<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The OSINT Newsletter]]></title><description><![CDATA[OSINT news, tools, tactics, and techniques]]></description><link>https://osintnewsletter.com</link><image><url>https://substackcdn.com/image/fetch/$s_!yF4I!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png</url><title>The OSINT Newsletter</title><link>https://osintnewsletter.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 12:30:20 GMT</lastBuildDate><atom:link href="https://osintnewsletter.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jake Creps]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[contact@osint.news]]></webMaster><itunes:owner><itunes:email><![CDATA[contact@osint.news]]></itunes:email><itunes:name><![CDATA[The OSINT Newsletter]]></itunes:name></itunes:owner><itunes:author><![CDATA[The OSINT Newsletter]]></itunes:author><googleplay:owner><![CDATA[contact@osint.news]]></googleplay:owner><googleplay:email><![CDATA[contact@osint.news]]></googleplay:email><googleplay:author><![CDATA[The OSINT Newsletter]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The OSINT Newsletter - 50% Off Easter Sale]]></title><description><![CDATA[Improve your OSINT skill set for less]]></description><link>https://osintnewsletter.com/p/the-osint-newsletter-50-off-easter-1df</link><guid isPermaLink="false">https://osintnewsletter.com/p/the-osint-newsletter-50-off-easter-1df</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Sun, 05 Apr 2026 13:03:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yF4I!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#127881; Hey, everyone. I&#8217;m excited to announce that The OSINT Newsletter is having an Easter sale!</p><p>&#127873; It&#8217;s been a while since a paid subscription of The OSINT Newsletter went on sale. Recently, the newsletter crossed the 32,000 subscriber mark. To celebrate, here&#8217;s a 50% off discount.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://osintnewsletter.com/a0cb54dc&quot;,&quot;text&quot;:&quot;50% Off&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://osintnewsletter.com/a0cb54dc"><span>50% Off</span></a></p><p>Here&#8217;s what you&#8217;ll get access to by upgrading now:</p><ul><li><p>Access to the entire newsletter archive of paid content with over 100 issues of tools, tactics, and techniques.</p></li><li><p>Continuously improve your skill set with the latest OSINT methods to discover more, be more efficient, and bring more value to your organization or mission.</p></li></ul><p>Thanks for your support. </p><p><strong>Click here to get 50% off The OSINT Newsletter</strong>&#128071;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://osintnewsletter.com/a0cb54dc&quot;,&quot;text&quot;:&quot;Get Better at OSINT for $40&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://osintnewsletter.com/a0cb54dc"><span>Get Better at OSINT for $40</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #101]]></title><description><![CDATA[A deep dive into TheBigBrother, a comprehensive OSINT framework]]></description><link>https://osintnewsletter.com/p/101</link><guid isPermaLink="false">https://osintnewsletter.com/p/101</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 02 Apr 2026 14:31:05 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5d6243dc-fd06-4fde-aaad-350bd452487f_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 101st issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator.</p><p>&#128680; This is the first post in the return of OSINT Tool Tuesday, an ongoing series of tool review deep dives aimed at helping investigators improve their tool kit. I understand it&#8217;s Thursday&#8230; we will be publishing these on Tuesdays moving forward!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://osintnewsletter.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1><strong>TheBigBrother</strong></h1><p><strong><a href="https://github.com/chadi0x/TheBigBrother">TheBigBrother</a></strong> is a GitHub project that offers a comprehensive OSINT framework designed to investigate an individual&#8217;s digital footprint across the internet, enabling users to gather information such as associated usernames, social media profiles, metadata, and other publicly available intelligence. Essentially, it&#8217;s a username tool on steroids.</p><p>&#127913; H/T: Chadi0x</p><p>TheBigBrother allows you to search primarily by username, while also supporting a range of modules including email lookups, domain intelligence, metadata extraction (EXIF), and cryptocurrency tracing.</p><p>It brings together multiple OSINT techniques into a single toolkit, making it a valuable resource for investigations across law enforcement, cyber security, corporate intelligence, executive protection, and online threat analysis.</p><p><strong>In this guide, I&#8217;ll walk you through how to set up The Big Brother, how to use the tool, practical use cases you can apply it to, and key pivot points you can leverage from the information it uncovers.</strong></p><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><h3><strong>Setup</strong></h3><p><strong>Recommended = Docker Method</strong></p><p>The easiest way to get The Big Brother up and running is by using Docker, which handles all dependencies and environment configuration for you.</p><h3><strong>Prerequisites</strong></h3><p>Before you begin, make sure you have installed:</p><ul><li><p>Docker</p></li><li><p>Docker Compose</p></li></ul><p>You can verify installation with by typing these commands into your terminal:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;c698a27e-2136-4d84-8b18-7538a6004061&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">docker --version

docker-compose --version</code></pre></div><h3><strong>Step 1: Clone the Repository</strong></h3><p>On your terminal, run:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;f097ab73-ef42-4a60-85d0-c24ca497e482&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">git clone https://github.com/chadi0x/TheBigBrother.git

cd the-big-brother</code></pre></div><h3><strong>Step 2: Launch TheBigBrother</strong></h3><p>Run the following command to build and start the tool:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;378cf9b7-a2c1-4e47-86a1-08e198e45933&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">docker-compose up --build</code></pre></div><p>This will:</p><ul><li><p>Build the Docker image</p></li><li><p>Install all required dependencies</p></li><li><p>Launch The Big Brother environment</p></li></ul><p><strong>MANUAL SETUP</strong></p><p>If you prefer not to use Docker, you can install and run The Big Brother locally using Python.</p><h3><strong>Prerequisites</strong></h3><p>Make sure the following are installed:</p><ul><li><p><strong>Python 3.8+</strong></p></li><li><p><strong>Git</strong></p></li><li><p><strong>pip</strong></p></li></ul><p>You can verify with:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;facd0f59-9d84-4f88-8302-a6af57f6dd07&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 --version

git --version

pip3 --version</code></pre></div><h3><strong>Linux/MacOS Setup</strong></h3><ol><li><p><strong>Create a virtual environment</strong></p></li></ol><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;9448af71-3bde-4479-802f-ee13c428ca72&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 -m venv venv

source venv/bin/activate</code></pre></div><ol start="2"><li><p><strong>Install Dependencies</strong></p></li></ol><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;2040d477-fbd2-44e9-a8fe-43fc2f103dae&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">pip install -r requirements.txt

playwright install chromium</code></pre></div><ol start="3"><li><p><strong>Launch the Application</strong></p></li></ol><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;410ca6fa-cce9-4c00-8ad2-729efdb26c81&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python -m uvicorn the_big_brother.gui.main:app --port 8000</code></pre></div><h3><strong>Windows Setup</strong></h3><ol><li><p><strong>Install Dependencies</strong></p></li></ol><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;5755fb09-f3d5-4e7c-b342-063fa3c6a04d&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">pip install -r requirements.txt

playwright install chromium</code></pre></div><ol start="2"><li><p><strong>Launch the Application</strong></p></li></ol><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;4406ac3b-6679-4e60-a066-731bf2cc01cd&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python -m uvicorn the_big_brother.gui.main:app --port 8000</code></pre></div><p><strong>Next Steps:</strong></p><p>Once running, open your browser and go to:</p><p>http://localhost:8000</p><p>You&#8217;ll see the <strong>The Big Brother web interface</strong>, where you can:</p><ul><li><p>Enter usernames</p></li><li><p>Run modules</p></li><li><p>View results visually</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hy9g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hy9g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hy9g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hy9g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hy9g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hy9g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg" width="1456" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hy9g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hy9g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hy9g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hy9g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4665b0-bece-4592-b733-c1faa06ccbc7_1600x844.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Now, let&#8217;s dive into TheBigBrother usage and use cases.</strong></p><div><hr></div><h3><strong>Usage</strong></h3><p>Now that we&#8217;ve covered the basics, let&#8217;s dive into some of the core modules within The Big Brother and how you can use them in OSINT investigations.</p><h2><strong>Profiler</strong></h2><p>The Profiler module is designed to build a high-level overview of a target by aggregating information from multiple sources into a single profile.</p><p>This can include:</p><ul><li><p>Usernames</p></li><li><p>Social media accounts</p></li><li><p>General online presence</p></li></ul><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;44d50c66-0905-4670-9012-abc9845b19a8&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --profiler testusername</code></pre></div><p>This will produce a consolidated view of the target, helping you quickly understand who you&#8217;re dealing with.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xr0h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xr0h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png 424w, https://substackcdn.com/image/fetch/$s_!xr0h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png 848w, https://substackcdn.com/image/fetch/$s_!xr0h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png 1272w, https://substackcdn.com/image/fetch/$s_!xr0h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xr0h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png" width="1456" height="759" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:759,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xr0h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png 424w, https://substackcdn.com/image/fetch/$s_!xr0h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png 848w, https://substackcdn.com/image/fetch/$s_!xr0h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png 1272w, https://substackcdn.com/image/fetch/$s_!xr0h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da6dcc7-0c70-45cb-9237-1802ea068bc3_1600x834.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On the web interface, you can enter a target identifier (username, email address, phone number). Associated profile  images will appear in the blank space above.</p><p>&#128466;&#65039; This is a great starting point before diving deeper into specific modules.</p><h2><strong>Footprint</strong></h2><p>The Footprint module focuses on identifying where a username exists across the internet.</p><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;92ba5709-197f-4403-bfd8-9f0015c1ce7a&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --footprint testusername</code></pre></div><p>This will:</p><ul><li><p>Enumerate accounts across platforms</p></li><li><p>Highlight reused usernames</p></li><li><p>Map out digital presence</p></li></ul><p>As you can see, our test on the web interface brought up 7 platforms linked to our email address.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!blcv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!blcv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png 424w, https://substackcdn.com/image/fetch/$s_!blcv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png 848w, https://substackcdn.com/image/fetch/$s_!blcv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png 1272w, https://substackcdn.com/image/fetch/$s_!blcv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!blcv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png" width="1456" height="446" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:446,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!blcv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png 424w, https://substackcdn.com/image/fetch/$s_!blcv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png 848w, https://substackcdn.com/image/fetch/$s_!blcv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png 1272w, https://substackcdn.com/image/fetch/$s_!blcv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ba5b76-3150-49d2-b223-4f4f36b21d57_1600x490.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#128466;&#65039; Use this to identify pivot points into other tools or manual investigation.</p><h2><strong>Net Scan</strong></h2><p>The Net Scan module is used for gathering network-level intelligence.</p><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;9688b0ed-0a8a-44d3-bdc3-cdb209f22ae1&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --netscan example.com</code></pre></div><p>This may return:</p><ul><li><p>IP addresses</p></li><li><p>Open ports</p></li><li><p>Hosting/provider information</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YZjX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YZjX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png 424w, https://substackcdn.com/image/fetch/$s_!YZjX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png 848w, https://substackcdn.com/image/fetch/$s_!YZjX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png 1272w, https://substackcdn.com/image/fetch/$s_!YZjX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YZjX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png" width="1456" height="424" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:424,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YZjX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png 424w, https://substackcdn.com/image/fetch/$s_!YZjX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png 848w, https://substackcdn.com/image/fetch/$s_!YZjX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png 1272w, https://substackcdn.com/image/fetch/$s_!YZjX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b483cba-f095-4813-bc52-d8f56f25787b_1600x466.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Our YouTube example on the web interface brought up the below network information:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vHhO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vHhO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png 424w, https://substackcdn.com/image/fetch/$s_!vHhO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png 848w, https://substackcdn.com/image/fetch/$s_!vHhO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png 1272w, https://substackcdn.com/image/fetch/$s_!vHhO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vHhO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png" width="1456" height="766" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:766,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vHhO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png 424w, https://substackcdn.com/image/fetch/$s_!vHhO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png 848w, https://substackcdn.com/image/fetch/$s_!vHhO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png 1272w, https://substackcdn.com/image/fetch/$s_!vHhO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8987ad6-ed0e-4f95-a42a-ee84ab4668e0_1600x842.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#128466;&#65039; Useful for infrastructure mapping and identifying related assets.</p><h2><strong>Dark Web</strong></h2><p>The <strong>Dark Web</strong> module attempts to identify whether a target appears in:</p><ul><li><p>Data breaches</p></li><li><p>Leaked databases</p></li><li><p>Dark web mentions</p></li></ul><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;3521f1ab-54fa-4cd4-8b67-bd0555b25e3b&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --darkweb test@email.com</code></pre></div><p>This can help uncover:</p><ul><li><p>Compromised credentials</p></li><li><p>Exposure risks</p></li><li><p>Historical leaks</p></li></ul><p>You can enter a keyword e.g. a leak or database into the web interface search bar as below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L68N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L68N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png 424w, https://substackcdn.com/image/fetch/$s_!L68N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png 848w, https://substackcdn.com/image/fetch/$s_!L68N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png 1272w, https://substackcdn.com/image/fetch/$s_!L68N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L68N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png" width="1456" height="486" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:486,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!L68N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png 424w, https://substackcdn.com/image/fetch/$s_!L68N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png 848w, https://substackcdn.com/image/fetch/$s_!L68N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png 1272w, https://substackcdn.com/image/fetch/$s_!L68N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f191dff-0e00-4010-9a6b-fd0dbb402cf0_1600x534.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Crypto</strong></h2><p>The Crypto module is used to analyse cryptocurrency wallets and transactions.</p><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;e0fabe35-06a5-4d17-9c12-59e2dba1aaa3&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --crypto &lt;wallet_address&gt;</code></pre></div><p>This may reveal:</p><ul><li><p>Transaction history</p></li><li><p>Wallet activity</p></li><li><p>Links to other wallets</p></li></ul><p>On the web interface, simply enter the wallet address in question into the search bar below (bitcoin or ethereum).</p><p>&#128466;&#65039; Particularly useful in fraud, ransomware, or financial investigations.</p><h2><strong>SSL</strong></h2><p>The SSL module gathers intelligence from SSL certificates.</p><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;dfa8edd3-f0a0-445d-aa1c-6ecb9e598c4a&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --ssl example.com</code></pre></div><p>This can uncover:</p><ul><li><p>Associated domains</p></li><li><p>Certificate details</p></li><li><p>Infrastructure links</p></li></ul><p>&#128466;&#65039; Great for finding hidden or related domains tied to a target.</p><h2><strong>EXIF</strong></h2><p>The EXIF module extracts metadata from images.</p><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;5165aaff-9418-4c8a-a658-b683d202c79e&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --exif image.jpg</code></pre></div><p>This may include:</p><ul><li><p>GPS coordinates</p></li><li><p>Device information</p></li><li><p>Date/time data</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Cop7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Cop7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png 424w, https://substackcdn.com/image/fetch/$s_!Cop7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png 848w, https://substackcdn.com/image/fetch/$s_!Cop7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png 1272w, https://substackcdn.com/image/fetch/$s_!Cop7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Cop7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png" width="1456" height="719" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:719,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Cop7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png 424w, https://substackcdn.com/image/fetch/$s_!Cop7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png 848w, https://substackcdn.com/image/fetch/$s_!Cop7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png 1272w, https://substackcdn.com/image/fetch/$s_!Cop7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c104def-d465-4ce7-a6f3-ea837235f754_1600x790.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As in our web interface example, you won&#8217;t always get detailed information.