How to track dark ships using OSINT (with demos)

David Bombal · Intermediate ·🔐 Cybersecurity ·1d ago
Big thank you to DeleteMe for sponsoring this video. Use my link https://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video. In this OSINT deep dive, professional OSINT analyst Ray Baker joins David Bombal to explore the shadowy world of maritime cybersecurity and vessel tracking. Discover the critical differences between the dark fleet and shadow fleet, and learn the exact open-source intelligence methods used to track ships attempting to hide their identities on the open ocean. From manipulating AIS tracking data and repainting ship decks to the terrifying reality of hacking Chinese-made port cranes, this video uncovers the hidden cyber threats facing global supply chains. We also explore the tools used by professionals, such as MarineTraffic and Equasis, to investigate illicit maritime activities and track adversarial movements. // Rae Baker’s SOCIAL // Website: https://www.raebaker.net/ LinkedIn: https://www.linkedin.com/in/raebakerosint/ X: https://x.com/wondersmith_rae // Amazon Books REFERENCE // Deep Dive: Exploring the Real-world Value of Open Source Intelligence US: https://amzn.to/4mw8Swo UK: https://amzn.to/4t6uhhQ // Website REFERENCE // https://www.marinetraffic.com/en/ais/home/centerx:-12.0/centery:25.0/zoom:4 https://home.treasury.gov/ https://tankertrackers.com/ // Video REFERENCE // Deep Dive into OSINT: https://youtu.be/dxiNByvkvU8 // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/@davidbombal Spotify: https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ SoundCloud: https://soundcloud.com/davidbombal Apple Podcast: https://podcasts.apple.com/us/podcast/david-bombal/id1466865532 // MY STUFF // https://www.amazon.com/shop/d
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Sensitive Data Exposure - The Bug That Looks Like a Feature Working Correctly
Learn to identify sensitive data exposure bugs that masquerade as working features, compromising security without raising immediate alarms
Dev.to · Yuriy Safronnynov
Vibe Coding Is Shipping Vulnerabilities at Machine Speed — Your SAST Pipeline Can’t Keep Up
AI-generated code is introducing vulnerabilities at an alarming rate, outpacing traditional SAST pipelines, and requiring new security strategies to keep up
Medium · Cybersecurity
From Periodic Identity Assessments to Continuous Identity Defense
Learn how to shift from periodic identity assessments to continuous identity defense to protect against attacks on Microsoft environments
Medium · Cybersecurity
Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign
Android users are at risk from PIN-stealing trojan campaigns targeting over 800 apps, highlighting the need for enhanced mobile security measures
TechRepublic
Up next
The Payload Podcast #005 - Casey Smith
John Hammond
Watch →