How to track dark ships using OSINT (with demos)
Skills:
Network Security80%
Big thank you to DeleteMe for sponsoring this video. Use my link https://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video.
In this OSINT deep dive, professional OSINT analyst Ray Baker joins David Bombal to explore the shadowy world of maritime cybersecurity and vessel tracking. Discover the critical differences between the dark fleet and shadow fleet, and learn the exact open-source intelligence methods used to track ships attempting to hide their identities on the open ocean. From manipulating AIS tracking data and repainting ship decks to the terrifying reality of hacking Chinese-made port cranes, this video uncovers the hidden cyber threats facing global supply chains. We also explore the tools used by professionals, such as MarineTraffic and Equasis, to investigate illicit maritime activities and track adversarial movements.
// Rae Baker’s SOCIAL //
Website: https://www.raebaker.net/
LinkedIn: https://www.linkedin.com/in/raebakerosint/
X: https://x.com/wondersmith_rae
// Amazon Books REFERENCE //
Deep Dive: Exploring the Real-world Value of Open Source Intelligence
US: https://amzn.to/4mw8Swo
UK: https://amzn.to/4t6uhhQ
// Website REFERENCE //
https://www.marinetraffic.com/en/ais/home/centerx:-12.0/centery:25.0/zoom:4
https://home.treasury.gov/
https://tankertrackers.com/
// Video REFERENCE //
Deep Dive into OSINT: https://youtu.be/dxiNByvkvU8
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
X: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal
Spotify: https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ
SoundCloud: https://soundcloud.com/davidbombal
Apple Podcast: https://podcasts.apple.com/us/podcast/david-bombal/id1466865532
// MY STUFF //
https://www.amazon.com/shop/d
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
More on: Network Security
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Sensitive Data Exposure - The Bug That Looks Like a Feature Working Correctly
Dev.to · Yuriy Safronnynov
Vibe Coding Is Shipping Vulnerabilities at Machine Speed — Your SAST Pipeline Can’t Keep Up
Medium · Cybersecurity
From Periodic Identity Assessments to Continuous Identity Defense
Medium · Cybersecurity
Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign
TechRepublic
🎓
Tutor Explanation
DeepCamp AI