</p><p>&#128466;&#65039; Extremely useful when analysing images from social media or leaks.</p><h2><strong>Dorks</strong></h2><p>The Dorks module leverages advanced search queries (Google Dorking) to find indexed information about a target.</p><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;1f6f9f25-87cb-4ed8-8275-8e06864c90fb&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --dorks testusername</code></pre></div><p>This will generate queries to uncover:</p><ul><li><p>Public documents</p></li><li><p>Exposed data</p></li><li><p>Indexed profiles</p></li></ul><p>&#128466;&#65039; Helps surface information that isn&#8217;t easily found through direct searches.</p><h2><strong>GEOINT</strong></h2><p>The GEOINT module focuses on geographic intelligence.</p><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;0e6e4604-c804-4e85-aebc-a84a987ff2b0&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --geoint &lt;location_or_image&gt;</code></pre></div><p>This may help:</p><ul><li><p>Identify locations from images</p></li><li><p>Analyse geographic patterns</p></li><li><p>Support situational awareness</p></li></ul><p>Our web interface search produced various location insights from various different sources, ideal for corroboration.</p><p>&#128466;&#65039; Useful for uncovering location-based insights from images, videos, and geographic data.</p><h2><strong>Sky Radar</strong></h2><p>The Sky Radar module is used for aviation-related intelligence.</p><p>Example:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;d91e4094-fa36-4ce4-8057-ee3372ebfd30&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">python3 thebigbrother.py --skyradar &lt;flight_or_aircraft&gt;</code></pre></div><p>This can provide:</p><ul><li><p>Flight tracking data</p></li><li><p>Aircraft information</p></li><li><p>Movement patterns</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9hO4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9hO4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png 424w, https://substackcdn.com/image/fetch/$s_!9hO4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png 848w, https://substackcdn.com/image/fetch/$s_!9hO4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png 1272w, https://substackcdn.com/image/fetch/$s_!9hO4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9hO4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png" width="1456" height="642" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:642,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9hO4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png 424w, https://substackcdn.com/image/fetch/$s_!9hO4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png 848w, https://substackcdn.com/image/fetch/$s_!9hO4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png 1272w, https://substackcdn.com/image/fetch/$s_!9hO4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa88e25c-f31b-4fe2-8ed7-20af0f5f1ef1_1600x705.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#128466;&#65039; Useful in niche investigations involving travel, logistics, or tracking assets.</p><h3><strong>Use Cases</strong></h3><p>TheBigBrother is essentially a username intelligence + image correlation tool that:</p><ul><li><p>scans hundreds of platforms (~400+) for usernames</p></li><li><p>pulls profile images</p></li><li><p>runs automated reverse image searches across multiple engines</p></li></ul><p>That combination is best for identity linking, username pivoting, and avatar-based correlation.</p><p><strong>The bottom line?</strong> It shines in early-stage investigations, when you&#8217;re trying to answer: &#8220;Where else does this person exist online?&#8221;</p><p><strong>Where this tool is actually useful in OSINT:</strong></p><p><strong>Identity Correlation/linking accounts</strong></p><p>If you start with a username or even just a profile image, you can find matching usernames across platforms, confirm links using reused profile pictures, and cluster accounts belonging to the same person.</p><p><strong>Social Media Investigations</strong></p><p>The tool accelerates what analysts normally do manually i.e. searching usernames across platforms, comparing profile photos and running reverse image searches separately. With this automated, you can quickly find forgotten/old accounts, identify niche platforms, and uncover behaviour patterns across platforms. </p><p><strong>Reverse Image Pivoting</strong></p><p>This is, in our opinion, an underrated use of the tool. Essentially, because it auto-runs reverse image searches, you can detect reused avatars across multiple accounts, spot fake personas using stock/AI images, and find the original source of a profile image. This is useful for catfish investigations, scammer tracking, or simply verifying whether a persona is real.</p><p><strong>Threat Intelligence / Cyber Investigations</strong></p><p>In cyber threat intel, attackers often reuse usernames, avatars, and branding. TheBigBrother helps pivot from a known handle to a broader footprint, and can identify presence on GitHub, forums, marketplaces, and social platforms.</p><p><strong>Red Teaming / Privacy Audits</strong></p><p>Security teams can use this tool to understand what an attacker could discover publicly via simulating how easily identities can be correlated and identifying OPSEC failures such as username and avatar reuse.</p><div><hr></div><p>&#127937; <strong>New CTF Challenge Live - The Insider</strong></p><p>A new CTF challenge has been posted on our CTF website. This week&#8217;s challenge focuses on Local search methods. Your task is to identify the username of an insider who plans to target a company with ransomware and also determine the targeted company name.</p><p>Start competing in our Capture the Flag (CTF)</p><p>&#129667; If you missed the last CTF, here&#8217;s a link to catch up.</p><p>Last week&#8217;s CTF challenge featured a challenge titled &#8220;The Hacktivist&#8221;.</p><p>Solution WU :</p><p>Using <a href="https://twitterwebviewer.com/">Twitter Viewer - View Twitter Without Account</a> and typing the username of the X account &#8220;RepresaliaNet&#8221; we could browse the posts made by the threat actor without having an account.</p><p>While browsing the posts, we could notice that one of the posts published on Nov 28, 2024 contains the username : YourZer321-PVC</p><p>Scrolling further, we could see that the first post date was : 25/09/2024</p><p>To find the country we needed to have an account (Sock Puppet). By clicking on &#8220;about this account&#8221;, we could see that the account was based in : Uzbekistan</p><div><hr></div><p>&#9989; That&#8217;s all for this issue of The OSINT Newsletter. Thanks for reading and supporting this publication with a paid subscription.</p><p>&#128161; Remember OSINT != tools. Tools help you plan and collect data but the result of that tool is not OSINT. You must analyze, verify, receive feedback, refine, and produce a final, actionable product of value before it can be called intelligence.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://osintnewsletter.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Episode 15: Offline OSINT and Building Ethical Investigative Skill Sets]]></title><description><![CDATA[Listen now | Tools, tactics, and fresh investigations expanding the open-source intelligence toolkit.]]></description><link>https://osintnewsletter.com/p/episode-15-offline-osint-and-building</link><guid isPermaLink="false">https://osintnewsletter.com/p/episode-15-offline-osint-and-building</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Fri, 27 Mar 2026 16:00:56 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/192080768/027f02f16e763cf37328d1099f7b254b.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Not all intelligence lives online. Some of the most valuable data is already sitting on your machine. And every investigator eventually runs into the same problem: how do you actually work with it at scale?</p><p>This episode covers Issues 99 and 100 of The OSINT Newsletter and focuses on two essential aspects of modern OSINT: processing large datasets locally using efficient tools, and developing your investigative skill set through consistent, ethical practice.</p><p>In Episode 15 of The OSINT Podcast, host Jake Creps explores offline OSINT from first principles, breaking down why traditional tools fail when dealing with investigative scale data. The episode explains how local search tools operate without loading entire datasets into memory, allowing investigators to extract key information from massive files quickly and efficiently.</p><p>Jake walks through core command line techniques used in local analysis, including grep for pattern matching, csvkit for structured data filtering, and tools like awk and jq for processing and transforming datasets. By combining these tools, investigators can build lightweight pipelines that turn raw data into usable intelligence.</p><p>The episode then shifts from tools to mindset, focusing on how investigators actually develop their skill set over time. Rather than relying on theory alone, Jake outlines practical, repeatable methods for improving as an OSINT practitioner.</p><p>He explores how collecting and sharing tools builds familiarity with the ecosystem, why writing and teaching methods reinforces understanding, and how small scale investigations such as analysing spam emails can provide valuable repetitions without ethical risk.</p><p>Jake also discusses the importance of applying OSINT for real world impact, highlighting opportunities to support non profit investigations and contribute to meaningful causes. Alongside this, the episode covers personal OPSEC, showing how investigators can use their own techniques to audit and reduce their digital footprint.</p><p>Along the way, Jake reinforces a core principle of OSINT: tools enable collection, but intelligence comes from analysis. Mastery comes from repetition, not novelty.</p><p><strong>Highlights include:</strong></p><p><strong>&#128194; Offline OSINT</strong> &#8211; Working with Local Data &#8211; how to search and analyse massive datasets using tools like grep, csvkit, awk, and jq without overwhelming your system.</p><p><strong>&#129504; Building Your OSINT Skill Set</strong> &#8211; practical methods for improving as an investigator through repetition, teaching, tool discovery, and low risk investigations.</p><p><strong>&#128736; Tools in Focus</strong> &#8211; grep for fast pattern matching, csvkit for structured data handling, and command line workflows for scalable data processing.</p><p>Throughout the episode, the focus stays on practical investigative thinking. Data reveals patterns. Practice builds intuition. And the best investigators know how to combine both.</p><p>If you want to improve how you handle large datasets and develop your OSINT skill set in a structured, ethical way, Episode 15 is for you.</p><p><strong>References</strong></p><ul><li><p><a href="https://osintnewsletter.com/p/99">OSINT Newsletter &#8211; Issue 99</a></p></li><li><p><a href="https://osintnewsletter.com/p/100">OSINT Newsletter &#8211; Issue 100</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #100]]></title><description><![CDATA[5 Ethical Ways to Develop Your OSINT Skill Set]]></description><link>https://osintnewsletter.com/p/100</link><guid isPermaLink="false">https://osintnewsletter.com/p/100</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 26 Mar 2026 13:03:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/56a2ee35-dfbc-463f-91b3-13d47813f172_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 100th issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. My goal with this newsletter is to help promote the OSINT industry, develop better investigators, and raise awareness of ethical use cases for open source intelligence.</p><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>Offline OSINT: Local Search Tools and Methods</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;911ec222-8bbd-49ea-ad3c-13e61f9dcee5&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 99th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #99&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-03-19T13:03:15.544Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f02b7f8f-9831-4415-a9bb-861951daa88a_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/99&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:190731034,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:12,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><h1>OSINT News</h1><p>&#128240; <strong>Public GitHub Repositories from News Organizations</strong></p><p>Open Journalism delivers a biweekly update of open source projects published by news organizations. Sometimes tools, datasets, or other useful bits of information, make sure show your support for this great project.</p><p><a href="https://openjournalism.news/">Read on Open Journalism&#8230;</a></p><p>&#127913; H/T: Scott Klein</p><p>&#128240; <strong>Changes in Google Programmable Search Engines</strong></p><p>There are changes coming to custom search engines in Google. They will no longer have the option to do a full web. Many OSINT tools are built on the back of custom search engines. If you use any, it might be time to diversify.</p><p><a href="https://www.linkedin.com/posts/henribeek_osint-cti-programmablesearchengine-share-7437029043822137344-R5Eu?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABq6F0oBbmG93OZu2jSa-VZL4TF8Qv14q1Y">Read on LinkedIn&#8230;</a></p><p>&#127913; H/T: Henri Beek</p><p>&#128240; <strong>Open-source intelligence shuts down</strong></p><p>This article highlights something I&#8217;ve mentioned often, becoming too reliant on datasets being available and eventually being disrupted by changes. Satellite images of the area affected in the ongoing war in Iran have been blocked or removed. Many research projects rely on regular access to these images for humanitarian purposes or otherwise.</p><p><a href="https://www.economist.com/middle-east-and-africa/2026/03/15/open-source-intelligence-shuts-down">Read on The Economist&#8230;</a> | <a href="https://archive.is/20260318191138/https://www.economist.com/middle-east-and-africa/2026/03/15/open-source-intelligence-shuts-down">No Paywall</a></p><div><hr></div><h1>OSINT Tools</h1><p>&#128270; <strong>WireTapper</strong></p><p>This is a niche tool. It may even be somewhat of a grey tool. Using the Wigle, WPA Sec, OpenCellID, and Shodan API keys, WireTapper provides insight into location-based technical data from passive sources.</p><p><a href="https://github.com/h9zdev/WireTapper">GitHub</a></p><p>&#127913; H/T: h9zdev</p><p>&#128270; <strong>Deaddrop</strong></p><p>Another Telegram search engine. Always build redundancy. Search for content within a scraped Telegram archive and find information that isn&#8217;t indexed by search engines.</p><p><a href="https://deaddrop.theosintconsultants.com/">Web App</a> | <a href="https://www.linkedin.com/posts/osint-telegram-threatintelligence-share-7437538632992964608-u5i5?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABq6F0oBbmG93OZu2jSa-VZL4TF8Qv14q1Y">LinkedIn</a></p><p>&#127913; H/T: The OSINT Consultants</p><p>&#128270; <strong>LootBin</strong></p><p>Termbin is like Pastebin but through the command line. LootBin helps you gather information from Termbin, another source not indexed by search engines.</p><p><a href="https://github.com/gustqvo432/LootBin">GitHub</a></p><p>&#127913; H/T: gustqvo432</p><p><strong>Note:</strong> There seems to be some suspicious code in the Windows version of this tool. Do not install it. Instead, understand the concept educationally.</p><p>&#11088; <strong>Sponsor: SockPuppet.io</strong></p><p>SockPuppet delivers secure, isolated environments with persistent virtual desktops and phones, real carrier-based SMS for OTPs, and residential IP connectivity&#8212;selectable from hundreds of locations. All accessible through a simple web interface that scales as your investigations grow.</p><p>Visit <a href="https://hubs.la/Q03DbZN00">SockPuppet.io</a> to empower your investigations with technology trusted by intelligence professionals.</p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p><strong>&#9889;5 Ethical Ways to Develop Your OSINT Skill Set</strong></p><ul><li><p>Developing an OSINT skill set is valuable for a variety of roles. I&#8217;ve seen OSINT used everywhere from recruiting for HR departments to tracking Elon Musk&#8217;s airplane. If you&#8217;re looking for ways to build your skill set ethically, you&#8217;ve come to the right place. If you practice all 5 methods even once, you&#8217;ll be noticeably better.</p></li></ul><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry there&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p><div><hr></div>
      <p>
          <a href="https://osintnewsletter.com/p/100">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #99]]></title><description><![CDATA[Offline OSINT: Local Search Tools and Methods]]></description><link>https://osintnewsletter.com/p/99</link><guid isPermaLink="false">https://osintnewsletter.com/p/99</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 19 Mar 2026 13:03:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f02b7f8f-9831-4415-a9bb-861951daa88a_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 99th issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:</p><ul><li><p>How to search large datasets locally</p></li><li><p>Command-line search methods</p></li><li><p>Pro tools for processing structured data</p></li><li><p>&#8230;and everything you need to know about analysing large files.</p></li></ul><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>Collecting Information from Local Sources in an OSINT Investigation</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ed396eed-3ecc-4f56-ad22-fbe64b7218d1&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 98th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. My goal with this newsletter is to help promote the OSINT industry, develop better investigators, and raise awareness of ethical use cases for open source intelligence.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #98&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-03-12T13:03:21.724Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a6a19e21-818b-44cb-9cdb-30a570a22e33_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/98&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:182551142,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:17,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>&#127897;&#65039; <strong>If you prefer to listen, here&#8217;s a link to the podcast instead.</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f8fbbec8-8756-4783-8d71-c41c9357aece&quot;,&quot;caption&quot;:&quot;Every packet travels somewhere. Every connection leaves a trace. And every investigator eventually has to answer the same question: where did this activity actually come from?&quot;,&quot;cta&quot;:&quot;Listen now&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Episode 14: IP Address Investigations and Local OSINT&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-03-13T14:03:03.039Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f4b9fb1c-cf61-4d63-9bba-4b88225f31d6_1200x630.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/episode-14-ip-address-investigations&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:190501977,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><h1>Offline OSINT: Local Search Tools and Methods</h1><p>Not all OSINT happens on the internet. Sometimes the most valuable insights come from something you&#8217;ve already got downloaded; and every OSINT investigator has heaps of exported spreadsheets and datasets on file to work with. But when you&#8217;re archiving everything, it&#8217;s easy for your collection of documents - or even the size of the datasets themselves - to get huge.</p><p>But processing data with the wrong tools can be a real drag. If you&#8217;ve ever tried to open a 3GB CSV file in Excel, you already know the pain. Standard office tools simply weren&#8217;t built for investigative-scale datasets - and that&#8217;s where local device search tools come in.</p><p>Let&#8217;s get into local search.</p><h2>What is Local Search?</h2><p>OSINT investigators often end up working with big datasets. Breach dumps, scrapes, exports and archives can mount up, with a single file easily containing millions of rows. A rookie investigator will usually try to open these with traditional spreadsheet software (think Microsoft Excel); only to find it crashes instantly or slows to a stop. In turn, searching through a dataset is even more of a struggle. It&#8217;s possible, but <a href="https://support.microsoft.com/en-us/office/what-to-do-if-a-data-set-is-too-large-for-the-excel-grid-976e6a34-9756-48f4-828c-ca80b3d0e15c">it&#8217;s extremely painful.</a></p><p>Local device search tools are made to solve this problem. They scan the files directly, without loading everything into memory and making themselves sluggish. Instead of manually scrolling through data, you can extract exactly what you need in seconds - like pulling from a digital library catalog, rather than searching shelf-by-shelf.