close up photography of magnifying glass

Dressed NOT for Success

Guest blog by PaulSin95038741 Below follows an OSINT approach on how to search/identify clothes that you see online. Spoiler alert. This presentation will be different in that we will not find a clear-cut solution as opposed to many OSINT-articles presented by the OSINT Curious team. Never the less, in my opinion, a very important one. Background I’d say that most of us OSINT-people are very … Continue reading Dressed NOT for Success

Companion Post to the 2021 SANS Live Stream “Tips for Conducting OSINT Investigations in the EU with GDPR”

The links below are a companion to the live stream Nico Dekens (dutch_osintguy) and Micah Hoffman (webbreacher) conducted in July 2021. Links Official GDPR documents GDPR and OSINT related blogs Research paper – The protection of privacy in civilian criminal investigations using OSINT (Open-Source Intelligence) Article 8 European Convention on Human Rights Legal framework Law Enforcement Continue reading Companion Post to the 2021 SANS Live Stream “Tips for Conducting OSINT Investigations in the EU with GDPR”

clear light bulb

7 Foundations of OSINT

This is a guest blog written by Bosintblanc of the NCPTF. Open-source intelligence is a fascinating discipline with many intricate moving pieces. I have strived to learn all that I can. As I have done that I realized that part of what makes OSINT difficult to teach and learn is that it is made up of many individually complex topics which one could devote an … Continue reading 7 Foundations of OSINT

Companion Post to 2021 NCPTF Conference Talk

Website OSINT: Discovery and Exploration of Web Resources The links below are a companion to the talk Micah Hoffman gave in June 2021 at the NCPTF conference. The slides have not been and will not be posted. Researching the IP/Domain General/DNS sites:, WHOIS:, IP Location and Details: Infrastructure site: (requires free account signup/login) References: Examine the Web … Continue reading Companion Post to 2021 NCPTF Conference Talk

Getting your sock puppet connections on LinkedIn

Guest blog by Michael Paulie. Throughout investigations, working ongoing missing persons cases with organizations like Trace Labs, or having fun with CTFs, LinkedIn can be a valuable source of information on people of interest.  Information including email addresses, phone numbers, work locations and friends, family, and colleagues are just some of the data that can be obtained to pivot off of.  However, unless you have … Continue reading Getting your sock puppet connections on LinkedIn

Discord OSINT

Investigating Discord: A Primer

Guest blog by BOsintBlanc. Discord for the uninitiated is a group chat service in the vein of Telegram, Whatsapp, or IRC (if you’re that old ;-P). Channels are set up as ‘servers’ usually based around a shared topic of interest. As of 2020 Discord had over 300 million registered users (source) and that number does not appear to be dwindling any time soon. What does … Continue reading Investigating Discord: A Primer

Ten Minute Tip: Image Geolocation Part 2

In the first Ten Minute Tip in this series we saw how to use EXIF data to geolocate an image. Unfortunately most images found on the internet have their EXIF data removed, so this approach is not always possible. However we also began to use a three-step methodology to geolocate images, and we can apply this even when there is no metadata to help us … Continue reading Ten Minute Tip: Image Geolocation Part 2

Maritime Live Stream Notes 4/1/21

After an exciting week where the whole world was tracking the EVER GIVEN, the large container ship stuck in the Suez Canal, we put together a live stream to discuss Maritime OSINT! In this stream, we talked about various ways to track the movements of vessels large and small. We also talked about ways to use social media, job boards, real-estate, and shipspotting sites to … Continue reading Maritime Live Stream Notes 4/1/21

gray steel file cabinet

Using for OSINT Investigations

The Internet Archive, commonly known as the Wayback Machine allows users to visit archived versions of websites. The Internet Archive has been archiving sites since 1996 and has 514 billion archived web pages!  If you are wondering how you can use the Internet Archive in your OSINT research, you’ve come to the right place. There are many methods to extract important information from the Wayback … Continue reading Using for OSINT Investigations