By Shawna Armstrong
What’s the difference? Not much if you’re a great Sourcer, on the constant hunt for the best ways to get the most information. Think of a Sourcer as a “good” hacker. While hackers follow clues to breach privacy and steal data, Sourcers follow clues to build a set of profile and contact information for target talent (without crossing legal/ethical boundaries of course).
What do the best Sourcers and most diabolical hackers use? Pretty much the same tools – open source intelligence (OSINT), networks, social media, organizational tools, email enrichment tools, usernames, domains, and filetypes – in combination and by connecting the dots. Learn more here, but please use your powers responsibly.