</p><h2>Searching vs. Processing: How to Handle Large Files</h2><p>The tools we&#8217;re about to talk about are all naturals at searching big files. But what if you want to do more than just search? Then you need processing power. If you want to:</p><ul><li><p>Extract all email domains from a breach file</p></li><li><p>Identify the most common usernames in a dataset</p></li><li><p>Count how many times a specific organisation appears</p></li><li><p>Separate valid data from corrupted rows</p></li></ul><p>Then clearly, just search won&#8217;t cut it. Luckily, <a href="https://warwick.ac.uk/research/rtp/sc/rse/training/linuxdesktop/basiccommandline/">command-line</a> processing tools excel at these tasks because they&#8217;re designed for automation and scale. Many investigators will even combine the tools we&#8217;re about to discuss together; mixing and matching methods and modules lets you build data- processing pipelines that perfectly fit your needs.</p><p>For example, you might search up a keyword with grep, then use awk to count the matches. If it sounds like we&#8217;re talking nonsense&#8230; let&#8217;s learn what the grep we&#8217;re on about.</p><h2>grep: The Text Search Tool</h2><p><a href="https://www.youtube.com/watch?v=EK-A--VaTYo">grep</a> (short for global regular expression print) is one of the most popular local device search tools in the OSINT community. It&#8217;s a Unix command-based search, localised to your device; grep scans text files for matching patterns, and returns every line containing your query.</p><p>It&#8217;s fast, simple, and extremely powerful when working with large text-based datasets. The perfect way to surface those pesky data points when they&#8217;re swamped. Use grep to search files for:</p><ul><li><p>Email addresses</p></li><li><p>Phone numbers</p></li><li><p>Domain names</p></li><li><p>Usernames</p></li><li><p>Keywords related to your investigation</p></li></ul><p>For example, if you wanted to search a breach file for a particular email address, grep could scan millions of rows for it almost instantly.</p><p>On top of this, grep can also do <a href="https://www.ibm.com/docs/ar/i/7.4.0?topic=data-grep">pattern matching. </a>This means you can search for entire categories of data, too, as well as exact words; any email address ending in a particular domain, for instance. Because it reads line-by-line rather than loading files fully, grep can comfortably handle big datasets that would blow up normal apps.</p><h2>csvkit: Making Sense of Spreadsheets</h2><p>Most OSINT datasets are stored as <a href="https://flatfile.com/blog/what-is-a-csv-file-guide-to-uses-and-benefits/">CSV files</a>. CSV stands for &#8220;comma separated values,&#8221; and it&#8217;s one of the most common formats for structured data exports. Breach databases, scraped content, and research datasets are frequently distributed this way. Usually, CSV means spreadsheets; but even programs that don&#8217;t seem like spreadsheet apps will often offer CSV as an output file type.</p><p>But CSV files grow big, fast. To deal with this, you need a tool specially designed to deal with CSVs - without opening them and overloading your machine. <a href="https://csvkit.readthedocs.io/en/latest/">csvkit is such a tool</a>; it works from the command line to search, filter, and analyse spreadsheets without opening. Instead of scrolling through millions of rows, you can:</p><ul><li><p>View column headers instantly</p></li><li><p>Filter rows based on conditions</p></li><li><p>Extract specific columns</p></li><li><p>Convert files into other (more manageable) formats</p></li></ul><p>For example, if a sheet has three columns full of usernames, IPs, and emails, csvkit allows you to isolate just the column you need and ignore the rest. Makes it much easier to focus on each different data point methodically without getting distracted.</p><h2>More Tools for Local Data</h2><p>Beyond grep and csvkit, several other lower-case-named tools are popular in pro OSINT workflows. They might have a disregard for grammar rules, but they&#8217;re great at handling big datasets - searching, processing, analysing, and more.</p><ul><li><p><a href="https://github.com/BurntSushi/ripgrep">ripgrep</a>: ripgrep is designed to make grep commands even quicker and easier with little changes; automatically ignoring irrelevant files, like binary data for example. If you have a whole folder of datasets, ripgrep will whip through that entire directory structure - stat.</p></li><li><p><a href="https://www.ibm.com/docs/en/aix/7.1.0?topic=awk-command">awk</a>: like grep and <a href="https://www.ibm.com/docs/en/aix/7.2.0?topic=s-sed-command">sed</a>, awk is a command-line filter. More general than grep, it&#8217;s often used for processing structured data - and can handle different commands and modifications than its cousins.</p></li><li><p><a href="https://jqlang.org"> jq</a>: described as &#8220;sed for JSON data&#8221;. Sometimes, datasets are stored in JSON format rather than CSV, making them much more difficult to read manually. jq can search and pull out specific fields from JSON data turning messy machine-readable files into human-readable intel.</p></li><li><p><a href="https://sqlite.org">SQLite</a>: When a dataset gets super big, it&#8217;s sometimes easier to import it into a lightweight database than leave it standalone. SQLite lets you do this. Plus, it&#8217;s already the most used database engine in the world.</p></li></ul><h2>Example: Local Search in Action</h2><p>this time, imagine you are a professional osint analyst, working with a dataset containing millions of logins. but something seems wrong. immediately, you realise - all the data appears in lowercase.</p><p>somebody has stolen all the capital letters, and the issue is spreading. you need to find out when, and how.</p><h3>step one: search</h3><p>first you need to confirm that the capitals have gone. using grep, you scan the dataset for a username you<em> know </em>should be capitalised. Here, every instance appears in lowercase - confirming the capitals aren&#8217;t where they should be.</p><h3>step two: process</h3><p>next, you process the data for evidence. you use awk to analyse patterns across the dataset - counting the examples of that de-capitalised username, and identifying other entries that should have been capitalised. you begin to question the thief&#8217;s motives.</p><h3>step three: structured analysis</h3><p>you isolate each column with cvskit, and work through each methodically: usernames, email addresses, dates, checking each for formatting issues. the loss has occurred consistently across all fields. seeing the scale of the crime disturbs you.</p><h3>step four: check other formats</h3><p>Finally, you run jq on an older version of your dataset. these files still contain capital letters - meaning the dataset was just corrupted during the csv export.</p><p>as for the issue spreading&#8230; you need a new keyboard.</p><h3>Key Takeaways</h3><p>So, now you know the basics of local search. By now you should be able to:</p><ul><li><p><strong>Search:</strong> Use commands to find specific data points</p></li><li><p><strong>Process:</strong> Execute more complex commands to make your life easier</p></li><li><p><strong>Analyse:</strong> Work with tools to identify patterns and pivot</p></li><li><p><strong>type: </strong>ignore automatic capitalisation and write in lower case</p></li></ul><p>See you next time, investigators!</p><div><hr></div><p>&#127937; New CTF Challenge Live - The Hacktivist (2 Parts)</p><p>A new CTF challenge has been posted on our CTF website. This week&#8217;s challenge focuses on identifying the hacker username of a threat actor, the date of their first post announcing the start of a cyberattack and the country in which the account is actually operated, using only open source intelligence techniques.</p><p><a href="https://ctf.osintnewsletter.com/login?next=%2Fchallenges%3F">Start competing in our Capture the Flag (CTF)</a></p><p>&#129667; If you missed the last CTF, here&#8217;s a <a href="https://ctf.osintnewsletter.com/challenges?#Trace%20The%20IP-21">link to catch up</a>.</p><p>Last week&#8217;s CTF challenge featured a challenge titled &#8220;Trace The IP&#8221;. Here is the solution:</p><p>Using <a href="https://www.iplocation.net/ip-lookup">IP Lookup | Find Your Public IP Address Location</a> and searching for 151.202.95.130 we could see that the IP was linked to several cities : Tuckahoe, Bronxville, New York, Eastchester, Yonkers. Formatting them in alphabetical order gave us : Bronxville, Eastchester, New York, Tuckahoe, Yonkers. </p><p>Looking at the ISP we could see that it was Verizon Business.</p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry. There&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p>]]></content:encoded></item><item><title><![CDATA[Episode 14: IP Address Investigations and Local OSINT]]></title><description><![CDATA[Listen now | Tools, tactics, and fresh investigations expanding the open-source intelligence toolkit.]]></description><link>https://osintnewsletter.com/p/episode-14-ip-address-investigations</link><guid isPermaLink="false">https://osintnewsletter.com/p/episode-14-ip-address-investigations</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Fri, 13 Mar 2026 14:03:03 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/190501977/dce9c42a740b9875f40d291af7a23165.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Every packet travels somewhere. Every connection leaves a trace. And every investigator eventually has to answer the same question: where did this activity actually come from?</p><p>This episode covers Issues 97 and 98 of The OSINT Newsletter and focuses on two critical aspects of modern OSINT: understanding how IP addresses reveal the movement of data across the internet, and how investigators can gather intelligence from a specific location even when they are nowhere near it.</p><p>In Episode 14 of The OSINT Podcast, host Jake Creps explores IP address OSINT from first principles, explaining how IPs function as the routing system of the internet. The episode walks through the difference between user IPs and server infrastructure, why dynamic IP addresses constantly change hands, and how static infrastructure can reveal patterns behind suspicious activity.</p><p>Jake then breaks down several investigative techniques used in IP analysis, including reverse IP lookups, passive DNS research, IP geolocation, and identifying traffic routed through VPNs and Tor nodes. When combined with timestamps and behavioural patterns, these signals allow investigators to reconstruct the path digital activity has taken across networks.</p><p>The episode then shifts to a different but equally important challenge: local OSINT investigations. Some investigations require extremely targeted intelligence from a specific city or region. In those cases, investigators must replicate the local internet environment in order to see the same results a local user would.</p><p>Jake explores how investigators can use VPNs and browser location manipulation to appear local, allowing search engines, advertisements, and recommendation systems to reveal location specific information. From there, he discusses how to build local intelligence feeds by aggregating small regional publications, government websites, and community sources into a single stream using RSS readers and alerting tools.</p><p>The episode also looks at analysing activity around physical locations using Google Maps &#8220;Popular Times&#8221; data, showing how investigators can detect patterns and unusual activity around businesses or venues without ever being physically present.</p><p>Along the way, Jake highlights several useful OSINT tools and resources including Dark Light Viewer, Twitter Viewer, and GeoSentinel, while also touching on developments in AI driven investigations and evolving OPSEC considerations.</p><p>As always, the emphasis remains on method over novelty. Infrastructure reveals behaviour. Location reveals context. And the best investigators know how to follow both.</p><p>Highlights include:</p><p><strong>&#128230; IP Address OSINT</strong> &#8211; Following the Packets &#8211; how IP addresses function as the routing system of the internet, why dynamic IPs complicate attribution, and how reverse IP lookups and passive DNS can reveal hidden infrastructure.</p><p><strong>&#127757; Local OSINT Investigations</strong> &#8211; techniques for collecting intelligence from a specific place remotely using VPNs, browser configuration, local news aggregation, and location specific data sources.</p><p><strong>&#128736; Tools in Focus</strong> &#8211; Dark Light Viewer for satellite light comparison, Twitter Viewer for footprint free browsing of X profiles, and GeoSentinel for tracking global movement across maritime and aviation data.</p><p>Throughout the episode, the focus stays on practical investigative thinking. Infrastructure creates patterns. Location creates context. And when both are understood together, digital activity becomes much easier to trace.</p><p>If you want to strengthen your understanding of IP address investigations and location based intelligence gathering, Episode 14 is for you.</p><p><strong>References</strong></p><p><a href="https://osintnewsletter.com/p/97">OSINT Newsletter &#8211; Issue 97</a></p><p><a href="https://osintnewsletter.com/p/98">OSINT Newsletter &#8211; Issue 98</a></p>]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #98]]></title><description><![CDATA[Collecting Information from Local Sources in an OSINT Investigation]]></description><link>https://osintnewsletter.com/p/98</link><guid isPermaLink="false">https://osintnewsletter.com/p/98</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 12 Mar 2026 13:03:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a6a19e21-818b-44cb-9cdb-30a570a22e33_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 98th issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. My goal with this newsletter is to help promote the OSINT industry, develop better investigators, and raise awareness of ethical use cases for open source intelligence.</p><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>Return to Sender: OSINT With IP Addresses</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;62165ff4-18d1-4ff8-8056-b24b1c7fc202&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 97th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #97&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:369150506,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!E93h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1de3e-2f30-4b94-b240-6df2a26b84bc_400x400.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-05T14:02:17.854Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d01d42f1-c1da-42ae-9bec-16eddef9fb5c_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/97&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189795808,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:18,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><h1>OSINT News</h1><p>&#128240;  <strong>Exploring a Secret Underground OSINT Marketplace</strong></p><p>This issue of The OSINT Insider is a treasure trove of useful information for OSINT practitioners covering topics from new OSINT tools and datasets.</p><p><a href="https://osintinsider.com/p/osint-insider-issue-8-exploring-a">Read on OSINT Insider&#8230;</a></p><p>&#127913; H/T: <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;The OSINT Insider&quot;,&quot;id&quot;:301308524,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25c5eeb2-9c4c-49e8-b7a5-f8623b69600a_500x500.png&quot;,&quot;uuid&quot;:&quot;117a7169-f2dd-4932-ac4f-a8d76f682b2a&quot;}" data-component-name="MentionToDOM"></span> </p><p>&#128240; <strong>I Built an OSINT Agent Skill to Expose Your Digital Tattoo</strong></p><p>OPSEC isn&#8217;t just about what you post online, it&#8217;s about what happens to the content after you post. This issue of The Secure Circuit covers an OSINT tool that helps you cover your tracks and also find the tracks of others.</p><p><a href="https://littlehakr.substack.com/p/osint-agent-skill">Read on The Secure Circuit&#8230;</a></p><p>&#127913; H/T: <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;David Kyazze&quot;,&quot;id&quot;:335422791,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!g9VH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e2d9708-1726-4b5f-8ef9-29eca65a24b7_1286x1287.jpeg&quot;,&quot;uuid&quot;:&quot;78fc983e-8ba3-4837-8e22-0039a2f950d7&quot;}" data-component-name="MentionToDOM"></span> </p><p>&#128240; <strong>AI for OSINT Investigations: Turning Data Chaos into Intelligence</strong></p><p>It&#8217;s 2026, AI is here and you&#8217;re going to use it whether you want to or not. Generic AI tools like GPT and Gemini may not be great for OSINT; however, AI within OSINT tools is a different story.</p><p><a href="https://projectosint.substack.com/p/ai-for-osint-investigations-turning">Read on Project OSINT&#8230;</a></p><p>&#127913; H/T: <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Project OSINT&quot;,&quot;id&quot;:334944396,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29d5fac8-300e-46fb-af06-154b1dab7a0f_1024x1024.png&quot;,&quot;uuid&quot;:&quot;71d2c3b6-25b2-42bb-91a2-acce442a65e8&quot;}" data-component-name="MentionToDOM"></span> </p><div><hr></div><h1>OSINT Tools</h1><p>&#128270; <strong>Dark Light Viewer</strong></p><p>Compare nighttime light levels across any location on Earth, across any period from one month to ten years.</p><p><a href="https://github.com/bendobrown/Dark-Light-Viewer">GitHub</a></p><p>&#127913; H/T: Benjamin Strick</p><p>&#128270; <strong>Twitter Viewer</strong></p><p>View a Twitter (X) profile without having to log in. See posts and media without leaving a footprint.</p><p><a href="https://twitterwebviewer.com/">Web App</a></p><p>&#128270; <strong>GeoSentinel</strong></p><p>Track global movement in real team; from maritime to aviation. Review in geospatial tooling.</p><p><a href="https://github.com/h9zdev/GeoSentinel/">GitHub</a></p><p>&#127913; H/T: H9</p><div><hr></div><h3>Description</h3><h2>Scenario</h2><p>A potential IP address associated with a French threat actor has been identified. Further investigation is required to determine the ISP name and the cities linked to this IP address in order to support attribution and ongoing analysis.</p><div><hr></div><h2>Challenge Objective</h2><p>Your task as an OSINT analyst is to find :</p><ul><li><p>The cities linked to this IP (in alphabetical order).</p></li><li><p>The ISP name.</p></li></ul><div><hr></div><p>&#127937; <strong>New CTF Challenge Live - Trace The IP</strong></p><p>A new CTF challenge has been posted on our CTF website. This week&#8217;s challenge focuses on identifying the ISP name and the cities associated with a specific IP address using only open source intelligence techniques.</p><p>Start competing in our Capture the Flag (CTF)</p><p>&#129667; If you missed the last CTF, here&#8217;s a <a href="https://ctf.osintnewsletter.com/challenges#The%20Wi-Fi%20Password-19">link</a> to catch up.</p><p>Last week&#8217;s CTF challenge featured a challenge titled &#8220;The Wi-Fi Password&#8221;. Participants needed to identify the the password of a suspicious Wi-Fi using only open source intelligence tools and techniques.</p><p>Solution:</p><ul><li><p>Searching for : epstein property Florida on google brings us to the wikipedia page where the address is displayed</p></li><li><p>Looking at the address we notice that it&#8217;s in Palm Beach</p></li><li><p>Using &#128270; p3Wifi <a href="https://3wifi.dev/map.html">Free WiFi map - p3wifi</a> and searching for the Palm Beach area we notice a weird Wi-Fi named SteinStein with the password visible in clear, located in front of a store named LaMuse which is exactly 0.7 miles and 3 minutes away from Epstein&#8217;s property when checking it on google maps with itinerary search.</p></li></ul><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p><strong>&#9889; Collecting Information from Local Sources in an OSINT Investigation</strong></p><ul><li><p>The internet reacts to where you are in the world. You can trick the internet into thinking you&#8217;re somewhere else. Once you do that, your entire browsing experience changes. I discuss this, local news aggregation, and mining &#8220;Popular times&#8221; from Google Maps in this issue of The OSINT Newsletter.</p></li></ul><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry there&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p>
      <p>
