Hiya….I go by ‘Ginsberg5150’. I love the poetry of Allen Ginsberg and 5150 is…well…you figure that one out. I live in Kansas City. I got started in OSINT through Debt Collections. I know, weird connection. I used to be a collection agent. It was not the greatest job in the world. It kept food on the table and my family taken care of. What it … Continue reading Thank you for not paying your bill….
Today, nearly every part of our lives can be digitised by tracking and logging everything we do. Every journey we take, every purchase we make, or even every heartbeat can be digitised today. Because of the vast amount of personal information that is being collected, stored and also traded by companies and governments, the EU has decided to strengthen data privacy by introducing the European General Data … Continue reading After the GDPR: researching domain name registrations
When doing OSINT research, especially on social networking platforms, it’s important to use a fake profile, or what we like to call a sock puppet for operational security reasons. On this week’s blog, we want to provide you with some tips and tricks on how to build a good sock puppet…for research purposes. Crafting a ‘sock’ Before you create a sock, let’s have a moment … Continue reading The OSINT Puppeteer
Hi! I’m the blue teamer of the group. I like boot cut jeans, application security, and incident response. I also like to phish. Open Source Intelligence (or OSINT) is not something I use on a daily basis. Well, at least not in how you would expect it to be used. I was introduced to OSINT back in the early 2000s. I was an Electronics Technician … Continue reading How I became OSINT curious
Ho ho ho and…Merry Christmas! It’s #OSINTuesday, and here’s our first blog post: Python, Your Friendly OSINT Helper! On this week’s blog, we have three smaller blog posts, each of which discusses Python in relation to OSINT. In the first one, Lorand briefly highlights some advantages and disadvantages of automating OSINT with Python and provides useful online learning resources. In the second blog post, @WebBreacher … Continue reading Python, Your Friendly OSINT Helper
Hi my name is Josh, I’m an OSINT analyst for the financial industry, digital forensics analyst, and former private investigator. I remember the day I realized that I wanted to get into information security and ultimately became OSINT curious. This story goes back to my management days of running a helpdesk for a retail chain. One of my workers told me there was an upset … Continue reading Thanks Ransomware Jerks!
Hello #OSINT community! Thank you for your amazing support! We’re all working very hard to make OSINTCurious a success! This is just a short explainer on what you can expect from our blog and most importantly when and how often we will publish. We’ve decided to introduce weekly topics that are presented and discussed in our blog posts. So, every #OSINTuesday at 1500 GMT a … Continue reading Blog Topics and Schedules
Ha! In deciding who to thank for being OSINT curious, I have to go back to 2002 and the run-up to Operation Iraqi Freedom. I was in the US Army as an Arabic linguist and an analyst. SIGINT was the game then, but as the lead analyst, I wanted to make sure my team knew the context of the events going on so that we could … Continue reading Thank you, Saddam
Hey everyone, my name is Micah but I go by “WebBreacher”. I’m an American, male and have been working in the infosec business for the last 17+ years. I’d like to tell you how I became OSINT curious. I’ve always been curious I cannot remember a time when I didn’t ask questions about how something worked or why something was the way it was. Like … Continue reading Thank you, copier
First, let me shortly introduce myself; My name is Technisette (yes, that’s a nickname, not a sock puppet), Dutch, 30+, female and have been working in the infosec business for the last 10 years. I’d like to tell you how I became OSINT curious. I wasn’t always ‘OSINTcurious’. Of course there was always a little curiosity in me, but there was one incident which really lit … Continue reading Thank you phisher