twitter searching

Muting the Twitter algorithm and using basic search operators for better OSINT research

In July 2019 Twitter had some updates to their interface, search-URLs and overall user-experience. They changed a lot of things in the background which made the user-experience for researchers less useful. Actually a tweet thread started by @thegrugq inspired me to write this blog. With this blog you can take a few basic steps to bring back the user experience of “the old” Twitter like … Continue reading Muting the Twitter algorithm and using basic search operators for better OSINT research

Basic OPSEC Tips & Tricks for OSINT researchers

Often i get asked if i’ve got some pointers and tools for OPSEC during online investigations. My primary answer would be first: I can’t give any tips or tradecraft pointers until I know what research questions you are trying to answer. In short, what is your threat model? First of all, one should know where the term OPSEC originates from. OPSEC stands for Operational Security … Continue reading Basic OPSEC Tips & Tricks for OSINT researchers

Using OSINT for your personal threat model

Recently, I gave a workshop at the SANS Security Awareness Summit in London, where I showed how one can conduct a simple assessment of him or herself by using some basic OSINT. In this post, I wanted to go a bit more in depth on that subject. Your adversary might be looking into you now. Do you even know what can be found online about … Continue reading Using OSINT for your personal threat model

Clicking shit for OSINT curious purposes

Hi, my name is Dutch_OsintGuy. Why? Well… I am Dutch, I do OSINT and I am a Guy. I’ve been in the infosec field for over 20 years as an All Source Analyst specialized in Open Source Intelligence. I teach OSINT classes, give lectures and talks about OSINT. When I think of it, basically I just eat, sleep and breathe OSINT 24/7. Clicking shit Automatically … Continue reading Clicking shit for OSINT curious purposes