          <a href="https://osintnewsletter.com/p/98">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #97]]></title><description><![CDATA[Return to Sender: OSINT With IP Addresses]]></description><link>https://osintnewsletter.com/p/97</link><guid isPermaLink="false">https://osintnewsletter.com/p/97</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 05 Mar 2026 14:02:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d01d42f1-c1da-42ae-9bec-16eddef9fb5c_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 97th issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:</p><ul><li><p>Introduction to IP addresses.</p></li><li><p>How to investigate an IP address.</p></li><li><p>A step-by-step process for IP investigation.</p></li></ul><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>Organizing Information and Avoiding Duplication of Effort</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c97dfc1c-0d72-442d-b18a-2077418f60d1&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 96th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. My goal with this newsletter is to help promote the OSINT industry, develop better investigators, and raise awareness of ethical use cases for open source intelligence.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #96&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-26T14:02:52.196Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/275f5ed9-5ebb-41c5-8f20-c7d656e1b54b_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/96&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:182551062,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:18,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>&#127897;&#65039; <strong>If you prefer to listen, here&#8217;s a link to the podcast instead.</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6dc6549a-2559-416d-8619-0c4e775d9e0f&quot;,&quot;caption&quot;:&quot;Every image was taken somewhere. Every investigation starts somewhere. And every wasted click costs you time.&quot;,&quot;cta&quot;:&quot;Listen now&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Episode 13 - Geolocation Mastery and Organizing \nYour Investigations&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-28T16:01:10.228Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c718f65a-7fe7-4380-a7ee-f6cc779adf5f_1200x630.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/episode-13-geolocation-mastery-and&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189003588,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:13,&quot;comment_count&quot;:1,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><p>The internet is like a big mail service. Every time somebody logs into their account, clicks on to a link or loads up a site, the data for that action gets parcelled up and shipped across the web. If domains are street names, IP addresses are the house numbers that actually direct the parcels to the right home. And like regular mail, the whole process leaves a trace behind.</p><p>Of course, stealing people&#8217;s mail is a felony <a href="https://www.youtube.com/watch?v=I64hCfX9Uyo">(and a great punk track)</a> - but that doesn&#8217;t mean you can&#8217;t get valuable OSINT from tracking its journey. If you know how to read IP addresses, they can tell you where traffic travelled, what infrastructure handled it, and whether someone tried to hide the sender.</p><p>In this issue, we&#8217;re following the packets. We&#8217;ll cover:</p><ul><li><p>The basics of IP addresses</p></li><li><p>How IPs can change (and why that matters)</p></li><li><p>Reverse IP lookups</p></li><li><p>Geolocation with IPs</p></li><li><p>..plus all about VPNs and Tor traffic.</p></li></ul><p>Now, let&#8217;s check the labels.</p><h2>What Is an IP Address?</h2><p>An <a href="https://www.fortinet.com/uk/resources/cyberglossary/what-is-ip-address">IP address (short for Internet Protocol address)</a>, is a numerical identifier assigned to each device or server connected to a network. Think of it like a shipment number. It can either look like:</p><ul><li><p><strong>IPv4: </strong>The old faithful. Appears as four blocks of numbers separated by dots, e.g. 192.168.1.1.</p></li><li><p><strong>IPv6: </strong>The longer, newer format, becoming increasingly common as the <a href="https://www.arin.net/resources/guide/ipv6/">internet runs out of IPv4 space.</a> Appears as eight blocks of numbers separated by colons, e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334</p></li></ul><p>In OSINT terms, you can divide all kinds of IPs into two categories: <strong>User IPs</strong>, and <strong>Server IPs.</strong> A user IP belongs to a device connecting to a service. Meanwhile, a server IP belongs to infrastructure hosting websites, apps, or mail networks. Confusing the two is like mistaking a sender&#8217;s return address for a warehouse location.</p><p>IP addresses aren&#8217;t as stable an identifier as email addresses, for instance. But that&#8217;s OK; IP address OSINT is less about identifying individuals, and more about mapping the movement of data back to its source. Follow enough parcels, and you&#8217;ll find the depot.</p><h2>Package Redirected: Why IPs Change, and What They Tell You</h2><p>One of the biggest misconceptions in IP OSINT is assuming that IP addresses are permanent identifiers. Just because IPs are unique, doesn&#8217;t mean they can&#8217;t move from place to place. So why do IPs change, why does it matter&#8230; and once an IP changes, can you trace where it&#8217;s been?</p><h3>Dynamic IP Addresses</h3><p>Most average-Joe residential IP users are<a href="https://www.fortinet.com/uk/resources/cyberglossary/static-vs-dynamic-ip"> assigned dynamic IPs by their ISP</a> (Internet Service Provider). These can change for a ton of reasons: after a router gets rebooted, for example, when a lease gets refreshed, or just over time. The most important thing to remember is that dynamic IPs get passed around between users. An IP that belonged to one person last month might belong to somebody else now.</p><h3>Static IP Addresses</h3><p>Businesses and hosting providers, however, usually use static IPs. These are longer-term allocations, tied to servers and infrastructure semi-permanently (emphasis on <em>semi</em>). However, when you see the same static IP appearing repeatedly, you can be reasonably confident you&#8217;re looking at a fixed point.</p><h3>What IP Addresses Can Tell You</h3><p>When Google alerts you that some stranger in France is suddenly using your login on an iPhone 12, they&#8217;ve gained this intelligence by checking the new French login IP address against the <a href="https://support.google.com/mail/answer/45938?hl=en">last 10 IPs you logged in from.</a> Clearly, although an IP can&#8217;t tell you <em>who</em> did something online, it can tell you <em>where</em>, and with what device.</p><p>Overall, what IPs show you is the circumstances at the time an online activity took place. Was a login coming from a residential ISP? A data centre? A VPN provider? Or did multiple compromised accounts route through the same infrastructure - then suddenly switch to a totally different address? When paired with timestamps, old IPs help reconstruct movement patterns, and build up a theoretical narrative; like reading old postmarks to imagine a package&#8217;s journey.</p><h2>Delivery Instructions: How to Investigate an IP</h2><p>So, now you know why it&#8217;s worth investigating IPs, we can get to work on <em>how</em>. Some involve pro OSINT tools, but others are significantly more lo-fi. Let&#8217;s get into our favourite tips, tricks and techniques for investigating IP addresses.</p><h3>Reverse IP Lookups</h3><p>Reverse IP lookup - like reverse image search - flips the direction. Instead of asking &#8216;what IP does this domain use?&#8217;, you ask &#8216;what other domains are hosted on this IP?&#8217;. This is super useful when investigating scam networks and phishing campaigns.</p><p>To do it, plug the target IP into a<a href="https://dnschecker.org/reverse-dns.php"> passive DNS database</a>, or an OSINT platform that supports reverse lookup (like <a href="https://www.maltego.com">Maltego</a>). The results will bring up any domains associated with that address.</p><h3>Hosting and Registration</h3><p>Next, look for suspicious infrastructure. This could look like:</p><ul><li><p>Multiple domains sharing the same hosting</p></li><li><p>Sudden bursts of activity (registering lots of domains at once, then none at all)</p></li><li><p>Thematic similarities (crypto, &#8220;investment&#8221;, fake law firms etc.)</p></li></ul><p>For example, if a single server IP hosts ten nearly identical &#8220;investment opportunity&#8221; websites registered within weeks of each other - especially on the same cheap VPS - then that&#8217;s a strong sign of unsavoury activity. Look up hosting and registration details with <a href="https://who.is">WhoIs </a>searching.</p><p>That said, context still rules. Large hosting providers often place hundreds of legitimate websites on the same shared IP. In those cases, you&#8217;re looking at shared warehouse space, not necessarily shared ownership.</p><h3>Geolocation</h3><p>We covered <a href="https://www.iplocation.net">IP geolocation</a> a little in the last issue; it&#8217;s a way of identifying the country and often the city an IP is hosted in. It&#8217;s often inaccurate, and can&#8217;t pinpoint a specific address. So, think of it as narrowing delivery to the right city - not the exact doorstep.</p><p>However, it can still be useful - particularly for spotting inconsistencies. If a company claims to operate exclusively in one country but consistently routes traffic through infrastructure in another, for instance. Also look for repeated logins from the same location, and check if that matches with the IP geolocation result.</p><h3>VPNs (Virtual Private Networks)</h3><p>VPNs are a blessing and a curse for IP OSINT. When someone uses a VPN, the IP address you see belongs to the VPN provider&#8217;s infrastructure - not the user&#8217;s original connection. These VPN IPs often resolve to big data centres, too, making it tricky to tie down the user&#8217;s actual details.</p><p>There are ways to track if somebody&#8217;s using a VPN; rapid shifts between locations, for example. This is extremely useful if you need proof that a target is intentionally rerouting their traffic to avoid being detected.</p><h3>Tor Nodes</h3><p>Tor also adds another layer of complexity. The IP you see with <a href="https://www.csoonline.com/article/565798/what-is-the-tor-browser-how-it-works-and-how-it-can-help-you-protect-your-identity-online.html">a Tor browser </a>is the target&#8217;s exit node, not the actual origin. Tor exit nodes are also completely public and rotate between users globally; so if you detect one, all it tells you is that the target didn&#8217;t want to be tracked. It doesn&#8217;t imply malicious intent, but it does tell you the package was deliberately relabelled before delivery.</p><h2>Example: IP Address OSINT in Action</h2><p>This time, imagine somebody has been making repeated attempts to log into your Strava account. If successful, they could hopelessly distort your PBs. All you know is that the logins originate from the same IP address. Let&#8217;s find out who&#8217;s running things.</p><p><strong>Step 1: Identify the Owner</strong></p><p>A Whois search shows that the login IP is registered to a regional consumer IP; a specific subscriber, on residential broadband. But where, and who?</p><p><strong>Step 2: Analyse the Behavior</strong></p><p>The IP is fairly consistent - with no jumping locations or ties to known exit nodes. That means the user isn&#8217;t attempting to hide their identity. The login attempts are also spaced irregularly, with pauses that resemble manual interaction rather than botting. So this is a real person.</p><p><strong>Step 3: Geolocate</strong></p><p>Cross-referencing multiple IP geolocation services places the IP consistently in western Ohio, near a cluster of rural towns. You&#8217;ve never been to Ohio. And you definitely haven&#8217;t been logging into Strava from there. An interesting detail: the region is known for its expansive cornfields.</p><p><strong>Step 4: Reverse IP &amp; Domain Check</strong></p><p>A reverse IP lookup reveals two domains hosted to that same IP.</p><p>The first is a personal blog documenting endurance training experiments; one man pushing himself to run further and further in concentric circles without becoming dizzy.</p><p>The second, humanccohio.com, shows groups of runners arranged in geometric formations across harvested fields - what the author calls &#8220;human crop circles.&#8221; Metadata from the site aligns with the same western Ohio geolocation as the IP.</p><p><strong>Step 5: Behavioral Context</strong></p><p>The timestamps of the login attempts coincide with posts on the blog discussing &#8220;mapping local athlete data&#8221; and &#8220;identifying high-mileage runners nearby.&#8221;</p><p>Mystery solved: this is one guy in western Ohio, checking out Strava profiles in an attempt to recruit (or map) local athletes without their knowledge for his &#8216;human crop circle&#8217; project. Weird.</p><h2>Key Takeaways</h2><p>Message delivered - now you know how to do OSINT with IP addresses. You should know:</p><ul><li><p><strong>How delivery works: </strong>An IP is like a house number, it directs the data</p></li><li><p><strong>IPs change: </strong>Just because an IP is there now, doesn&#8217;t mean it&#8217;ll stick around</p></li><li><p><strong>Check the return address: </strong>reverse IP search is your most powerful tool</p></li><li><p><strong>Cross-reference everything:</strong> corroborate with behaviour to get the full story</p></li></ul><p>See you next week, investigators!</p><div><hr></div><p>&#127937; <strong>New CTF Challenge Live - The Wi-Fi Password</strong></p><p>A new CTF challenge has been posted on our CTF website. This week&#8217;s CTF challenge focuses on finding the password of a weird Wi-Fi using only open source intelligence techniques.</p><p><a href="https://ctf.osintnewsletter.com/challenges">Start competing in our Capture the Flag (CTF)</a></p><p>&#129667; If you missed the last CTF, <a href="https://ctf.osintnewsletter.com/challenges#The%20Unknown%20Bridge-17">here&#8217;s a link to catch up</a>.</p><p>Last week&#8217;s CTF challenge featured a GEOINT challenge titled &#8220;The Unknown Bridge&#8221;.</p><p>Looking at the UAV in the image, we could see its number which is 166509.<br>Using bing browser and searching for &#8220;166509 flight&#8221; we could find a flight of this UAV on : <a href="https://www.flightaware.com/live/flight/166509">flightaware.com/live/flight/166509</a><br>Looking at the tracking, we could see that it was last seen near Patuxent River MD, we could also notice the same airport as in the image which is Patuxent River (NHK)<br>On the left side of the airport we could see the same bridge as in the image which is named: <em>Thomas Johnson.</em><br>By searching on Google : Patuxent River Bridge, we could see that the full name of the bridge was : <em>Governor Thomas Johnson.</em></p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry. There&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p>]]></content:encoded></item><item><title><![CDATA[Episode 13 - Geolocation Mastery and Organizing 
Your Investigations]]></title><description><![CDATA[Listen now | Tools, tactics, and fresh investigations expanding the open-source intelligence toolkit.]]></description><link>https://osintnewsletter.com/p/episode-13-geolocation-mastery-and</link><guid isPermaLink="false">https://osintnewsletter.com/p/episode-13-geolocation-mastery-and</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Sat, 28 Feb 2026 16:01:10 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/189003588/82c1318106c0479c6589a52deca290b0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Every image was taken somewhere. Every investigation starts somewhere. And every wasted click costs you time.</p><p>This episode covers Issues 95 and 96 of The OSINT Newsletter and focuses on two core realities of modern OSINT: why geolocation is one of the most powerful skills an investigator can develop, and why planning and organization separate professionals from amateurs.</p><p>In Episode 13 of The OSINT Podcast, host Jake Creps breaks down geolocation OSINT from first principles, showing how digital clues, visual recognition, metadata, and mapping platforms converge to place data in physical space. Alongside that, Jake explores how structured planning, deduplication, and case management dramatically improve investigative efficiency.</p><p>The episode also covers OSINT news, emerging risks in AI driven search environments, investigative workflow design, and several practical tools investigators can deploy immediately.</p><p>Highlights include:</p><p><strong>&#127757; Geolocation OSINT: Half Art, Half Science</strong> &#8211; why placing digital evidence into geographic context is one of the most powerful investigative capabilities, and how visual and technical methods work together.</p><p><strong>&#128736; Tools in Focus</strong> &#8211; OSINT Entity Extractor for structured note creation, p3Wifi as a modern alternative to Wigle, ThunderBit for AI assisted scraping, and case management inside Obsidian.</p><p>Throughout the episode, the emphasis stays on fundamentals over hype, discipline over distraction, and workflow over chaos. Geolocation is triangulation. Organization is leverage. Planning is speed.</p><p>If you want to sharpen your GEOINT skills and build an investigative system that actually scales, Episode 13 is for you.</p><p><strong>References</strong></p><p><a href="https://osintnewsletter.com/p/95">OSINT Newsletter &#8211; Issue 95</a><br><a href="https://osintnewsletter.com/p/96">OSINT Newsletter &#8211; Issue 96</a></p>]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #96]]></title><description><![CDATA[Organizing Information and Avoiding Duplication of Effort]]></description><link>https://osintnewsletter.com/p/96</link><guid isPermaLink="false">https://osintnewsletter.com/p/96</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 26 Feb 2026 14:02:52 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/275f5ed9-5ebb-41c5-8f20-c7d656e1b54b_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 96th issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. My goal with this newsletter is to help promote the OSINT industry, develop better investigators, and raise awareness of ethical use cases for open source intelligence.</p><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>Geolocation, Geolocation, Geolocation: OSINT and Location Analysis</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;8df09fd8-709c-4b98-bfe5-95900fd6bead&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 95th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #95&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-19T14:00:33.579Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2fc7f7c-7247-485e-b5d7-baf1dfe5a6bc_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/95&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188431287,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:18,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><h1>OSINT News</h1><p>&#128240;  <strong>The State of Online Search: How to Find What You&#8217;re Looking For in the Age of AI</strong></p><p>Craig talks about changes to the YouTube search functionality, among other things, and how the emergence of AI-first feature functionality will change how we find content online, making many old methods obsolete.</p><p><a href="https://www.digitaldigging.org/p/the-state-of-online-search-how-to">Read on Digital Digging&#8230;</a></p><p>&#127913; H/T: Craig Silverman</p><p>&#128240; <strong>Identifying &#8216;Less-Lethal&#8217; Weapons Used By DHS Agents in US Immigration Raids and Protests</strong></p><p>Visual recognition is a cornerstone skill set for any intelligence professional. The ability to quickly analyze an image and draw upon your experience to quickly identify an object, person, or location is the difference between a novice and a legend. Trevor gives you a crash course on identifying &#8220;less-lethal&#8221; weapons.</p><p>&#127913; H/T: Trevor Ball</p><p><a href="https://www.bellingcat.com/resources/2026/01/27/less-lethal-weapons-guide/">Read on Bellingcat&#8230;</a></p><p>&#128240; <strong>The #1 Downloaded Skill on OpenClaw was Malware!</strong></p><p>OpenClaw is still making its rounds online and it&#8217;s worth mentioning again. What we&#8217;re witnessing might be the &#8220;MySpace&#8221; of LLMs, opening the door for more sophisticated versions later. Much like early social media, it&#8217;s filled with scams, like concealing malware inside the OpenClaw skill marketplace. </p><p>&#127913; H/T: chiefofautism</p><p><a href="https://x.com/chiefofautism/status/2024483631067021348?s=20">Read on X&#8230;</a></p><div><hr></div><h1>OSINT Tools</h1><p>&#128270; <strong>OSINT Entity Extractor</strong></p><p>OSINT Entity Extractor is a Obsidian plugin that allows you to leverage your OpenAI API key to extract insights from content found online with ease, creating a nice visualization of key data points.</p><p><a href="https://github.com/thomasjjj/Obsidian-OSINT-Entity-Extractor">GitHub</a></p><p>&#127913; H/T:  thomasjjj </p><p>&#128270; <strong>p3Wifi</strong></p><p>If you&#8217;ve ever used <a href="https://wigle.net/">Wigle</a> but feel like it&#8217;s too much of a blast from the past, check out p3Wifi. Similar, but modern.</p><p><a href="https://3wifi.dev/">Web App</a></p><p>&#128270; <strong>ThunderBit</strong></p><p>If Instant Data Scraper is coming up short for you, consider ThunderBit. It&#8217;s like ChatGPT and Instant Data Scraper in a tag team match up, but it&#8217;s in your web browser as a Chrome Extension.</p><p><a href="https://thunderbit.com/">Browser Extension</a></p><p>&#11088; <strong>Sponsor: SockPuppet.io</strong></p><p>SockPuppet delivers secure, isolated environments with persistent virtual desktops and phones, real carrier-based SMS for OTPs, and residential IP connectivity&#8212;selectable from hundreds of locations. All accessible through a simple web interface that scales as your investigations grow.</p><p>Visit <a href="https://hubs.la/Q03DbZN00">SockPuppet.io</a> to empower your investigations with technology trusted by intelligence professionals.</p><div><hr></div><p>&#127937; <strong>New CTF Challenge Live - The Unknown Bridge</strong></p><p>A new CTF challenge has been posted on our CTF website. This week&#8217;s CTF challenge focuses on identifying the full name of a bridge seen in the background of a flying U.S. Navy UAV.</p><p><a href="https://ctf.osintnewsletter.com/challenges#The%20Unknown%20Bridge-17">Start competing in our Capture the Flag (CTF)</a></p><p>&#129667; If you missed the last CTF, <a href="https://ctf.osintnewsletter.com/challenges#Locating Epstein-16">here&#8217;s a link to catch up</a>. </p><p>Last week&#8217;s CTF challenge featured an image reverse lookup OSINT task titled &#8220;Locating Epstein&#8221;.</p><p>By closely examining the wall behind the subject, we could take a screenshot of the window area and run it through <a href="https://picdetective.com/">PicDetective</a> which then pointed us to the Great Wall of China.</p><p>Additional visual clues were also present, such as Chinese writing visible on the wall, which also indicated that the location was in China.</p><p>The task tested participants OSINT skills, particularly their ability to perform image reverse lookups, analyze subtle visual clues, and leverage the appropriate tools to identify the location accurately.</p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p>&#9889; <strong>Organizing Information and Avoiding Duplication of Effort</strong></p><ul><li><p>When doing an investigation, you can very easily retrace your steps accidentally and waste a lot of time. In this issue, I will step through my method for collecting and organizing information and improving efficiency.</p><ul><li><p><em>This issue includes a free browser extension for improving investigative efficiency as well as a free Obsidian plugin for basic case management.</em></p></li></ul></li></ul><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry there&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p>
