OSINT Collection Tools for Pastebin

The internet is vast and the amount of content published on it every day, every second, is unfathomable. As an OSINT investigator, collector, or analyst, you need to find a way to cut through the chaff and get the information that's valuable to you.  The first thing you have to understand is that you will … Continue reading OSINT Collection Tools for Pastebin

Interview With the Developer of Spiderfoot – Steve Micallef

I recently did a deep dive on the OSINT tool Spiderfoot.  There are so many features and I don't think I did it much justice in such a short time frame (30 minutes).  I thought a good way to add value is to get the information from the source, the developer of Spiderfoot.  Enjoy this … Continue reading Interview With the Developer of Spiderfoot – Steve Micallef

An Interview with an AML and OSINT Specialist – Andrew Rudd

Introduction As a follow up to my AML and OSINT post I did last week, here's an intriguing and insightful interview with Andrew Rudd on different aspects of AML and how OSINT is related to the career field. Learn from Andrew how you can apply your OSINT skills to a different career field and where … Continue reading An Interview with an AML and OSINT Specialist – Andrew Rudd

Uncovering a Real Nigerian Prince Scam with OSINT and a Little Help from My Friends

Do you remember those Nigerian prince scams where you'd get an email with a prince promising you millions of dollars if you just help him out with your bank account information?  Those were the good ol' days where email dominated the internet. I was tagged in a tweet today by @callmetosyn asking me to help with … Continue reading Uncovering a Real Nigerian Prince Scam with OSINT and a Little Help from My Friends

Python is the Future of OSINT – How to Stay Ahead

Introduction The future of the non-tech savvy OSINT professional is over.  The internet has become far too vast for an individual to collect manually and it will only continue to grow at an exponential pace.  This is my thesis, but I don't claim to be an expert on the trend nor do I believe this … Continue reading Python is the Future of OSINT – How to Stay Ahead

Investigating eCommerce Scammers on Amazon using OSINT

Introduction There's a lot of information out there related to OSINT investigations.  Not nearly enough as there should be, considering the amount of free tools and guides available, but a lot nonetheless.  One thing that isn't talked about online is the intersection between OSINT and eCommerce.  Now, the tools and processes in this article are … Continue reading Investigating eCommerce Scammers on Amazon using OSINT

Using OSINT to help build the OSINT community on Twitter

Introduction One of my main missions is to help create a bridge between the 'old school' OSINT community and the infosec recon community.  OSINT has started to gain traction in the infosec community, but there's still a bit of a communication gap.  Private investigators and intelligence analysts aren't exactly communicating with penetration testers and DFIR … Continue reading Using OSINT to help build the OSINT community on Twitter

Using OSINT to Find Protest Events and Activist Groups on Facebook

Introduction Last week on the OSINT podcast  I was asked a question that I don't believe I answered to the best of my ability.  Partly because audio presents certain challenges when describing a visual process, and partly because I don't think I fully contemplated the extent of the question or how in detail I should … Continue reading Using OSINT to Find Protest Events and Activist Groups on Facebook

Creating an Effective Sock Puppet for OSINT Investigations – Introduction

Introduction and Philosophy In recent light of the epic failure by Surefire Intelligence to frame Robert Mueller for sexual assault allegations, I feel it's important to discuss and unpack how to make a good sock puppet for OSINT operations.  If you aren't familiar, just google Jacob Wohl or Surefire Intelligence and you will likely be … Continue reading Creating an Effective Sock Puppet for OSINT Investigations – Introduction