Governance & Risk Management , Next-Generation Technologies & Secure Development , Privacy

How Open Source Intelligence Tools Are Evolving

Researcher Mason Wilder Offers Insights on Investigation Strategies
Mason Wilder, senior research specialist, Association of Certified Fraud Examiners

Changes in the privacy policies of social media companies have rendered many free open source intelligence tools unworkable, says Mason Wilder, senior research specialist at the Association of Certified Fraud Examiners. He describes the evolution of these tools and offers tips on how to apply them in the current environment.

See Also: How To Cut Through The Web Of Insurance Fraud

In this video interview with Information Security Media Group, Wilder also discusses:

  • How open source intelligence tools have evolved;
  • The challenges of conducting an open source intelligence investigation;
  • How to set up the process for an investigation.

At ACFE, Wilder creates and updates continuing professional education with a focus on investigation and writes for all the ACFE publications. Previously, he worked in corporate security intelligence and investigations at several companies, specializing in background and due diligence investigations as well as intelligence analysis for international physical security and crisis response.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Suparna Goswami is Associate Editor at ISMG Asia and has more than 10 years of experience in the field of journalism. She has covered a variety of beats ranging from global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine, and leading Indian newspapers like DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.