      <p>
          <a href="https://osintnewsletter.com/p/96">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #95]]></title><description><![CDATA[Geolocation, Geolocation, Geolocation: OSINT and Location Analysis]]></description><link>https://osintnewsletter.com/p/95</link><guid isPermaLink="false">https://osintnewsletter.com/p/95</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 19 Feb 2026 14:00:33 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f2fc7f7c-7247-485e-b5d7-baf1dfe5a6bc_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 95th issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. </p><div><hr></div><p>&#127937; New CTF Challenge Live - Locating Epstein</p><p>A new CTF challenge has been posted on our CTF website. This week&#8217;s CTF challenge focuses on identifying the exact name of the location where a photograph of Jeffrey Epstein and Ghislaine Maxwell was taken.</p><p><a href="https://ctf.osintnewsletter.com/">Start competing in our Capture the Flag (CTF)</a></p><p>&#129667; If you missed the last CTF, here&#8217;s a <a href="https://ctf.osintnewsletter.com/challenges#The%20Phisher%20-%20Part%201-13">link to catch up</a>.</p><p>Last week&#8217;s CTF challenge featured a domain OSINT task titled &#8220;The Phisher&#8221; (2 Parts). For Part One, the objective was to investigate the suspicious domain <code>rnicrosoft</code>, a clear typosquatting attempt designed to mimic Microsoft's domain name. The challenge required performing a WHOIS lookup on the domain to gather publicly available registration details.</p><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>How I Went From Intelligence Analyst to Product Manager</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;57a0f01b-b173-477c-bd16-613ae31247ab&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 94th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. My goal with this newsletter is to help promote the OSINT industry, develop better investigators, and raise awareness of ethical use cases for open source intelligence.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #94&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-12T13:35:27.508Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d4d10795-c2f2-4594-8c37-f8b5be34f473_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/94&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:182551031,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:25,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>&#127897;&#65039; <strong>If you prefer to listen, here&#8217;s a link to the podcast instead.</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c0a3261f-6e43-4ae2-8346-f77d88fe8544&quot;,&quot;caption&quot;:&quot;Every website has an owner. Every owner leaves traces. And every trace is an opportunity.&quot;,&quot;cta&quot;:&quot;Listen now&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Episode 12 - Domain OSINT, Building Methods, and Turning Intelligence Into Products&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-02-13T16:02:48.383Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3cf5c763-a23a-4ae7-bf3d-c114876efe35_1500x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/episode-12-domain-osint-building&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:187376823,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:15,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><p>Sometimes with OSINT, it&#8217;s all about location. The ability to discover <em>where</em> an image was taken, a video was shot, or a newsworthy incident took place can make the world of difference to an investigation. From verifying frontline war-zone footage, to detecting digitally-altered imagery, there are probably more uses for geolocation OSINT than there are countries in the world <a href="https://www.sciencefocus.com/planet-earth/how-many-countries-are-there">(about 195, fyi).</a></p><p>However - part art and part science, working out where things are with OSINT takes a very particular set of skills. This issue will teach you:</p><ul><li><p>The basics of GEOINT</p></li><li><p>The best geolocation tools online</p></li><li><p>Manual methods (including visual recognition)</p></li><li><p>&#8230;and how to place any piece of data in geographical context.</p></li></ul><p>It&#8217;s time to take a tour round the world of geolocation OSINT. Let&#8217;s set off.</p><h2>What is GEOINT?</h2><p>In beginners&#8217; terms, geolocation OSINT (also known as<a href="https://www.satcen.europa.eu/what-we-do/geospatial_intelligence"> GEOINT</a> or geospatial intelligence) is discovering locations with analysis; usually to place a particular piece of data in a geographical context. This involves a mix of satellite imagery, mapping, and environmental or visual context clues - which all work together to give analysts an idea of where in the world things are.</p><p>GEOINT is used worldwide by the most advanced intelligence capabilities, like <a href="https://www.defence.gov.au/defence-activities/products-services/geospatial-intelligence-services">government departments</a> and <a href="https://www.defence-solutions.airbus.com/en/solutions/intelligence/imint-and-geoint-centres">global defence firms.</a> But even if you&#8217;re not wading into world conflicts, you&#8217;re still crossing borders - between the digital world, and the physical one. This area of OSINT is all about putting digital data in a physical context.</p><h2>The Two Hemispheres: Geolocation Methods</h2><p>Geolocation OSINT mixes up two types of methods to make actionable discoveries. To pin down where something really happened, these are the two different areas of work you&#8217;ll need to explore: the digital, and the visual.</p><h3>1. Visual Analysis</h3><p>Visual analysis is the most popular, and most extensive, geolocation discipline. Images - including moving images aka video footage - are stuffed full of clues to work with. </p><p>Even minor details - like curb paint or utility pole design - can narrow a search from continent to city. Pro investigators will usually combine visual work with AI-assisted pattern analysis, to&#8230; Actually, we&#8217;ll go much deeper into image analysis later, so put a pin in this part for now. </p><h3>2. Digital Analysis </h3><p>Meanwhile, some work sits in the digital world; particularly processing metadata and IP searching. While<a href="https://www.iplocation.net"> IP geolocation</a> is weak, it can occasionally reveal the target&#8217;s country or region - giving you a clear place to start. More importantly, images and documents often carry metadata with geographic indicators.</p><p>Of course, metadata won&#8217;t always be there; it&#8217;s often stripped by social media platforms to protect people&#8217;s privacy, or intentionally removed by the creator to obscure a file&#8217;s origin. But it&#8217;s always worth exploring. </p><h2>The Explorer&#8217;s Toolkit: Geolocation Tools</h2><p>Now, the tools of the GEOINT explorer&#8217;s trade. Put away your paper maps; from satellite platforms to reverse image search engines, this tech toolkit will shrink your search area fast. And the less jungle you have to beat through, the better your geolocation efforts will go.</p><h3>Mapping and Satellite Platforms</h3><ul><li><p><strong>Google Earth: </strong>Still the bedrock of geolocation work. Google Earth will give you a fast visual impression of terrain types, distances and landscapes. </p></li><li><p><strong>Google Maps: </strong>Google Maps&#8217; integrations with other features (like business pages and<a href="https://www.osint.industries/post/google-osint-using-google-profiles-in-osint-investigations"> reviews attached to public Google profiles</a>), are priceless for pinpointing a target&#8217;s movements, or verifying business addresses. </p></li><li><p><strong>Google Street View: </strong>Valuable for ground-level verification. Plus, the stored historical imagery allows you to confirm when structures were built or changed.</p></li><li><p><strong>Yandex Maps: </strong>Particularly valuable for Eastern Europe and parts of Central Asia. Includes a Street View feature, and covers areas that Google won&#8217;t. </p></li><li><p><strong>Bing Maps: </strong>Often provides alternative Street View coverage where Google has gaps. Like search engines, it takes multiple mapping platforms to get a full geolocation picture; not every one indexes everywhere. </p></li></ul><h3>Reverse Image Search </h3><ul><li><p><strong>Traditional Reverse Image Search (eg. <a href="https://lens.google">Google Lens</a>, <a href="https://tineye.com">TinEye</a>, <a href="https://yandex.com/images">Yandex</a>): </strong>Reverse image search works by matching your searched image with similar shapes, colours, and distances in its library of indexed images. While traditional reverse image search can surface earlier uploads, higher-resolution versions, or media tied to specific locations, it won&#8217;t be able to tell you anything about an image that hasn&#8217;t appeared elsewhere. </p></li></ul><ul><li><p><strong>AI-Assisted Geolocation (eg. <a href="https://geospy.ai">GeoSpy</a>, <a href="http://picarta.ai">picarta.ai</a></strong>, <strong><a href="https://earthkit.app">EarthKit</a></strong>): AI geoguessers take reverse image search to the next level. By matching landmarks, terrain, skylines and languages on visible text, they attempt to recreate the geographic metadata behind an image. Yet like all AI, they will still <a href="https://www.ibm.com/think/topics/ai-hallucinations">hallucinate</a>: even advanced systems can&#8217;t tell the difference between the coastline of Puerto Rico and Barbados, for example. </p></li></ul><h3>Metadata Viewers</h3><p>Both documents and images carry metadata, but image metadata is far more useful for geolocation. There will often be GPS coordinates in <a href="https://www.ionos.co.uk/digitalguide/websites/web-design/what-is-exif-data/">EXIF metadata</a>, plus device model and timestamp data. Even the altitude the photographer was at, and the direction they were facing, will be visible with a quick metadata extraction. Even a simple online service like <a href="https://exif.tools/">exif.tools</a> can do the job. </p><h3>Specialist Tools</h3><p>Niche tasks will require unexpected tools: <a href="https://www.suncalc.org/#/27.6936,-97.5195,3/2026.02.18/15:51/1/3">sun position calculators</a>, for example, can help you with shadow analysis - a useful way to ascertain the time of day and location a picture was taken. Many curated lists - or <a href="https://github.com/The-Osint-Toolbox/Geolocation-OSINT">OSINT toolboxes</a> - are full of similar <a href="https://knowyourmeme.com/memes/its-a-surprise-tool-that-will-help-us-later">surprise tools that could help you later. </a></p><h2>Spot the Details: Manual Methods &amp; Visual Recognition</h2><p>Put away your (Google) maps - and let&#8217;s turn back to visual analysis. Elite geolocation analysts rely on pattern recognition developed through practice; years and years of honing their ability to spot the most obscure useful details in an image. Of course, you don&#8217;t have years and years&#8230; so just go through this checklist.</p><ol><li><p><strong>Architectural Analysis: </strong>Buildings are different everywhere in the world. Look at roof shapes (flat vs pitched), window and balcony styles, and construction materials to get an idea of location. Concrete panel blocks could suggest a post-Soviet state, for example. </p></li><li><p><strong>Road &amp; Transport Indicators: </strong>Road infrastructure is also regionalised. Check lane markings, which side of the road they drive on, sign typography and bollard shapes. Even traffic light orientation can be country-specific - and has <a href="https://www.youtube.com/shorts/hp6KxhVPzS0">helped crack cases</a>. </p></li><li><p><strong>Language &amp; Typography:</strong> If they&#8217;re speaking Chinese, it&#8217;s probably in China. You can even narrow the location down even further just by analysing any text you can see; alphabet systems (Latin, Cyrillic, Arabic, Mandarin, Cantonese etc.), dialect variations, domain suffixes on signage, and phone number suffixes can tell you where an image is specifically from.</p></li><li><p><strong>Vegetation &amp; Ecology: </strong>Trees, plants and flowers will reveal which climate zone the target is in. For example, palm species suggest either tropical or subtropical regions. Even the grass colour can tell you rainfall levels; dry, dusty greenery is more likely to suggest Arizona than South Dakota. Check agricultural crops too - if the fields are full of corn&#8230; more likely Midwest. </p></li><li><p><strong>Shadow &amp; Sun Analysis: </strong>Determining shadow directions sounds like black magic. But analysing shady spots can show you the hemispheric orientation of your image. Measure shadow length, height, and angles, then compare them against timestamps to validate or debunk the claimed capture dates. </p></li><li><p><strong>Terrain &amp; Topography: </strong>Lastly, landforms and terrain textures can tell you macro-location information. Mountain silhouettes, coastal curvature, and even the specific hue of the soil can help close in on a specific part of the world. Matching sections against satellite imagery is a common closing technique. </p></li></ol><h2>Example: Geolocation OSINT in Action</h2><p>A beautiful young traveller is abducted during a European trip. During her final, brief phone call she manages to whisper: <em>&#8220;White walls&#8230; red curtains&#8230; balcony outside.&#8221;</em> The call cuts. </p><p>You are her father: a middle-aged GEOINT practitioner with a very particular set of skills. Time to use them to discover where she was taken. </p><h3>Step One: Review Available Footage</h3><p>You begin by checking her socials, where you find a video she posted earlier that day. In the background you see a street view from her apartment balcony. Visible details include cream-coloured Haussmann-style buildings. This indicates your daughter was in Paris. </p><h3>&#8203;&#8203;Step Two: Reverse Image Search</h3><p>Zooming in on the footage frame-by-frame, you see that one of the Hausmann-style buildings is a cafe. By using reverse image search on the cafe&#8217;s distinctive red awnings - and cross-referencing Paris business listings - you identify several candidate streets.</p><h3>Step Three: Street View</h3><p>You take your search on to Google Street View. &#8220;Walking&#8221; around your candidate streets, you &#8220;look&#8221; in the windows opposite each cafe to see if you can spot the key details: <em>white walls, red curtains, balcony outside</em>. You eliminate candidates until one street aligns perfectly.</p><h3>Step Four: Get Technical</h3><p>Returning to the original video, you extract the metadata from the video file. GPS coordinates are absent, but timestamp and device data remain. It was posted with an iPhone, in Paris&#8230; cross-referencing upload time with her known movements and daylight conditions confirms the exact location. Time to go get the bad guys. </p><h2>Key Takeaways</h2><p>After that whistle-stop tour round the world of geolocation OSINT, you should know: </p><ul><li><p><strong>It&#8217;s half art, half science.</strong> Geolocation OSINT is both visual and technical</p></li><li><p><strong>Don&#8217;t forget your tools -  </strong>Even the unexpected ones </p></li><li><p><strong>Cross-reference everything. </strong>Geolocation is triangulation. Where points converge - that&#8217;s your spot. </p></li></ul><p>See you next week, investigators!</p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry. There&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p>]]></content:encoded></item><item><title><![CDATA[Episode 12 - Domain OSINT, Building Methods, and Turning Intelligence Into Products]]></title><description><![CDATA[Listen now | Tools, tactics, and fresh investigations expanding the open-source intelligence toolkit.]]></description><link>https://osintnewsletter.com/p/episode-12-domain-osint-building</link><guid isPermaLink="false">https://osintnewsletter.com/p/episode-12-domain-osint-building</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Fri, 13 Feb 2026 16:02:48 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/187376823/51812606b1534d5387ae4c6a8bd3fd0e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Every website has an owner. Every owner leaves traces. And every trace is an opportunity.</p><p>This episode covers Issues 93 and 94 of <em>The OSINT Newsletter</em> and focuses on two core realities of modern OSINT: why domains remain one of the most powerful investigative entry points, and how real investigators evolve their methods, tools, and careers over time.</p><p>In Episode 12 of the OSINT Podcast, host Jake Creps breaks down Domain OSINT from first principles, showing how a single URL can unravel ownership, infrastructure, intent, and connected activity. Alongside that, Jake reflects on how OSINT methods are discovered, why most of them decay, and how his own path from intelligence analyst to product manager reshaped how he thinks about collection, analysis, and tooling.</p><p>The episode also covers OSINT news, emerging risks in large-scale surveillance systems, agentic AI, and several practical tools that investigators are using right now.</p><p><strong>Highlights include:</strong></p><p>&#127760; <strong>Domain OSINT: It&#8217;s Free Real Estate</strong> &#8211; why domains are one of the most overlooked investigative assets, what they can reveal about ownership, infrastructure, behaviour, and intent, and how to move from a single address to an entire network.</p><p>&#129521; <strong>Beginner Tools for Domain OSINT</strong> &#8211; practical walkthroughs of WHOIS, DNS enumeration, reverse IP search, historical site analysis, and email infrastructure checks, all using free or freemium tools.</p><p>&#128257; <strong>Turning Patterns Into Pivots</strong> &#8211; how hosting reuse, domain age, registrar choice, and site history expose relationships that privacy protection can&#8217;t hide.</p><p>&#129514; <strong>A Domain OSINT Case Study</strong> &#8211; following a suspicious &#8220;global services&#8221; website from registration details to hosting behaviour and archived versions, and showing how fast red flags accumulate when you know where to look.</p><p>&#129504; <strong>How New OSINT Methods Are Discovered</strong> &#8211; an inside look at how investigators actively and passively find new techniques, why most methods have a short shelf life, and why sharing sources and methods matters more than hoarding tools.