Welcome to the Authentic8 blog

Saturday, May 27
Red silhouette shows bombers and cloud moving over Ukrainian territory

Ukraine: 1 year after an unexpected invasion, OSINT continues to shed light on the past, present and future of the conflict

image: one balloon lit up floating above gray balloons
One size won’t fit all: Clearing the air on OSINT methodology
cyber graphic of hexagons
5 tips for OSINT on the dark web
Man on laptop sitting on paper airplane
FAQ: web isolation and the zero-trust maturity model
magnifying glass
7 search engines for better OSINT

Latest blogs

Image: illustration of a person with a tv for a head, puppet strings over silhouettes

OSINT news roundup: export controls, Russian influence and lessons from Ukraine

Stay up to date with the latest OSINT news from around the world

Man on laptop sitting on paper airplane

FAQ: web isolation and the zero-trust maturity model

Nearly every organization is pursuing or perfecting zero-trust architecture. Web isolation can be a fast win in this sizable undertaking.…

A stack of books next to a computer

Reading for research: 5 books to better your OSINT

Winter is a great time to curl up with a good book. Why not make your next read an asset to your research?


OSINT in the FY23 National Defense Authorization Act

A new congressional bill could shape the way open-source intelligence is utilized.

three workers at computer

OSINT is a perishable skill: How Skull Games kept me sharp

OSINT research and reporting are use-it-or-lose-it skills. To brush up on mine, I participated in a recent Skull Game to put OSINT to a…

Person in a foggy field with many open doors

Beating censorship: putting the “open” in open source

Anti-censorship activist Yevgeny Simkin is determined to find new ways to help people who live in dictatorial regimes access information…

Russian bombers in a joint patrol with China

OSINT news roundup: weaponized supply, joint air patrols and war crime documentation

Stay up to date with the latest OSINT news from around the world

Woman talking on the phone while using her laptop

Foolproof security of user web activity

Even the most security-aware users make mistakes and can accidentally expose their organizations’ networks to malware and other…


What we can find when we know where to look: applying AI to social OSINT

This company’s AI technology tracks alt-social media sites to document trends and violent rhetoric, creating reports and saving time for…

silo logo

Start your 30-day free trial of Silo for Research


The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog