• Every Friday, "20 Minutes" invites a personality to comment on a social phenomenon in his "20 Minutes with..." meeting.

  • Baptiste Robert, who defines himself as an "ethical hacker", gives advice on how to get started in Osint (Open Source Intelligence), open source intelligence.

  • According to him, it is important to be particularly careful with this collected data.

    The expert

    warns of the use that could be made of the masses of online information concerning the conflict in Ukraine.

He is particularly popular on Twitter where his @fs0c131y account has over 240,000 followers.

Baptiste Robert, expert in cybercrime and in OSINT (Open Source Intelligence)

,

open source intelligence, presents himself as an “ethical hacker”.

A veritable Robin Hood of data, which gives back to the most disadvantaged digitally, their rights.

"The most rewarding thing for me today is to have an impact on people's lives, for example by restoring confidentiality to leaked personal data".

The 30-year-old from Toulouse, who cut his teeth during the "yellow vests" crisis, became famous by spotting security breaches, mainly on French, Indian and American government sites and mobile apps.

Today at the head of Predicta Lab, his own company specializing in digital tools to facilitate open source intelligence, he continues to distill his advice online in all benevolence, in particular concerning the war in Ukraine and the mass of information available on social networks.

To begin with, what is an “ethical hacker”?

Do you know the

Mr Robot

series ?

It's the story of a hacker, Elliot Alderson, who is psychotic and paranoid;

he's trying to bring down the biggest bank in the world.

What purpose ?

That of giving money back to people.

That's exactly what I wanted to do when I "rebranded" my Twitter account in 2017: if Elliot Alderson existed in real life, how would he tweet?

On what issues?

I wanted to embody an impertinent character, who breaks the rules (since he's a hacker) and who at the same time wants to do good, all sprinkled with a good touch of ethics.

This is my common thread and I always try to stick to it, to honor this “ethical hacker” costume.

I do cybersecurity for people: when I find a security breach, my interest is, for example, to restore the confidentiality of personal data that has leaked.

I like the technical side and the complexity of the details, but these are not my driving forces.

The most rewarding thing for me today is having an impact on people's lives.

There is a real benevolent approach to say to companies, companies, governments or others: "I have found a security breach, I come to help you without problem and without compensation, to improve your security".

I'm not here to hack you, to extort money from you, I'm not interested.

I will make sure that the product you created, which has some issues, can become better if we fix it together.

When did you start donning this “ethical hacker” costume?

In 2017, like any technician, any developer, I had the idea of ​​a side project in addition to the "work of the day".

To grasp it, I dug up my Twitter account which I cleaned up, I changed the photo and @fs0c131y was born.

This nickname is the name of the group of hackers in the

Mr Robot

series , which inspired me a lot to create this activity.

It also features a nod to L33T writing, a tradition among hackers.

My side project at the time was to understand what was on my One Plus laptop, if it had any security flaws.

I found some information and posted it on my account in November 2017. It went very quickly and very hard, with in particular the discovery of security flaws in the Indian Prime Minister's mobile application in early 2018.

What is your background ?

I am a graduate of ENSEEIHT, I am a telecom and network engineer but I have never exercised this profession.

When I left school, I did mobile app development at Intel, where I learned a lot of things for almost three years, which allowed me to know the innards of the operating system relatively well. Android.

Then I specialized in Android customization, I was a developer and I made clean versions of Android.

Then I worked for a telephone company, Doro, which makes devices for the elderly, sold in supermarkets, in Fnac... Then, I slipped into cybersecurity, where I worked in the search for vulnerabilities and misinformation, particularly during the "yellow vests" crisis.

For Twitter, this is an opportunity:

Why did you create Predicta Lab in March 2020?

I have done several analyzes on the movement of "yellow vests".

Wearing my “ethical hacker” hat, I tried to shake up the status quo and find new, transgressive ways to attack a problem in a different way.

For the "yellow vests" for example, while discussing on Twitter with my international community specialized in cybersecurity, I realized that foreigners had a really biased perception: it was a mess of course, but it was not war. .

So I asked the question: is there an attempt to manipulate the perception of the movement of "yellow vests"?

A very specific question.

And then: What data will I be able to capture and then analyze to check for attempted manipulation?

If so, who is behind it?

Following this analysis work, which was moreover widely reported in the press, I discussed with the government information service (the SIG) to try to understand how it proceeded.

However, their technique proved ineffective: by ordering three studies from three start-ups on the same subject, he obtained different conclusions, with data collected that were not identical.