</p><p>&#129489;&#8205;&#128187; <strong>From Analyst to Product Manager</strong> &#8211; Jake&#8217;s personal journey from intelligence analysis into tech, the concept of &#8220;Customer Zero,&#8221; and why analysts often make the best product leaders in OSINT-adjacent companies.</p><p>&#128736; <strong>Building Tools vs Doing Analysis</strong> &#8211; the tension between creating collection tooling and maintaining analytical rigor, and why many investigators naturally drift toward engineering without realizing it.</p><p>&#128373;&#65039; <strong>OSINT News and Emerging Risks</strong> &#8211; coverage of OSINT resources for Qatar, crowdsourced surveillance systems and privacy failures, and the growing reality of investigating humans operating behind LLM-driven content.</p><p>&#128270; <strong>New and Noteworthy Tools</strong> &#8211; including Dorkwright for homegrown SERP scraping, Pic Detective as a reverse image search complement, and Think-Pol for Reddit investigation in a hostile API environment.</p><p>Throughout the episode, the emphasis stays on fundamentals over hype, behaviour over branding, and understanding systems rather than blindly trusting tools.</p><p>If you want to get better at tracing ownership, uncovering infrastructure, and building an OSINT skillset that survives tool churn and career pivots, Episode 12 is for you.</p><p><strong>References</strong></p><p><a href="https://osintnewsletter.com/p/93">OSINT Newsletter &#8211; Issue 93</a><br><a href="https://osintnewsletter.com/p/94">OSINT Newsletter &#8211; Issue 94</a></p><p><a href="https://github.com/san-tus/dorkwright/">Dorkwright</a> | <a href="https://picdetective.com/">Pic Detective</a> | <a href="https://think-pol.com/">Think-Pol</a></p><p><a href="https://unishka.substack.com/p/osint-of-qatar?r=25udk4&amp;utm_medium=ios&amp;shareImageVariant=overlay&amp;triedRedirect=true">OSINT of Qatar</a> | <a href="https://x.com/Harrris0n/status/2014197314571952167?s=20">Waze Crowdsourced Surveillance</a> | <a href="https://garymarcus.substack.com/p/openclaw-aka-moltbot-is-everywhere">OpenClaw (Moltbot)</a></p>]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #94]]></title><description><![CDATA[How I Went From Intelligence Analyst to Product Manager]]></description><link>https://osintnewsletter.com/p/94</link><guid isPermaLink="false">https://osintnewsletter.com/p/94</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 12 Feb 2026 13:35:27 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d4d10795-c2f2-4594-8c37-f8b5be34f473_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 94th issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. My goal with this newsletter is to help promote the OSINT industry, develop better investigators, and raise awareness of ethical use cases for open source intelligence.</p><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>Domain OSINT: It&#8217;s Free Real Estate</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1ad9fb0b-0e33-459b-9a09-f3b2d8e34224&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 93rd issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #93&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2026-02-05T14:03:43.837Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b7dec5e-35dd-4d86-b675-8d27fe8fca90_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/93&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:186777296,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:12,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><h1>OSINT News</h1><p>&#128240;  <strong>OSINT of Qatar</strong></p><p>If you find yourself needing to investigate individuals or entities in Qatar, make sure to bookmark this page. It&#8217;s rich in resources to aid in your investigations. It includes person search, company search, court records, and more.</p><p><a href="https://open.substack.com/pub/unishka/p/osint-of-qatar?r=25udk4&amp;utm_medium=ios&amp;shareImageVariant=overlay">Read on Unishka&#8217;s Substack&#8230;</a></p><p>&#127913; H/T: <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;UNISHKA Research Service&quot;,&quot;id&quot;:340265325,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb7c83f5-3be1-4ac5-90b1-e17d5252d97a_404x404.png&quot;,&quot;uuid&quot;:&quot;3edb2021-4110-4c68-9b0d-c3fa6ff15c8d&quot;}" data-component-name="MentionToDOM"></span> </p><p>&#128240; <strong>How Waze Quietly Built the World&#8217;s Largest Crowdsourced Surveillance System (and then fixed it)</strong></p><p>Some OSINT methods are useful if used at a small scale. Other methods are so problematic they pose data privacy issues too large to ignore. This is an example of the latter. Fortunately for Waze, they corrected the problem promptly, prioritizing user privacy over functionality.</p><p><a href="https://x.com/Harrris0n/status/2014197314571952167?s=20">Read on X&#8230;</a></p><p>&#127913; H/T: <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Harry Johnston&quot;,&quot;id&quot;:211459116,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2abc3c4a-f8c6-4601-98a4-2e8429171e30_762x762.png&quot;,&quot;uuid&quot;:&quot;3fae40b4-825e-42f5-ae6b-d3aeda97f48c&quot;}" data-component-name="MentionToDOM"></span> </p><p>&#128240; <strong>OpenClaw (a.k.a. Moltbot) is everywhere all at once, and a disaster waiting to happen</strong></p><p>If you haven&#8217;t been following the <a href="https://openclaw.ai/">OpenClaw</a> story, start here. Agentic AI went from an abstract concept to holy shit what is going on right now pretty quickly. The first thought that came to my mind was an episode of Black Mirror called <a href="https://en.wikipedia.org/wiki/Plaything_(Black_Mirror)">Plaything</a>. Read about OpenClaw first, then watch the episode on Netflix.</p><p><strong>Why is this relevant to OSINT?</strong> Prepare for the lion share of content to be generated by LLMs, orchestrated by humans. We&#8217;ll soon have to investigate the humans behind the LLMs.</p><p><a href="https://garymarcus.substack.com/p/openclaw-aka-moltbot-is-everywhere">Read on Marcus on AI&#8230;</a></p><p>&#127913; H/T: <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Gary Marcus&quot;,&quot;id&quot;:14807526,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Ka51!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb2e48c-be2a-4db7-b68c-90300f00fd1e_1668x1456.jpeg&quot;,&quot;uuid&quot;:&quot;ebe5ef28-f4e3-4c82-a1fb-b34d4662d1c7&quot;}" data-component-name="MentionToDOM"></span> </p><div><hr></div><h1>OSINT Tools</h1><p>&#128270; <strong>Dorkwright</strong></p><p>If you&#8217;re reading this and have followed me for a while, you know I&#8217;m a huge fan of SERP APIs. They&#8217;re expensive, though. Dorkright gives you the ability to make a homegrown SERP, saving you a ton of money if you can sustain it.</p><p><a href="https://github.com/san-tus/dorkwright/">GitHub</a></p><p>&#127913; H/T:  San-Tus </p><p>&#128270; <strong>Pic Detective</strong></p><p>When you have an image, you can reverse image search, right? You can use Google, Yandex, and other search engines. You can use LLMs like ChatGPT or Grok. You can also use PimEyes or FaceCheck. You should also use Pic Detective, even if it&#8217;s not a one-stop shop.</p><p><a href="https://picdetective.com/">Web App</a></p><p>&#128270; <strong>Think-Pol</strong></p><p>Reddit has been cracking down on their API usage. I mentioned R00M101 in a previous issue of the newsletter. It looks like it grew up to become Think-Pol. There are still lifetime licenses left; however, proceed with caution. Reddit continues their assault on third party applications.</p><p><a href="https://think-pol.com/">Web App</a></p><div><hr></div><p>&#127937; <strong>New CTF Challenges Live &#8211; The Phisher (2 Parts)</strong></p><p>A new CTF challenge has been posted on our CTF website. This week&#8217;s CTF is about a suspicious domain using typosquatting for phishing attacks.</p><p>Can you identify the person behind this domain?</p><p><a href="https://ctf.osintnewsletter.com/challenges?#The%20Phisher%20-%20Part%201-13">Start competing in our Capture the Flag (CTF)!</a></p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p>&#9889; <strong>How I Went From Intelligence Analyst to Product Manager</strong></p><ul><li><p>Another top question I get from my readers. I started off an intelligence analyst, I ended up a product manager. What&#8217;s that all about? Let me explain.</p></li></ul><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry there&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p><div><hr></div>
      <p>
          <a href="https://osintnewsletter.com/p/94">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #93]]></title><description><![CDATA[Domain OSINT: It&#8217;s Free Real Estate]]></description><link>https://osintnewsletter.com/p/93</link><guid isPermaLink="false">https://osintnewsletter.com/p/93</guid><pubDate>Thu, 05 Feb 2026 14:03:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4b7dec5e-35dd-4d86-b675-8d27fe8fca90_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 93rd issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:</p><ul><li><p>Introduction to Domain OSINT</p></li><li><p>Beginner tools for Domain OSINT</p></li><li><p>Case study in Domain OSINT</p></li></ul><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>How I Discover New OSINT Methods</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e581013f-4a85-4d00-9726-d6af27ee702d&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 92nd issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s a summary of what&#8217;s in this issue:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #92&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-29T14:02:39.218Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e16f1ad4-0d9d-432d-8cb4-f067ed321e33_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/92&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:182550991,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:18,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>&#127897;&#65039; <strong>If you prefer to listen, here&#8217;s a link to the podcast instead.</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6464e1b6-8d44-4260-ad95-a3152d148161&quot;,&quot;caption&quot;:&quot;AI is no longer optional in OSINT, but using it badly is worse than not using it at all.&quot;,&quot;cta&quot;:&quot;Listen now&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Episode 11 - OSINT With AI, New Methods, and the Tools Shaping Modern Investigations&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-30T17:02:26.190Z&quot;,&quot;cover_image&quot;:&quot;https://substack-video.s3.amazonaws.com/video_upload/post/185522110/911740fa-fca9-4752-8955-cdcd69250316/transcoded-1769724856.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/episode-11-osint-with-ai-new-methods&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:185522110,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:13,&quot;comment_count&quot;:1,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><p>Domains are the real estate of the internet. From the swishest company site, to the jankiest homepage, to the most self-indulgent blog, every website on the net is like a piece of land - and every piece of land has an owner. The &#8220;address&#8221; to this land is the domain name. So if you investigate that domain right, it could lead you straight to the landlord&#8217;s door.</p><p>In this issue, we&#8217;re exploring domain OSINT; one of the most useful (and most misunderstood) starting points for investigation. We&#8217;ll cover:</p><ul><li><p>What domains can actually tell you</p></li><li><p>Beginner tools for domain OSINT</p></li><li><p>How to pivot from domains to other intel</p></li><li><p>A practical example of domain OSINT in action</p></li></ul><p>By the end, you&#8217;ll know how to go from one innocent-looking URL to a whole new world of intelligence. It&#8217;s free real estate.</p><h2>What is Domain OSINT?</h2><p>Domain OSINT is pretty self explanatory; it&#8217;s the act of investigating <strong>a domain name and the infrastructure around it.</strong> It&#8217;s easy to assume that it&#8217;s just about &#8220;who owns this website?&#8221; - of course, that&#8217;s super important information to learn (and has <a href="https://www.bbc.co.uk/news/world-us-canada-68176391%5C">cracked some very high-profile cases</a>). But the intelligence value of the average address is much more than a less OSINT-savvy realtor would tell you. A domain connects to:</p><ul><li><p>Registrant information</p></li><li><p>Hosting providers and IP ranges</p></li><li><p>Subdomains and services</p></li><li><p>Email infrastructure</p></li><li><p>Historical versions of websites</p></li><li><p>Other domains owned by the same entity</p></li></ul><h2>What can I actually learn from a domain?</h2><p>Pretty much anything. Each of the above points of data you can get from a domain also have a corresponding intelligence use. After all, in super pretentious terms, a domain is a <a href="https://www.tandfonline.com/doi/full/10.1080/17493460600610764">behavioural artifact</a>: someone registered it, configured it, hosted it, maintained it, and used it for a purpose. Every one of those decisions leaks information, like layers of old wallpaper that tell you your house&#8217;s walls used to be puke-green. You can uncover:</p><ul><li><p><strong>Ownership:</strong> When the owner of the site got the domain, they likely had to provide the hosting provider with some identifying data: an email address, a real name, or the name of an organisation they&#8217;re connected to. You can get this data.</p></li><li><p><strong>Connected Sites: </strong>Any subsidiaries, backups, or even scammy clones of the target domain. They could also be hosting the page within another site, or own other sites under the same personal ID - which shows up a clear link to other activity.</p></li><li><p><strong>Email Activity: </strong>Some domains allow email hosting. A hosted email address has obvious pivot potential; you can look at MX records, plus <a href="https://osintnewsletter.com/p/86">all the other stuff we covered in our previous email issue.</a></p></li><li><p><strong>Hosting Behaviour:</strong> Are they using a cheap hosting provider? Or maybe it&#8217;s <a href="https://www.sentinelone.com/cybersecurity-101/threat-intelligence/bulletproof-hosting/">bulletproof hosting</a>, or even sophisticated enterprise infrastructure? The type of hosting your target domain uses can indicate the purpose (and dodginess) of the site.</p><ul><li><p>Also consider <strong>operational maturity:</strong> a fancy term for &#8216;how long it&#8217;s been there.&#8217; A newly-created site might be used like a burner phone, whilst a long-established asset domain might suggest legitimacy.</p></li></ul></li><li><p><strong>Geographic Location: </strong>You can use the address to find out where the domain is hosted; just look at the <a href="https://www.ionos.co.uk/digitalguide/domains/domain-extensions/cctlds-a-list-of-every-country-domain/">country code</a> at the end. Also, the language used will tell you who wrote it, and who the intended audience is.</p></li></ul><p>Of course, it&#8217;ll still take some classic investigator&#8217;s instinct to turn this information into insights. But even the most elusive info - intent, for example - is discoverable once you&#8217;ve got this know-how. Say you find a domain built yesterday, hosted on <a href="https://www.ibm.com/think/topics/vps">a bargain VPS</a>, with no history and several clones&#8230; It&#8217;s easy to see how that could become evidence.</p><h2>Beginner Tools for Domain OSINT</h2><p>Now we know what domain OSINT can do, we can get into the tooling. You don&#8217;t need anything elite or expensive; our basic toolkit is all free (or freemium), fast and extremely effective.</p><p>&#127760;<strong> <a href="https://who.is">WHOIS Lookup</a></strong></p><p>WHOIS lookup is synonymous with domain OSINT. WHOIS search is a handy protocol that lets you search databases for information about registered users of domain names and IP addresses. That includes their contact details, the date they got the address, and more. You can also look into historical WHOIS data; ownership changes over time are often more interesting than current data.</p><p>&#129521;<strong> DNS Tools</strong></p><p>Tools like <a href="https://dnsdumpster.com">DNS Dumpster </a>and <a href="https://securitytrails.com">SecurityTrails</a> go through DNS records and associated infrastructure. Give them a hostname, and they&#8217;ll reveal subdomains, DNS changes, name servers, and any other associated digital assets the domain owner forgot to take down. In addition, you can also get statistics, like how many other hostnames have the same IP.</p><p>&#128257;<strong> <a href="https://viewdns.info">Reverse IP Search</a></strong></p><p>Reverse IP search can show you what else is hosted on the same server as your target domain. Often, people will reuse cheap hosting servers; it&#8217;s common in networks of scammers, for example. Infrastructure reuse will betray any hidden relationships.</p><p><strong>&#128220; <a href="https://web.archive.org">The Wayback Machine</a></strong></p><p>Want to know what a site used to look like? Check it out on the Wayback Machine. The Internet Archive stores captures of sites from the past, so you can see previous versions. You might find old branding, evidence of previous owners, or deleted content. Sudden pivots (e.g. from &#8220;crypto project&#8221; to &#8220;consultancy&#8221;) are classic red flags.</p><p>&#128231;<strong> Email Infrastructure Checks</strong></p><p>MX records show how the site handles email. Usually, they&#8217;re used to check if an email address is fake without sending a humiliating (or dangerous) bounceback message. However, they can do even more for domain OSINT, too. Find out which email provider they use, and whether the email works at all. A &#8220;professional&#8221; company with no proper email setup is&#8230; suspicious.</p><h2>Example: Domain OSINT in Action</h2><p>Let&#8217;s test our skills on an example. Imagine you&#8217;ve found a site from a company offering &#8220;international geomarketing services&#8221;. Their website is slick - full of stock photos of serious people in suits staring at maps. The domain address: <strong>red-ball-market-global.com.</strong></p><p>You&#8217;ve called their phone number, but you&#8217;re on hold. So while you&#8217;re waiting, you do a little domain OSINT.</p><h3>Step One: WHOIS Check</h3><p>You plug the address into a WHOIS search, hoping to find registration details. The domain itself was registered 11 days ago via a budget registrar, which does seem suspicious for a legitimate &#8220;global&#8221; firm. They&#8217;ve also enabled privacy protections, so no contact details.</p><h3>Step Two: DNS and Subdomains</h3><p>You run a DNS enumeration, and turn up some results for connected subdomains: mail.red-ball-market-global.com, and portal.red-ball-market-global.com. Mail does exist - and explains the email you received. Portal redirects you to a generic login page.</p><h3>Step Three: Reverse IP Search</h3><p>Reverse IP search shows four other domains on the same server as red-ball-market-global.com:</p><ul><li><p>tecca-corp.com</p></li><li><p>tamblays-for-menswear.com</p></li><li><p>amazing-crypto-opportunity.net</p></li><li><p>calicocutpants.com</p></li></ul><p>None of these are older than two months, and their relevance to &#8220;international geomarketing&#8221; is&#8230; weak. Clearly, the original red-ball site&#8217;s owner has a<em> diverse</em> business portfolio. Too diverse to trust.</p><h3>Step Four: Wayback Machine</h3><p>In the Internet Archive, you uncover a previous version of red-ball-market-global.com. A year ago, it was selling cheap office furniture under the &#8216;Red Ball&#8217; name; with Trustpilot reviews in the dirt. This confirms that you&#8217;re looking at the operator&#8217;s latest scam, not a legitimate global agency.</p><p>So, red-ball-market-global.com is one big, red, spherical flag. But at least <a href="https://www.youtube.com/watch?v=6GaJmD9mbcc">their hold music was catchy.</a></p><h2>Key Takeaways</h2><p>Hopefully, you&#8217;ve now got your first step on the OSINT property ladder. You should know:</p><ul><li><p><strong>Who owns the internet? </strong>Domain registrars, that&#8217;s who. Every site has an owner, and every owner has their details stored somewhere.</p></li><li><p><strong>Landlords</strong> <strong>exist:</strong> Some people have multiple sites. Connecting them is key.</p></li><li><p><strong>Patterns are pivots:</strong> Even if the contacts are privacy protected, you can still analyse the target&#8217;s behaviour around a domain.</p></li><li><p><strong>It&#8217;s free real estate:</strong> Domain tools are free, and good enough to get results.</p></li></ul><p>See you next issue, investigators!</p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry. There&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p>]]></content:encoded></item><item><title><![CDATA[Episode 11 - OSINT With AI, New Methods, and the Tools Shaping Modern Investigations]]></title><description><![CDATA[Tools, tactics, and fresh investigations expanding the open-source intelligence toolkit.]]