Paliscope blog

  • Sep162020

    Stronger together: Integrating CameraForensics in Paliscope Discovry

    Guest blog from CameraForensics by Matt Burns and Dave Ranner…

  • Jul082020

    Meet the developer: Kris “Power to the user” Luhr

    Kris Luhr is one of those people who gets fired up over solving problems that most others would…

  • Dec122019

    A Quick Tutorial on Debunking Propaganda Images on Twitter

    Twitter is ripe with propaganda, and what better way to gain sympathizers or spread…

  • Nov132019

    How to recognize and prevent extortion emails

    Extortion emails are a common tool criminals use to threaten heavy damage…

  • Oct252019

    Source Code—why should you look at it?

    For many investigators, websites and webpages serve as a vital source of information…

  • Oct212019

    How to build a solid fake identity for online investigations

    The key steps to creating a successful “sock puppet”, according to OSINT analyst Jake…

  • Jul092019

    The 3 Facebook search workarounds everyone is talking about.

    Not long ago, Facebook removed the Graph Search function from their platform.

  • Apr082019

    Entering the future of deep fake news.

    With more intelligence floating around online than ever before, the spread of disinformation is…

  • Feb122019

    Save your company millions this year using open-source intelligence

    By focusing more resources on online investigations, not only can companies…

  • Nov282018

    Can you really be anonymous when investigating online?

    Investigators often need to be able to gather evidence without being detected…

  • Aug232018

    How to keep your online investigations GDPR compliant

    Just over three months has passed since the GDPR came into force and, although…

  • Jul202018

    OSINT to the rescue

    During our chat with Toronto police officer Warren Bulmer, he told us about some of the cases he’s worked on over the years…