Five Things You Can Do To Stay OSINT Curious

Whether you’re new to OSINT or an experienced OSINT professional, there is one thing we all have in common, and that is OSINT curiosity. It’s that urge to click on everything and understand how things work in the background. It’s that passion which makes you want to learn more and more, and it’s that investigative curiosity that keeps you digging until you’ve finally found that … Continue reading Five Things You Can Do To Stay OSINT Curious

After the GDPR: researching domain name registrations

Today, nearly every part of our lives can be digitised by tracking and logging everything we do. Every journey we take, every purchase we make, or even every heartbeat can be digitised today. Because of the vast amount of personal information that is being collected, stored and also traded by companies and governments, the EU has decided to strengthen data privacy by introducing the European General Data … Continue reading After the GDPR: researching domain name registrations

The OSINT Puppeteer

When doing OSINT research, especially on social networking platforms, it’s important to use a fake profile, or what we like to call a sock puppet for operational security reasons. On this week’s blog, we want to provide you with some tips and tricks on how to build a good sock puppet…for research purposes. Crafting a ‘sock’ Before you create a sock, let’s have a moment … Continue reading The OSINT Puppeteer

Python, Your Friendly OSINT Helper

Ho ho ho and…Merry Christmas! It’s #OSINTuesday, and here’s our first blog post: Python, Your Friendly OSINT Helper! On this week’s blog, we have three smaller blog posts, each of which discusses Python in relation to OSINT. In the first one, Lorand briefly highlights some advantages and disadvantages of automating OSINT with Python and provides useful online learning resources. In the second blog post, @WebBreacher … Continue reading Python, Your Friendly OSINT Helper

Thank you, Saddam

Ha! In deciding who to thank for being OSINT curious, I have to go back to 2002 and the run-up to Operation Iraqi Freedom. I was in the US Army as an Arabic linguist and an analyst. SIGINT was the game then, but as the lead analyst, I wanted to make sure my team knew the context of the events going on so that we could … Continue reading Thank you, Saddam

Clicking shit for OSINT curious purposes

Hi, my name is Dutch_OsintGuy. Why? Well… I am Dutch, I do OSINT and I am a Guy. I’ve been in the infosec field for over 20 years as an All Source Analyst specialized in Open Source Intelligence. I teach OSINT classes, give lectures and talks about OSINT. When I think of it, basically I just eat, sleep and breathe OSINT 24/7. Clicking shit Automatically … Continue reading Clicking shit for OSINT curious purposes

Thank you, Pierre!

Hey everyone, my name is Lorand – @LorandBodo – and in this post, I want to tell you my story of how I became OSINT-curious… Several factors sparked my interest, but the story begins when I came out of the military and was thinking about what I should do next in my career. I knew I was interested in international security and terrorism in particular … Continue reading Thank you, Pierre!