></description><link>https://osintnewsletter.com/p/episode-11-osint-with-ai-new-methods</link><guid isPermaLink="false">https://osintnewsletter.com/p/episode-11-osint-with-ai-new-methods</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Fri, 30 Jan 2026 17:02:26 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/185522110/928ff0ee833fac533b549ba7171f51a3.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>AI is no longer optional in OSINT, but using it badly is worse than not using it at all.</p><p>This episode covers Issues 91 and 92 of <em>The OSINT Newsletter</em> and explores how investigators are actually using AI today, how new OSINT methods are discovered, and which tools are quietly changing how modern investigations get done.</p><p>In Episode 11 of the OSINT Podcast, host Jake Creps breaks down practical AI workflows, realistic prompting strategies, and the growing toolkit of AI-assisted OSINT tools. The conversation then shifts into how new OSINT methods emerge, why most of them expire, and what separates useful research from gimmicks.</p><p>Along the way, Jake also highlights current OSINT news, privacy risks in mobile data, and several standout tools for username investigation, massive file analysis, and understanding how large language models really work.</p><p>Highlights include:</p><p><strong>&#129302; OSINT With AI in Practice</strong> &#8211; what AI is actually good for in investigations, including summarisation, extraction, cross-referencing, translation, and pattern discovery, and why it works best as a junior analyst rather than a replacement investigator.</p><p><strong>&#129504; Prompting Like an Investigator</strong> &#8211; how to structure prompts using roles, tasks, rules, and output formats, why vague prompts cause hallucinations, and how to force accuracy by telling AI not to guess.</p><p><strong>&#128736; The AI OSINT Toolkit</strong> &#8211; a practical look at general-purpose LLMs, visualisation and mapping tools, archive and capture tools like Hunchly, and large-scale data processors for leaks and document dumps.</p><p><strong>&#128194; Feeding Massive Files to AI</strong> &#8211; how tools like AIWhisperer let you analyse huge documents while chunking data and reducing what gets exposed to cloud models.</p><p><strong>&#128269; Username OSINT With Image Extraction</strong> &#8211; a deep dive into tools like The Big Brother that combine username enumeration with image scraping and reverse image search.</p><p><strong>&#129513; Understanding LLM Inputs and Constraints</strong> &#8211; why tools like LeakHub are useful for seeing the hidden system rules that shape AI responses and how better understanding inputs leads to better outputs.</p><p><strong>&#128373;&#65039; OSINT News and Methods in the Wild</strong> &#8211; analysis of high-profile investigations, mobile ad-data privacy risks, and how researchers are sharing sources and methods without crossing ethical lines.</p><p><strong>&#129514; How New OSINT Methods Are Discovered</strong> &#8211; an inside look at how investigators actively and passively find new techniques, why most methods decay over time, and how real innovation usually comes from tool builders and field researchers.</p><p><strong>&#128248; Pioneering New Analysis</strong> &#8211; emerging areas like extracting fingerprints from images, analysing audio for attribution, and pushing beyond traditional collection-only workflows.</p><p>Throughout the episode, the focus stays on practical workflows over hype, clear instructions over magical thinking, and evolving skillsets over static tool lists.</p><p>If you want to work faster, waste less time on grunt work, and actually integrate AI into real OSINT investigations without embarrassing yourself, this episode is your starting point.</p><p><strong>References</strong></p><p><a href="https://osintnewsletter.com/p/91">OSINT Newsletter &#8211; Issue 91</a><br><a href="https://osintnewsletter.com/p/92">OSINT Newsletter &#8211; Issue 92</a></p><p><a href="https://github.com/voelspriet">AIWhisperer</a> | <a href="https://leakhub.ai/">LeakHub</a> | <a href="https://github.com/chadi0x/TheBigBrother">The Big Brother</a></p><p><a href="https://www.bellingcat.com/news/2026/01/13/analysing-footage-of-minneapolis-ice-shooting/">Analysing Footage of Minneapolis ICE Shooting</a> | <a href="https://onlinesafety.substack.com/p/your-phone-is-a-tracking-device-how-to-protect-yourself">Mobile Ad Data Privacy Risks</a></p><p>How to Discover New OSINT Methods | Pioneering New Analysis Techniques</p>]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #92]]></title><description><![CDATA[How I Discover New OSINT Methods]]></description><link>https://osintnewsletter.com/p/92</link><guid isPermaLink="false">https://osintnewsletter.com/p/92</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 29 Jan 2026 14:02:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e16f1ad4-0d9d-432d-8cb4-f067ed321e33_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 92nd issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s a summary of what&#8217;s in this issue:</p><ul><li><p>Sharing sources and methods for high profile investigations</p></li><li><p>Privacy risks in mobile ad data</p></li><li><p>Automating large file analysis with AIWhisperer</p></li><li><p>A user friendly, beginner friendly OSINT tool directory</p></li><li><p>Behind the curtain on LLM inputs</p></li><li><p>Username OSINT with image extraction</p></li></ul><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>The Investigator&#8217;s Best Friend: OSINT With AI</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e98509fe-a8a2-4732-a0e1-75d164f6e347&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 91st issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #91&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:369150506,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!E93h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1de3e-2f30-4b94-b240-6df2a26b84bc_400x400.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-01-22T14:32:29.911Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/33528114-7766-4749-a091-2f35ddfb1705_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/91&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:180505850,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:11,&quot;comment_count&quot;:1,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><h1>OSINT News</h1><p>&#128240;  <strong>Analysing Footage of Minneapolis ICE Shooting</strong></p><p>If you caught the last episode of the podcast, I talked about sharing methods you used in high profile cases to help enrich the OSINT community. Here&#8217;s an example. No doxxing. Just sources and methods. </p><p><a href="https://www.bellingcat.com/news/2026/01/13/analysing-footage-of-minneapolis-ice-shooting/">Read on Bellingcat&#8230;</a></p><p>&#127913; H/T: Jake Godin</p><p>&#128240; <strong>Your Phone is a Tracking Device, and the Government (and Others) are Buying and Using the Data to Find You</strong></p><p>A tale as old as time. Companies are getting a hold of your mobile information, often through advertisement networks and other mobile applications, aggregating it, and selling it to the government (or worse). If you aren&#8217;t familiar with this risk, read up on it here.</p><p><a href="https://onlinesafety.substack.com/p/your-phone-is-a-tracking-device-how-to-protect-yourself">Read on Tate&#8217;s Online Safety Community&#8230;</a></p><p>&#127913; H/T: Tate Jarrow</p><p>&#128240; <strong>Introducing AIWhisperer. Feed massive files to AI with less data exposed</strong></p><p>I&#8217;ve run into this problem; you&#8217;ve run into this problem. You upload an attachment to your favorite LLM and it says the attachment is too large. You have to find a way to break it into smaller chunks. That sucks. Also, you have to redact information you don&#8217;t want uploaded to the cloud. AIWhisperer does both of these for you at the same time. Enjoy.</p><p><a href="https://www.digitaldigging.org/p/party-time-introducing-aiwhisperer">Read on Digital Digging&#8230;</a></p><p><a href="https://github.com/voelspriet">GitHub</a></p><p>&#127913; H/T: Henk Van Ess</p><div><hr></div><h1>OSINT Tools</h1><p>&#128270; <strong>OSINT Investigator&#8217;s Toolkit</strong></p><p>This is a beginner-friendly collection of OSINT tools that features both free and paid tools. It&#8217;s another directory; however, it has a search engine which makes tools easier to find. If you&#8217;re new to investigations, there&#8217;s a lot of staples here.</p><p><a href="https://osint.intelligenceonchain.com/">Web App</a></p><p>&#128270; <strong>LeakHub</strong></p><p>Warning: This tool is pretty niche. If you&#8217;re curious about how LLMs work behind the scenes, LeakHub shows you the guidelines LLMs have to follow when fulfilling your request. The web page is missing an description but their <a href="https://github.com/elder-plinius/CL4R1T4S">GitHub</a> page has more details. This is useful because the better you understand the inputs, the better you can control the outputs.</p><p><a href="https://leakhub.ai/">Web App</a></p><p>&#127913; H/T: pliny</p><p>&#128270; <strong>The Big Brother</strong></p><p>This is a username tool on steroids. Not only does it fetch profiles with matching usernames, it also extracts images from those profiles <em>and </em>provides you with search engine results for those images. I&#8217;d love to see this tool integrate OLlama for more analysis, though.</p><p><a href="https://github.com/chadi0x/TheBigBrother">GitHub</a></p><p>&#127913; H/T: Chadi</p><div><hr></div><p>&#127937; <strong>Missing Christmas Challenge</strong></p><p>No one has solved last weeks CTF and so we will not be revealing the answers. This weeks challenge is a lot easier, a simple geolocation challenge. </p><p><a href="https://ctf.osintnewsletter.com/challenges#Missing%20Christmas-12">Capture the Flag</a></p><p>&#129667; If you missed the last CTF, here&#8217;s a <a href="https://ctf.osintnewsletter.com/challenges#The%20Missing%20CEO-9">link to catch up</a>.</p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p>&#9889; <strong>How I Discover New OSINT Methods</strong></p><ul><li><p>Follow along as I show you how I discover new methods both in collection and analysis. I have a heavy bias towards the former, though. Use these methods to build your own tools or use them for good like in missing persons investigations.</p></li></ul><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry there&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p>
      <p>
          <a href="https://osintnewsletter.com/p/92">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #91]]></title><description><![CDATA[The Investigator&#8217;s Best Friend: OSINT With AI]]></description><link>https://osintnewsletter.com/p/91</link><guid isPermaLink="false">https://osintnewsletter.com/p/91</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 22 Jan 2026 14:32:29 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/33528114-7766-4749-a091-2f35ddfb1705_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 91st issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:</p><ul><li><p>Prompting: How to &#8220;Talk&#8221; to AI</p></li><li><p>The AI Team: Tools for AI OSINT</p></li><li><p>Example: OSINT with AI in Action</p></li></ul><div><hr></div><p><strong>&#127937; New CTF Challenge Live - The Missing CEO (3 Part)</strong></p><p>A new CTF challenge has been posted on our CTF website. This weeks CTF was designed by <a href="https://x.com/foilmanhacks">@foilmanhacks</a> and is very challenging.</p><p><a href="https://ctf.osintnewsletter.com/">Start competing in our Capture the Flag (CTF)</a></p><p>&#129667; If you missed the last CTF, here&#8217;s a <a href="https://ctf.osintnewsletter.com/challenges">link to catch up</a>. </p><p><strong>Last weeks CTF challenge was an image analysis challenge called (Nothing to See Here) answer:</strong> Steghide was used to extract an embedded secret.txt from the JPEG (password found via rockyou.txt), the message pointed to the nearest campsite and warned about a Bosnia name decoy, and the terrain/coastline were matched on maps to pinpoint the viewpoint and identify the closest campsite as Campingplatz Vucine for the flag.</p><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>Why OSINT Certifications Aren&#8217;t Worth It and What to Do Instead</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a69f22ce-7ba2-4019-b0e1-d2fbe59da3ca&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 90th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of this issue:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #90&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-15T14:02:12.225Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a646082-bc49-4840-81a2-70c703fa0ffe_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/90&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:182550939,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:18,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>&#127897;&#65039; <strong>If you prefer to listen, here&#8217;s a link to the podcast instead.</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ad83e835-12ac-4a50-ab7c-d5c99b7e62da&quot;,&quot;caption&quot;:&quot;Show your work or get left behind.&quot;,&quot;cta&quot;:&quot;Listen now&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Episode 10 - Working With and Against AI, and Why Certifications Aren&#8217;t the Answer&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2026-01-16T16:02:28.709Z&quot;,&quot;cover_image&quot;:&quot;https://substack-video.s3.amazonaws.com/video_upload/post/184417920/b144e07d-52dd-4fb4-8e9a-67ae24bd6a40/transcoded-1768576441.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/episode-10-working-with-and-against&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:184417920,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:11,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><p>OSINT data isn&#8217;t always user-friendly; it can be a hostile landscape of scattered sources, dense PDFs, super-long social threads and dodgy data leaks. Often, the main challenge is sorting out what&#8217;s actually helpful, and doing it fast enough to be useful.</p><p>That&#8217;s where AI comes in. At the moment, it seems like many <a href="https://www.pewresearch.org/science/2025/09/17/how-americans-view-ai-and-its-impact-on-people-and-society/">people don&#8217;t love it</a>- probably because they don&#8217;t do OSINT. If you&#8217;re an OSINT investigator, <strong>AI is your best friend</strong>&#8230; and in this issue, we&#8217;ll show you how to use it.</p><p>We&#8217;ll cover:</p><ul><li><p>How to &#8220;talk&#8221; to AI</p></li><li><p>Essential AI tools (that actually work)</p></li><li><p>How to get accurate, repeatable results</p></li><li><p>And an example of AI in action</p></li></ul><p>By the end, you&#8217;ll have met your new research assistant, and worked it into your workflow. Let&#8217;s get acquainted.</p><h2>What Can AI Do For Me?</h2><p>Well-deployed AI is extremely reliable and useful. It can:</p><ul><li><p>Read and summarise more text than a human can</p></li><li><p>Draw out patterns or contradictions in data</p></li><li><p>Extract specific types of data</p></li><li><p>Cross-reference with other sources</p></li><li><p>Translate foreign languages (<a href="https://www.versioninternationale.com/en/blog/worst-ai-and-human-translation-mistakes-spotted-by-localization-pros/">at a basic level</a>)</p></li><li><p>Come up with fresh angles or unexpected pivots</p></li></ul><p>In other words, AI lets you dump the time-consuming (and dull) parts of OSINT off onto a machine, leaving you free to focus on the important stuff. But of course, even a machine can&#8217;t do everything. AI can handle grunt work, but it won&#8217;t replace you or your typical OSINT tools. You still need the traditional tools to <em>discover data</em>, while AI helps you <em>understand, present and use</em> that data more effectively.</p><h2>Prompting: How to &#8220;Talk&#8221; to AI</h2><p>Although it seems like AI can speak any human tongue, it&#8217;s not the same as a person. You have to use its &#8220;language&#8221;: also known as <strong>prompting.</strong></p><p>A prompt is a command that tells the AI<em> </em>what to do. AI follows instructions<em> literally,</em><strong> </strong>so <strong>a good prompt gives good results. </strong>If you&#8217;re vague, the system will try to work out a solution by itself - usually with assumptions or <a href="https://www.ibm.com/think/topics/ai-hallucinations">just making things up</a>. Think of it like a junior analyst who works incredibly quickly, but needs clear instructions so they don&#8217;t mess up. Or start <a href="https://www.newscientist.com/article/2479545-ai-hallucinations-are-getting-worse-and-theyre-here-to-stay/">hallucinating.</a></p><p>A good prompt usually follows this structure:</p><ul><li><p><strong>The role</strong>: who the AI should act like (e.g., &#8220;as an OSINT analyst&#8221;).</p></li><li><p><strong>The task</strong>: what you want it to do (e.g., &#8220;extract all names from this document&#8221;).</p></li><li><p><strong>The rules</strong>: what it should and shouldn&#8217;t do while completing the task (e.g., &#8220;cite sources,&#8221; &#8220;base all conclusions on the text&#8221;).</p></li><li><p><strong>The output format</strong>: how you want the results delivered (e.g. &#8220;as a table&#8221;)</p></li></ul><h2>Why Do the Responses Still Suck?</h2><p>If you&#8217;re clear about what you want, you&#8217;ll usually get it. But even if you <em>think</em> you&#8217;ve put in a good prompt, it might need a little refinement. Try these strategies.</p><p><strong>Tell the AI Not to Guess: </strong>Add a line like: &#8220;If any information is missing or unclear, respond with &#8216;unknown&#8217; rather than guessing.&#8221; This dramatically improves accuracy during investigations, and prevents hallucinating.</p><p><strong>Break It Down: </strong>Instead of bombarding the AI with a string of complex instructions, break the task into little bits - each a separate query. Ask step-by-step: eg. 1. Extract detail, 2. Identify relationships, 3. Highlight inconsistencies - and so on.</p><p><strong>Iterate: </strong>Work out what works for you on a tool-by-tool basis. If the output isn&#8217;t perfect, change your input. Ask follow-up questions. Provide examples. Try phrasing things differently&#8230; Then stick to whatever gets results.</p><h2>The AI Team: Tools for AI OSINT</h2><p>As you know, pro OSINT isn&#8217;t done with just one tool - it takes a whole team to make the dream work. Each one handles a different type of data: we&#8217;ve discussed <a href="https://www.osintcombine.com/post/from-images-to-intelligence">AI image tools </a>before, for example. We love it when an AI OSINT toolkit comes together, so try adding these AI-powered tool types to your loadout.</p><p><strong>&#129302; General-Purpose AI Analysts (<a href="https://chatgpt.com">ChatGPT,</a> <a href="https://claude.ai/login?returnTo=%2F%3F">Claude</a>)</strong></p><p>These <a href="https://www.cloudflare.com/en-gb/learning/ai/what-is-large-language-model/">large-language models (LLMs)</a> are like an extra brain to add to your investigation. On a basic level, they&#8217;re machine learning systems that work with text; so if you give them human language material (text or documents, for example), they&#8217;ll process it fast and return results.</p><p>They&#8217;re especially good at:</p><ul><li><p>Summarising long docs with a succinct precis</p></li><li><p>Extracting data points like names and dates</p></li><li><p>Spotting suspicious details or unobvious inconsistencies</p></li><li><p>Creating strictly structured reports</p></li></ul><p>Being the vanilla version of AI, these models are far from perfect. But with high quality prompts - and if they stick to what they&#8217;re good at - they&#8217;ll be extremely effective co-investigators.</p><p><strong>&#127912; Visualisers and Mapping Tools (<a href="https://www.maltego.com">Maltego</a>, <a href="https://app.osint.industries/palette/introduction">OSINT Industries Palette</a>)</strong></p><p>Visual investigation tools (like Maltego or OSINT Industries Palette) show how different pieces of information connect to each other within the context of your investigation - like a digital evidence board from a serial killer movie. And with the extra helping hand from AI, these tools get even stronger.</p><p>These tools can:</p><ul><li><p>Visualise links between data points</p></li><li><p>Automatically add detail with AI-generated summaries</p></li><li><p>Get a clearer understanding of complex investigations</p></li></ul><p>If you&#8217;re working on a case with lots of parties involved and are struggling to make links, these OSINT AI tools will straighten out the threads.</p><p><strong>Archive and Capture Tools (<a href="https://hunch.ly">Hunchly</a>)</strong></p><p>AI OSINT investigation tools don&#8217;t just help you understand what you&#8217;re investigating; they can also help you archive and present it. Apps like Hunchly will automatically record every page you visit during your investigation, taking all the drudgery out of archiving.