How Friend Overlap Analysis Reveals Hidden Accounts, Alternate Personas, and Social Graph Secrets

How Friend Overlap Analysis Reveals Hidden Accounts, Alternate Personas, and Social Graph Secrets

How Friend Overlap Analysis Reveals Hidden Accounts, Alternate Personas, and Social Graph SecretsKirby
Published on: 23/04/2026

In the world of open-source intelligence, the most powerful insights rarely come from what is explicitly visible. Instead, they emerge from patterns, connections, overlaps, and relationships that most people never think to analyze.

Analysis
Why “Always-On” Devices Matter for Privacy and Surveillance

Why “Always-On” Devices Matter for Privacy and Surveillance

Why “Always-On” Devices Matter for Privacy and SurveillanceKirby
Published on: 14/01/2026

Bluetooth tracking is one of the quietest forms of modern surveillance. It’s passive, widespread, largely invisible, no hacking is required, no spyware needs to be installed, and no accounts need to be accessed. In many cases, you don’t even have to *use* your device for it to be tracked. If Bluetooth is enabled, your devices may be broadcasting far more about your presence and movement than you realize.

OPSEC
Early Warning for Critical Infrastructure: How OSINT and AI Reduce Time-to-Detection

Early Warning for Critical Infrastructure: How OSINT and AI Reduce Time-to-Detection

Early Warning for Critical Infrastructure: How OSINT and AI Reduce Time-to-DetectionKirby
Published on: 17/12/2025

Critical infrastructure incidents rarely begin at the moment of impact. Whether the outcome is sabotage, disruption, insider action, or a hybrid cyber-physical event, early indicators almost always exist (often days or weeks in advance).

Critical Infrastructure