In short, he was unable to foresee the movement and during the demonstrations, he passed through the radars.

Not to mention the money spent.

At @PredictaLabOff, we want to make #OSINT and #GEOINT accessible to everyone.



We are proud to present our latest article in French which explains step by step how to locate a video from #Ukrainehttps://t.co/M28DDLkWbd

— Baptiste Robert (@fs0c131y) April 15, 2022


Access to this content has been blocked to respect your choice of consent

By clicking on "

I ACCEPT

", you accept the deposit of cookies by external services and will thus have access to the content of our partners

I ACCEPT

And to better remunerate 20 Minutes, do not hesitate to accept all cookies, even for one day only, via our "I accept for today" button in the banner below.

More information on the Cookie Management Policy page.


So I thought about a solution capable of automatically extracting information on all sites for everyone.

I had already done Osint, but on the sidelines.

I found that the open source intelligence community is mostly a user of the available tools but not a creator.

I knew we could do better and faster.

Logically, I created Predicta Lab and I now manage eight people.

How to come to "audit" the application of the Indian Prime Minister?

Back in 2017, my rule of thumb was, "I'm going to audit a site or app if I have four or five people messaging me on Twitter about it."

This was the case for the application of the Indian Prime Minister.

I found security flaws there and it went very high: I was in direct contact with the Prime Minister's Office and my name was mentioned before the Indian Parliament.

The government of India, following my visit, launched a campaign to secure its sites and apps.

Some of them have been closed or updated.

The repercussions have been concrete in the country.

On the war in Ukraine, what advice do you give?

I urge you to be especially careful and think carefully before releasing open source information about this war.

We must not trivialize a conflict where people are killed, where the information communicated can be used for evil purposes.

Yesterday night I found the location of a video in #Ukraine.

I didn't post the result.

Why?



It would have given the location of the person who filmed the video.

Probably his home location



⚠️ You have no idea how this information can be used, the consequences for him.

— Baptiste Robert (@fs0c131y) March 5, 2022


Access to this content has been blocked to respect your choice of consent

By clicking on "

I ACCEPT

", you accept the deposit of cookies by external services and will thus have access to the content of our partners

I ACCEPT

And to better remunerate 20 Minutes, do not hesitate to accept all cookies, even for one day only, via our "I accept for today" button in the banner below.

More information on the Cookie Management Policy page.


The war in Ukraine today is an opportunity for many journalists and in fact, for a growing part of the French population, to discover what Osint is.

Many Twitter accounts post photos or videos, try to find the location of these media and get into geopolitics.

There is a significant amount of content created from open sources.

However, this growing interest in Osint also has a darker side: what do we do with intelligence, this vital information communicated to everyone?

Behind this publication, what will be the consequences on people's lives?

In this context, we are talking about a conflict with civilian and military populations.

Locating Ukrainian troops, passing cars, civilians, okay, but who uses these publications?

How to get started in Osint?

It is a discipline that requires a lot of time.

You have to hang on, try, test, experiment, have a lot of method, discuss with others, communicate your ideas.

By definition, OSINT is collaborative.

“#OSINT means it's public, so it's fine”



NO, NO and NO.

You confuse the availability of your source (open) with the intelligence you add on top.

This is really important.



Before publishing anything think twice.

Think about the risks.

Again, it's not a game.

It's a war.

https://t.co/PmcW98Uc3r

— Baptiste Robert (@fs0c131y) March 15, 2022


Access to this content has been blocked to respect your choice of consent

By clicking on "

I ACCEPT

", you accept the deposit of cookies by external services and will thus have access to the content of our partners

I ACCEPT

And to better remunerate 20 Minutes, do not hesitate to accept all cookies, even for one day only, via our "I accept for today" button in the banner below.

More information on the Cookie Management Policy page.


You also have to be inventive and creative about how to retrieve information, pay attention to details: who, what, what, how?

The results are not necessarily there from the start, but do not hesitate to discuss with the communities, and even with the "influencers of the field", those people who have a large audience on social networks.

To improve in skills, you have to persevere.

This is not an area where there is necessarily a return right away.

But there is room for everyone, do not hesitate to get started.

By the Web

War in Ukraine: Doesn't the communication carried out on social networks skew the reality on the ground?

World

War in Ukraine: Is Russia one step ahead thanks to its arsenal of cyber-weapons?

  • By the Web

  • 20 minutes with

  • hacker

  • Cybersecurity

  • Internet