OSINT Analysis: Long Range Missiles and Hezbollah
With an estimated 90% of required intelligence available open source, it is imperative that intelligence analysts become adept at mining open sources–and Recorded Future can help! Today, we take a...
View ArticleWhat We Knew About Bin Laden in Abbottabad and Pakistan
Information continues to stream out of every major media outlet allowing us to fill in details on the intelligence and operation that led to a team of Navy SEALs killing Osama bin Laden this past...
View ArticleWho Fills the Al-Qaeda Leadership Void?
As one recent NPR headline read, “Bin Laden Is Dead; Al-Qaida Isn’t“. So, as we learn more and more about the last years of Osama bin Laden’s life holed up in Abbottabad, the increasingly more relevant...
View ArticlePattern of Life Analysis: Rezwan Ferdaus
We learned yesterday that the FBI has long been tracking an individual named Rezwan Ferdaus accused of plotting attacks on the Pentagon and Capitol. He was arrested yesterday, and since the news went...
View ArticleTry It For Free
Now anyone can sign up for a free trial of Recorded Future Premium. You’ll get full use of premium research tools that allow you to analyze past trends and better understand the potential future of...
View ArticleIron Triangle of Terror: Iran, Hezbollah, and Los Zetas?
What would the ultimate border security nightmare look like? Might it involve drug cartels, rogue special forces soldiers, or transnational terrorists? How about all three? This scenario sounds like...
View ArticleSigns of Hezbollah Going Global
Warnings of Hezbollah striking against United States interests have appeared sporadically over the last several years, but recent events around the globe seem to warrant real attention in considering...
View ArticleFrom the Bin Laden Letters: Mapping OBL’s Reach into Yemen
Following our initial analysis of the Osama bin Laden letters released by Combating Terrorism Center (CTC) at West Point, we’ll more closely examine interesting moments from the letters and size them...
View ArticleFrom the Bin Laden Letters: Reactions in the Islamist Blogosphere
Following our initial analysis of the Osama bin Laden letters released by the Combating Terrorism Center (CTC) at West Point, we’ll more closely examine interesting moments from the letters and size...
View ArticleDid Killings of AQAP Operatives Precipitate Attacks on Embassies?
[Correction (September 13, 2012, 11:57am): It has been noted that there are two organizations named Ansar al-Sharia -- one is an arm of Al Qaeda in Yemen and the other is active in Benghazi. The Daily...
View ArticleHezbollah in Syria: Same Jihadists, Different Jihad
Not all jihadists are fighting the same jihad. Just ask the members of the Victory Front, a Sunni militant Islamist organization that has played an increasingly leading role in the battle for Syria....
View ArticleHow to Use STIX for Automated Sharing and Graphing of Cyber Threat Data
MITRE, a not-for-profit organization with offices near Boston and Washington, D.C., has developed several interrelated toolkits to enable sharing of cyber threat intelligence between trusted parties....
View ArticleNavigating the Future With Web Data: Christopher Ahlberg at TEDxCambridge 2014
Is it really possible to know the future? Recorded Future CEO Christopher Ahlberg says yes, if we organize the web for analysis, rather than search. With those insights in hand, leaders can make...
View ArticleIs it Possible to Use Web Intelligence to Forecast International Crisis?
By using Recorded Future in conjunction with traditional ethnographic techniques, it is possible for us to significantly increase our accuracy in forecasting international and diplomatic crisis. This...
View ArticleRecap: Spring 2014 Product Improvements
Now that summer is here, let’s recap the Recorded Future product improvements we rolled out over the last three months. With our SaaS approach, we deliver improvements in weekly increments, along with...
View Article4 Ways Alert Logic Leverages Open Source Intelligence
Last week, we were thrilled to present a webinar featuring threat intelligence expert Stephen Coty. Stephen is the Chief Security Evangelist of Alert Logic, a well-known managed security service...
View ArticleBuk SAMs and the Downing of MH17
Analysis Summary Recorded Future web intelligence highlights multiple June/July reports that Ukrainian separatists had acquired Buk anti-aircraft missiles. With hindsight, it’s surprising that these...
View ArticleMonitoring Arms Control Compliance With Web Intelligence
Can we find insights for defense against chemical and biological weapon threats by analyzing livestock disease outbreaks and public health crises? Research by Maynard Holliday of Sandia National Labs...
View ArticleAssessing MH17-Themed Cyber Threats
In our webinar today we assessed the aftermath of the MH17 tragedy from a threat intelligence perspective. Together with our guest Rich Barger, Chief Intelligence Officer of Cyber Squared Inc., we...
View ArticleHow Al-Qaeda Uses Encryption Post-Snowden (Part 2) – New Analysis in...
Analysis Summary Al-Qaeda (AQ) encryption product releases have continued since our May 8, 2014 post on the subject, strengthening our earlier hypothesis about Snowden leaks influencing Al-Qaeda’s...
View Article