OSINT Rethinking Anonymity: Why Privacy Browsers Fall Short Blocking trackers or using privacy browsers no longer guarantees true anonymity. As surveillance grows more sophisticated, traditional privacy browsers, while helpful, often fall short in protecting users' privacy.
OSINT The OSINT Intelligence Cycle Part 1: Planning and Direction My advice for those wishing to improve their OSINT skills is to go back to the basics, namely the intelligence cycle.
OSINT OSINT & The Intelligence Cycle Part II: Lets Talk About Collection Part two of my guide to the OSINT intelligence cycle. Once you mapped out your planning and direction phase, the next step is collection.
OSINT OSINT & The Intelligence Cycle Part III: Processing Raw Intelligence This OSINT part 3 post explains how to take the raw intelligence and refines it into forms better suited for exploitation and analysis.
OSINT OSINT & The Intelligence Cycle Part IV: Analysis and Production After the processing phase of the OSINT intelligence cycle, it is time to analyze the data and generate an intelligence product.
OSINT OSINT & The Intelligence Cycle Part Five: Dissemination Legend intelligence analyst Sinwindie returns with Part Five in his series on the OSINT Intelligence Cycle.
OSINT Featured Using Newly Surfaced Data Breaches for OSINT Research Data Breach Search Engines (DBSEs) collect and organize leaked information from data breaches, enabling OSINT investigators to access it.
OSINT Political Donations - OSINT Explore tools like FEC, Open Secrets, and state databases to research individual political donations and donor details easily.
OSINT Ethereum Reboots Crypto Investigation The smart blockchain created a crypto ecosystem of NFTs, DeFi, and Dapps, along with new kinds of investigations.
OSINT How I Research a Bitcoin Wallet's Past: OSINT for Cryptocurrency Investigation Part 2 Explore the intricate world of Bitcoin address research using Blockchair and Oxt.me. Learn to uncover transaction details and patterns for deeper insights into crypto activity.
OSINT The UK OSINT Community: Working To Boost Sovereign Intelligence Capabilities British OSINT practitioners are flocking to join the new UK OSINT Community in support of their mission to bolster sovereign intelligence capabilities.
OSINT Featured The Basics of OSINT for Cryptocurrency Investigation: Part 1 New to cryptocurrencies? Learn to investigate addresses step-by-step, from blockchain explorers to scam databases in our beginner's guide.
OSINT Pastebin and Its Incidental OSINT Despite being a great OSINT tool, Pastebin remains misunderstood and underutilized.
human trafficking Featured Navigating the Cryptic Nature of Currency in Human Trafficking "Follow the money." We have all heard it at some point, especially if you are in the anti-human trafficking space. Yet, if only it was THAT simple. Let's pull this apart.
OSINT Download Websites to Find OSINT Websites are full of useful information that is hidden in source code or small print in obscure subdomain. The following is an excerpt from the book, The OSINT Guide, by Thomas Caliendo. Here we will walk through how to discover Open Source Intelligence (OSINT) by downloading a website to search
OSINT Featured Hunting the Hunters: Tracing Human Traffickers Take a deep dive into how cybercriminals fuel human trafficking on the internet. Discover the promising role of OSINT in unmasking these elusive criminals.
OSINT Featured Using OSINT to Combat Organ Trafficking Unravel the dark web of organ trafficking and discover the power of open-source intelligence (OSINT) in exposing this clandestine crime and advocating for global health justice.
OSINT Featured Leveraging Breach Data for OSINT Unearth the secrets of leveraging data breaches for OSINT investigations in this comprehensive cybersecurity article, packed with insights on real-world implications and essential strategies for staying vigilant in the constantly shifting digital landscape.
OSINT Featured OSINT and TikTok: Striking a Balance between Intelligence Gathering and Privacy Protection The US government has been pressing down hard on the Chinese-owned social media company TikTok, raising many questions over intelligence gathering and privacy protection.
OSINT Featured The Dark Side of OSINT: Risks and Challenges of Misuse Some individuals have been at the battlefront, releasing the most explicit details about the war through social media, except that they aren't at the battlefront but are OSINT amateurs flexing their espionage skills.
OSINT TikTok Targeted OSINT Investigations (P1 - User) You get a new case to investigate and it's a young social media user with no Facebook, no Twitter, just TikTok.
OSINT Mastodon OSINT: A Comprehensive Introduction Part one in our series on Mastodon, focused on gathering OSINT from the platform's users, instances and network.
OSINT OSINT: The Mastodon Paedophile Problem Mastodon has a major paedophile problem, join computer scientist Edward Charles for a closer look at the pedophilic side of the fediverse.
OSINT OSINT: Query Your Target System Like A Database You've run queries on data collection for a long time, but what if your system can also be queried in this way?
OSINT How OSINT Is Used In SIM Swap Scams Learn how scammers leverage OSINT when running SIM swap scams, and some of their common techniques.