Basic OPSEC Tips & Tricks for OSINT researchers

Often i get asked if i’ve got some pointers and tools for OPSEC during online investigations. My primary answer would be first: I can’t give any tips or tradecraft pointers until I know what research questions you are trying to answer. In short, what is your threat model? First of all, one should know where the term OPSEC originates from. OPSEC stands for Operational Security … Continue reading Basic OPSEC Tips & Tricks for OSINT researchers

Using OSINT for your personal threat model

Recently, I gave a workshop at the SANS Security Awareness Summit in London, where I showed how one can conduct a simple assessment of him or herself by using some basic OSINT. In this post, I wanted to go a bit more in depth on that subject. Your adversary might be looking into you now. Do you even know what can be found online about … Continue reading Using OSINT for your personal threat model

Clicking shit for OSINT curious purposes

Hi, my name is Dutch_OsintGuy. Why? Well… I am Dutch, I do OSINT and I am a Guy. I’ve been in the infosec field for over 20 years as an All Source Analyst specialized in Open Source Intelligence. I teach OSINT classes, give lectures and talks about OSINT. When I think of it, basically I just eat, sleep and breathe OSINT 24/7. Clicking shit Automatically … Continue reading Clicking shit for OSINT curious purposes