biases.
-
-
Good read for beginners
- By Medimarc on 05-11-22
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Active Measures
- The Secret History of Disinformation and Political Warfare
- By: Thomas Rid
- Narrated by: Derek Perkins
- Length: 14 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
We live in the age of disinformation - of organized deception. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm, even before the 2016 election. But this is not new. The story of modern disinformation begins with the clash between communism and capitalism after the Russian Revolution.
-
-
Grounding book for COVID 19 Media
- By fjness on 05-12-20
By: Thomas Rid
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- By Cameron on 02-01-22
By: Amy B. Zegart
-
Psychology of Intelligence Analysis
- By: Richards J. Heuer Jr.
- Narrated by: Scott R. Pollak
- Length: 7 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Psychology of Intelligence Analysis has been required reading for intelligence officers studying the art and science of intelligence analysis for decades. Richards Heuer, Jr. discusses in the audiobook how fundamental limitations in human mental processes can prompt people to jump to conclusions and employ other simplifying strategies that lead to predictably faulty judgments known as cognitive biases.
-
-
Good read for beginners
- By Medimarc on 05-11-22
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Active Measures
- The Secret History of Disinformation and Political Warfare
- By: Thomas Rid
- Narrated by: Derek Perkins
- Length: 14 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
We live in the age of disinformation - of organized deception. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm, even before the 2016 election. But this is not new. The story of modern disinformation begins with the clash between communism and capitalism after the Russian Revolution.
-
-
Grounding book for COVID 19 Media
- By fjness on 05-12-20
By: Thomas Rid
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- By Cameron on 02-01-22
By: Amy B. Zegart
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- By: Jeremiah Talamantes
- Narrated by: Joe Smith
- Length: 4 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration. Learn how to conduct a Physical Red Team Operation with precision, confidence, and value. Whether the listener will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this audiobook is essential.
-
-
Good content, but
- By Shawn M. on 04-12-20
-
Hacking for Beginners
- Step by Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools on How to Ethical Hack and Grow
- By: Erickson Karnel
- Narrated by: Nikola Muckajev
- Length: 3 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking for anyone to understand! Hacking for Beginners will teach you the basics of hacking as well as the different types of hacking and how hackers think. By listening to it, you will not only discover why they are attacking your computers, but you will also be able to understand how they can scan your system and gain access to your computer.
-
-
Love it
- By Bonny Czajkowski on 04-08-20
By: Erickson Karnel
-
Introduction to Conducting Private Investigations
- Private Investigator Entry Level (02E)
- By: Philip A. Becnel IV
- Narrated by: Bill Burrows
- Length: 8 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introduction to Conducting Private Investigations provides the essential tools you need to become a successful private investigator. From conducting straightforward background investigations to more complicated cases involving accidents and fraud, you will learn the critical skills needed to conduct all types of investigations and build a thriving business. Specifically tailored to meet the requirements established by the Department of Criminal Justice Services, this easy-to-use resource offers an excellent balance between theory and practice.
-
-
Good Stuff!
- By P DET. Billock on 11-16-18
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- By: Christopher Hadnagy, Seth Schulman
- Narrated by: Christopher Hadnagy
- Length: 8 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- By Jessica on 11-30-21
By: Christopher Hadnagy, and others
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
My favorite non-fiction book!
- By Philip Lowe on 08-28-20
By: Cliff Stoll
-
To Catch a Spy
- The Art of Counterintelligence
- By: James M. Olson
- Narrated by: John McLain
- Length: 9 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
In To Catch a Spy: The Art of Counterintelligence, James M. Olson, former chief of CIA counterintelligence, offers a wake-up call for the American public and also a guide for how our country can do a better job of protecting its national security and trade secrets. Olson takes the listener into the arcane world of counterintelligence as he lived it during his 30-year career in the CIA.
-
-
Horrible Narrator
- By NN on 10-01-19
By: James M. Olson
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- By: Erick Stack
- Narrated by: Clay Bel le Fort
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
-
-
I found well explanation in this audio book.
- By Penelope on 05-29-20
By: Erick Stack
-
The DevOps Handbook, Second Edition
- How to Create World-Class Agility, Reliability, & Security in Technology Organizations
- By: Gene Kim, Jez Humble, Patrick Debois, and others
- Narrated by: Ron Butler
- Length: 15 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
This award-winning and best-selling business handbook for digital transformation is now fully updated and expanded with the latest research and new case studies! Over the last five years, The DevOps Handbook has been the definitive guide for taking the successes laid out in the best-selling The Phoenix Project and applying them in any organization. Now, with this fully updated and expanded edition, it’s time to take DevOps out of the IT department and apply it across the full business.
-
-
Atrocious
- By Anonymous User on 05-25-22
By: Gene Kim, and others
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
-
LikeWar
- The Weaponization of Social Media
- By: P. W. Singer, Emerson T. Brooking
- Narrated by: George Guidall
- Length: 11 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the Internet is changing war and politics, just as war and politics are changing the Internet. Terrorists livestream their attacks, “Twitter wars” produce real world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones.
-
-
Deep analysis of the Social Media revolution
- By Ross J. Patti on 10-29-18
By: P. W. Singer, and others
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- By Customer on 04-22-22
By: Ben Malisow
Publisher's Summary
The Internet has become the defining medium for information exchange in the modern world, and the unprecedented success of new web publishing platforms, such as those associated with social media, has confirmed its dominance as the main information exchange platform for the foreseeable future. But how do you conduct an online investigation when so much of the Internet isn't even indexed by search engines?
Accessing and using the information that's freely available online is about more than just relying on the first page of Google results. Open source intelligence (OSINT) is intelligence gathered from publically available sources and is the key to unlocking this domain for the purposes of investigation.
The Tao of Open Source Intelligence provides a comprehensive guide to OSINT techniques for the investigator.
- It catalogs and explains the tools and investigative approaches that are required when conducting research within the surface, deep, and dark webs.
- It explains how to scrutinize criminal activity without compromising your anonymity - and your investigation.
- It examines the relevance of cyber geography and how to get around its limitations.
- It describes useful add-ons for common search engines, as well as considering metasearch engines (including Dogpile, Zuula, PolyMeta, iSeek, Cluuz, and Carrot2) that collate search data from single-source intelligence platforms such as Google.
- It considers deep-web social media platforms and platform-specific search tools, detailing such concepts as concept mapping, entity extraction tools, and specialist search syntax (Google kung fu).
- It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use, and functionality, giving tips on counterintelligence, safe practices, and debunking myths about online privacy.
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community. The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability.
About the author: Stewart K. Bertram is a career intelligence analyst, who has spent over a decade working across the fields of counterterrorism, cyber security , corporate investigations, and geopolitical analysis. The holder of a master's degree in computing and a master of letters in terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience.
More from the same
What listeners say about The Tao of Open Source Intelligence
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Mario Rojas C
- 02-13-22
Very informative
Thou some of the techniques described are a little be out dated, most of the information given is essential in the world of OSINT investigations, the pace and tone of the narrator are perfect
-
Overall
-
Performance
-
Story
- Jack Frasier
- 08-27-20
short with good info
has some essential ideas about the landscape of OSINT technologies and frameworks that can be used by invesigators
-
Overall
-
Performance
- Internet Rando
- 05-06-20
It's a decent introduction to OSINT
The narrator is good, the content is interesting, and it serves as a good introduction to OSINT topics and methods.