</p><p>They can:</p><ul><li><p>Collect the URL, timestamps, and hashes of every page you visit</p></li><li><p>Make full-page captures of pages</p></li><li><p>Categorize and tag captures (with search function)</p></li><li><p>Assemble findings into court-ready reports</p></li></ul><p>They&#8217;re ideal for long investigations, and save you having to hunt through tabs or untitled files for that one screenshot you need. With OSINT AI tools, your investigation can be fully sourced and documented - no matter how much you browsed.</p><p><strong>Large-Scale Data Processors (Elastic AI, <a href="https://haystack.deepset.ai">Haystack</a>)</strong></p><p>Sometimes, OSINT work gives you huge quantities of data to sift through. From giant text dumps, to large leaks, and groups of thousands of documents, large-scale data processors allow you to blitz through tons of data all at once.</p><p>These tools allow you to:</p><ul><li><p>Search for keywords, and contextual searches</p></li><li><p>Group similar documents</p></li><li><p>Spot recurring themes and data points</p></li></ul><p>Large-scale data processors are great for large-scale investigations, as their name suggests. If you have data you could never process manually (or handle with an LLM), try these.</p><h2>Example: OSINT with AI in Action</h2><p>Imagine someone named Astra Velorin connects with you on LinkedIn. Their profile is mysterious: listing their title as &#8216;Ambassador for the Outer Spiral Arm&#8217;, and they&#8217;re offering you a job as an &#8216;Abduction Assistant&#8217;. Are they a genuine alien, or a particularly inventive scammer? Time to investigate - with AI.</p><h3>Step One: Analyse the Profile</h3><p>You paste Astra&#8217;s bio into an AI model - good old Chat GPT, in this case - and ask it to look for any other instances of the phrase &#8220;Ambassador for the Outer Spiral Arm&#8221; online. It brings up a sci-fi fan site, suggesting where the idea was lifted from.</p><h3>Step Two: Generate Pivots</h3><p>You write a clear, concise prompt: &#8220;show me a list of three follow-up checks to verify whether this profile is genuine.&#8221; ChatGPT returns a clear list of contextualised next steps:</p><ol><li><p>Search for username reuse on gaming or role-play forums</p></li><li><p>Check if the &#8220;Interstellar Embassy&#8221; has a registered address</p></li><li><p>Reverse-image search their profile photos</p></li></ol><p>You use image AI tools to follow-up on the latter - and find all the images come from an art subreddit.</p><h3>Step Three: Examine Their Documents</h3><p>To pique your interest in the position, Astra sends you a lengthy PDF titled <em>First Contact Proposal.</em> Instead of wasting time on reading it, you run AI analysis on the text, and find it&#8217;s an exact match for a well-known sci-fi novel. It&#8217;s also stylistically inconsistent with Astra&#8217;s LinkedIn posts, which are mostly about marketing.</p><p>Step Five: Summarise</p><p>You use your AI tools to create a clear summary of the investigation so far. Luckily - even though the investigation took you across the internet - everything is automatically archived. Leaving you with verifiable proof that <strong>Astra is not an extraterrestrial diplomat - just a bored nerd.</strong></p><p>You reject the offer and remain on Earth.</p><h2>Key Takeaways</h2><p>Now you&#8217;ve met your new assistant! This issue should have taught you:</p><ul><li><p><strong>Your job is safe:</strong> AI won&#8217;t replace your investigative skills - just support them.</p></li><li><p><strong>AI is dumb:</strong> It works best on straightforward tasks, with clear instructions.</p></li><li><p><strong>Use many tools:</strong> each one is good for a different job.</p></li><li><p><strong>Don&#8217;t waste your life:</strong> with AI, there&#8217;s no excuse to lose time on grunt work.</p></li></ul><p>See you next issue, investigators!</p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry. There&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p>]]></content:encoded></item><item><title><![CDATA[Episode 10 - Working With and Against AI, and Why Certifications Aren’t the Answer]]></title><description><![CDATA[Tools, tactics, and fresh investigations expanding the open-source intelligence toolkit.]]></description><link>https://osintnewsletter.com/p/episode-10-working-with-and-against</link><guid isPermaLink="false">https://osintnewsletter.com/p/episode-10-working-with-and-against</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Fri, 16 Jan 2026 16:02:28 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/184417920/0a6a0586aa486aedf57a3f8b2e7c33e1.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Show your work or get left behind.</p><p>This episode covers <strong>Issue 90 of The OSINT Newsletter</strong> and focuses on how OSINT actually gets done in 2026, from investigating developer platforms and deobfuscating messages to building real world credibility without certifications.</p><p>In Episode 10 of the OSINT Podcast, host Jake Creps digs into practical investigative techniques and long term skill building. The conversation moves fluidly between tools, methodology, and career advice, showing how investigators can stay effective in a field that changes faster than any syllabus.</p><p>Highlights include:</p><p><strong>&#128187; Investigating GitHub Profiles</strong> &#8211; why contribution graphs can be misleading, how to properly analyze commit history, branches, and activity, and what GitHub can reveal in real investigations.</p><p><strong>&#129302; Local AI Inside OSINT Tools</strong> &#8211; a look at tools like God&#8217;s Eye that run AI locally using Ollama, enabling private, zero cost analysis without sending data to third parties.</p><p><strong>&#128373;&#65039; Deobfuscating Telegram Messages</strong> &#8211; how spoiler text and pseudo braille obfuscation works on macOS, and how hidden messages can still be recovered from screenshots and screen shares.</p><p><strong>&#128444;&#65039; Face Recognition and Reverse Image Search</strong> &#8211; navigating an increasingly paywalled ecosystem and evaluating alternatives for investigators on a budget.</p><p><strong>&#128236; Gmail Addresses as Identifiers</strong> &#8211; why the ability to change Gmail addresses could weaken email as a long term unique identifier and what that means for attribution.</p><p>&#127820; <strong>Nano Banana vs AI Detection</strong> &#8211; how new generative models are outpacing detection systems and why AI validation is becoming harder, not easier.</p><p>&#127891; <strong>Why OSINT Certifications Aren&#8217;t Worth It &#8211;</strong> a candid discussion on why certifications often lag behind reality, and what to do instead to build credibility.</p><p>Throughout the episode, the emphasis stays on results over credentials, adaptability over static training, and learning by doing rather than memorizing outdated playbooks.</p><p><strong>References</strong></p><p><a href="https://osintnewsletter.com/p/90">OSINT Newsletter - Issue 90 </a></p><p><a href="https://github.com/Vyntral/god-eye">God&#8217;s Eye</a> | <a href="https://spoiler.soxoj.com/">Telegram Spoiler Decoder</a> | <a href="https://surfface.com/">Surfface</a></p><p><a href="https://www.linkedin.com/posts/emrah-nazif_normally-i-dont-pay-much-attention-to-github-activity-7410460038613422080-0nw4/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAABq6F0oBbmG93OZu2jSa-VZL4TF8Qv14q1Y">GitHub Commit History is Misleading</a><strong> </strong>| <a href="https://www.engadget.com/computing/you-may-soon-be-able-to-change-your-gmail-address-165633905.html">Changing Gmail addresses</a> | <a href="https://www.linkedin.com/posts/joathanhatzbani-profile_nano-banana-pro-vs-ai-detection-whos-the-ugcPost-7403870377459761152-cjiB/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAABq6F0oBbmG93OZu2jSa-VZL4TF8Qv14q1Y">Nano Banana vs AI </a></p>]]></content:encoded></item><item><title><![CDATA[The OSINT Newsletter - Issue #90]]></title><description><![CDATA[Why OSINT Certifications Aren't Worth It and What to Do Instead]]></description><link>https://osintnewsletter.com/p/90</link><guid isPermaLink="false">https://osintnewsletter.com/p/90</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Thu, 15 Jan 2026 14:02:12 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0a646082-bc49-4840-81a2-70c703fa0ffe_1900x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#128075; <strong>Welcome to the 90th issue of The OSINT Newsletter.</strong> This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of this issue:</p><ul><li><p>Investigating GitHub profiles</p></li><li><p>You can change your Gmail address?</p></li><li><p>Nano Banana ruining the internet</p></li><li><p>Local AI inside of GitHub OSINT tools</p></li><li><p>Deobfuscating Telegram messages</p></li><li><p>Face recognition reverse image search</p></li></ul><div><hr></div><p>Over the past few weeks we have posted 6 CTF challenges as part of the OSINT Newsletter CTF. A new challenge is now live on the CTF website. <a href="http://CTF.OSINTNewsletter.com">You can sign up and compete now. </a></p><p>Here are the answers to those challenges:</p><p><strong>Operation Jaguar</strong></p><p><strong>Challenge #1: The Jaguar Building</strong> - Google Lens on the building locates it as the Cartier shop in London.</p><p><strong>Challenge #2: The Mystery Car</strong> - Reg plate obtainable from user submitted <a href="https://www.google.com/maps/place/Cartier/@51.5098,-0.1416361,3a,75y,286.48h,75.02t/data=!3m8!1e1!3m6!1sCIHM0ogKEICAgID4ivfcrAE!2e10!3e11!6shttps:%2F%2Flh3.googleusercontent.com%2Fgpms-cs-s%2FAPRy3c8tYrgRDwpybccyTpcLdHH5feFWAJb51SqxpP6GTBw5Q3UVh-eEnHO6zCzg4Ei4yfgnoT5abt2D05_XOras7vMhfm5GnrU01-KLxFNzijwGunCCX2oclbylree2RM6fnnqRFl25fg%3Dw900-h600-k-no-pi14.984841560078394-ya105.48130017761747-ro0-fo100!7i8704!8i4352!4m13!1m2!2m1!1sCartier+store+London!3m9!1s0x48760529f5f64cb7:0xc45471e3fc0f79ef!8m2!3d51.509711!4d-0.1418681!10e5!14m1!1BCgIgARICCAI!15sChRDYXJ0aWVyIHN0b3JlIExvbmRvbiIDiAEBWhYiFGNhcnRpZXIgc3RvcmUgbG9uZG9ukgENamV3ZWxyeV9zdG9yZZoBRENpOURRVWxSUVVOdlpFTm9kSGxqUmpsdlQydEtWMVJyTURWYVNFRXhWMjB4U21SV1VtNVNSemxVVlZWb1JXTnVZeEFC4AEA-gEECFQQPQ!16s%2Fg%2F1vy7g1c6?entry=ttu&amp;g_ep=EgoyMDI1MTIwOS4wIKXMDSoASAFQAw%3D%3D">360 view footage from Google Maps.</a></p><p><strong>Challenge #3: Vehicle Attribution</strong> - Information available from the <a href="https://www.gov.uk/check-mot-history">UK&#8217;s MOT website</a>.</p><p><strong>Challenge #4: Looking Back</strong> - Vehicle damage history (partially) available from <a href="https://www.gov.uk/check-mot-history">MOT website</a>.</p><p><strong>Operation X</strong></p><p><strong>Challenge #1: Twitter Account Geolocation</strong> - Using the <a href="https://github.com/The-OSINT-Newsletter/influx">CLI tool</a> to export the data, 60% of the recent RT&#8217;s come from Europe or European counties. </p><p><strong>Operation History</strong></p><p><strong>Challenge #1: Past is Prologue</strong> - Using wayback machine we can find the earliest recorded snapshot of the osintpodcast.com. Then, using developer tools to view the source code of the page we can see multiple mentions of &#8220;assets.buzzsprout.com&#8221; and other code snippets mentioning the Buzzsprout service.</p><div><hr></div><p>&#129667; If you missed the last newsletter, here&#8217;s a link to catch up.</p><p>&#9889; <strong>Investigating X Account Locations at Scale</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;16b2d90c-aeb9-45da-9c68-4a193bd9356a&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 89th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #89&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-12-18T14:03:20.601Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1aa28f0-0b6b-4569-9297-3a05e890b646_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/89&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:180988094,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:16,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>&#127897;&#65039; <strong>If you prefer to listen, here&#8217;s a link to the podcast instead.</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1e87d583-ae73-4f65-81f3-3951609b0bdd&quot;,&quot;caption&quot;:&quot;Seeing more by looking differently.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Episode 9 - Image OSINT, Offline Tradecraft, and Tracking Influence at Scale&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-12-19T16:02:51.756Z&quot;,&quot;cover_image&quot;:&quot;https://substack-video.s3.amazonaws.com/video_upload/post/181774842/5957014e-80f1-4cfd-96ce-a34b7596127f/transcoded-1765925658.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/episode-9-image-osint-offline-tradecraft&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:181774842,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:15,&quot;comment_count&quot;:1,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Let&#8217;s get started. &#11015;&#65039;</p><div><hr></div><h1>OSINT News</h1><p>&#128240;  <strong>GitHub Commit History is Misleading</strong></p><p>This is not OSINT-related per se; however, if you discover a GitHub profile during your investigation that seems to be dormant (the commit history is completely gray), you might be making a mistake. Before closing your tab, make sure to look at all of the commit history and other activity first.</p><pre><code>Turns out, contributions to branches other than main don't show up in the contribution graph (until you merge). Good to know for anyone else wondering why their activity isn't reflected accurately! </code></pre><p>&#127913; H/T: Emrah Nazif</p><p><a href="https://www.linkedin.com/posts/emrah-nazif_normally-i-dont-pay-much-attention-to-github-activity-7410460038613422080-0nw4?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAABq6F0oBbmG93OZu2jSa-VZL4TF8Qv14q1Y">Read on LinkedIn&#8230;</a></p><p>&#128240; <strong>You may soon be able to change your Gmail address</strong></p><p>Soon, Gmail users might be able to change their email address. This is pretty significant considering that, similar to usernames, the uniqueness of an email address as a personal identifier might be weakened, specifically with Gmail. </p><pre><code>A Google support page in Hindi says the feature is "gradually rolling out to all users."</code></pre><p>&#127913; H/T: Will Shanklin</p><p><a href="https://www.engadget.com/computing/you-may-soon-be-able-to-change-your-gmail-address-165633905.html">Read on Engadget&#8230;</a></p><p>&#128240; <strong>Nano Banana Pro vs AI Detection; Who&#8217;s the human here?</strong> </p><p>In September, I wrote a post about testing AI detection against existing models. Google&#8217;s Nano Banana was released in August and it&#8217;s becoming a big problem. Jonathan tests out the new model against existing detection models I didn&#8217;t cover in my previous issue.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;553f7c1b-f6f8-4e81-b3bd-97d2cbe786e4&quot;,&quot;caption&quot;:&quot;&#128075; Welcome to the 80th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here&#8217;s an overview of what&#8217;s in this issue:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The OSINT Newsletter - Issue #80&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:130747684,&quot;name&quot;:&quot;The OSINT Newsletter&quot;,&quot;bio&quot;:&quot;Fighting the machines to write S tier content. OSINT tools, tactics, and techniques.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f911711c-3bbd-421e-9d55-d9dcaffb23c5_240x240.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100}],&quot;post_date&quot;:&quot;2025-09-25T13:00:53.157Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f87813f1-d835-45f2-bee7-712026441292_1900x1000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://osintnewsletter.com/p/80&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:173531441,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:16,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1442182,&quot;publication_name&quot;:&quot;The OSINT Newsletter&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yF4I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5993aebc-3fc0-409c-bfc1-a8765534c7ab_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>&#127913; H/T: Jonathan Hatzbani </p><p><a href="https://www.linkedin.com/posts/joathanhatzbani-profile_nano-banana-pro-vs-ai-detection-whos-the-ugcPost-7403870377459761152-cjiB?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAABq6F0oBbmG93OZu2jSa-VZL4TF8Qv14q1Y">Read on LinkedIn&#8230;</a></p><div><hr></div><h1>OSINT Tools</h1><p>&#128270; <strong>God&#8217;s Eye</strong></p><p>AI is so accessible that it&#8217;s even making its way into free OSINT tools. God&#8217;s Eye is a subdomain enumerator (among other features) that uses a local AI (Ollama) to do analysis for vulnerabilities and produce reports. </p><pre><code>Zero-cost local AI with Ollama for intelligent vulnerability analysis, CVE detection, and executive reports. 100% private.</code></pre><p><a href="https://github.com/Vyntral/god-eye">GitHub</a></p><p>&#127913; H/T: Vyntral</p><p>&#128270; <strong>Telegram Spoiler Decoder</strong></p><p>If you&#8217;re on a Mac, the Telegram can display text that looks like braille. It&#8217;s a unique way of obfuscating text; however, <a href="https://mashable.com/article/epstein-files-jailbreak">like other methods</a>, you can still reveal the plaintext behind it. </p><pre><code>Telegram client on MacOS sometimes displays text under spoiler as pseudo-braille characters. In such cases, if you share your screen or take a screenshot, the hidden text can be recovered!</code></pre><p><a href="https://spoiler.soxoj.com/">Web App</a></p><p>&#127913; H/T: Soxoj</p><p>&#128270; <strong>Surfface</strong></p><p>Surfface is another reverse image search that uses face recognition to identify people. With Pimeyes and Facecheck.id going behind the paywall, investigators on a budget are always looking for new tools that don&#8217;t require a card on file (or a crypto transaction).</p><p>&#128466;&#65039; You have to spoof your location to use the tool. I set my VPN to a Russian IP.</p><p><a href="https://surfface.com/">Web App</a></p><div><hr></div><p>&#9989; That&#8217;s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.</p><p>By upgrading to paid, you&#8217;ll get access to the following:</p><p><strong>&#9889; Why OSINT Certifications Aren&#8217;t Worth It and What to Do Instead</strong></p><ul><li><p>OSINT certifications are expensive and the training associated with them is often outdated. In this issue, I step through what I did to build my resume in OSINT. I don&#8217;t have any certifications.</p></li></ul><p>&#128064; All paid posts in the archive. <a href="https://osintnewsletter.com/">Go back and see what you&#8217;ve missed</a>!</p><p>&#128640; If you don&#8217;t have a paid subscription already, don&#8217;t worry there&#8217;s a 7-day free trial. If you like what you&#8217;re reading, upgrade your subscription. If you can&#8217;t, I totally understand. Be on the lookout for promotions throughout the year.</p><p>&#128680; The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address. </p>
      <p>
          <a href="https://osintnewsletter.com/p/90">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Episode 9 - Image OSINT, Offline Tradecraft, and Tracking Influence at Scale]]></title><description><![CDATA[Tools, tactics, and fresh investigations expanding the open-source intelligence toolkit.]]></description><link>https://osintnewsletter.com/p/episode-9-image-osint-offline-tradecraft</link><guid isPermaLink="false">https://osintnewsletter.com/p/episode-9-image-osint-offline-tradecraft</guid><dc:creator><![CDATA[The OSINT Newsletter]]></dc:creator><pubDate>Fri, 19 Dec 2025 16:02:51 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/181774842/2f7e69fae1f07abd81e3ed08b249a74b.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Seeing more by looking differently.</p><p>From image analysis and shadow investigation to offline sources and large scale platform analysis, this episode covers Issue 88 and 89 of The OSINT Newsletter.</p><p>In the ninth episode of the rebooted OSINT Podcast, host Jake Creps explores how modern OSINT investigations increasingly rely on context, methodology, and synthesis rather than just tools alone. The discussion moves from pixels and shadows to books, archives, and social platforms, showing how investigators can widen their field of view without losing rigor.</p><p>Highlights include:</p><p><strong>&#128444;&#65039; Image OSINT That Goes Beyond Tools</strong> &#8211; why reverse image search is only the starting point, and how faces, objects, backgrounds, and reflections all become investigative pivots.</p><p>&#127912; <strong>The Full Paintbox</strong> &#8211; a practical breakdown of when and why to use Yandex, PimEyes, Lenso.ai, TinEye, Google Lens, and Bing Visual Search together rather than in isolation.</p><p><strong>&#129504; Priming Images for Better Results</strong> &#8211; background removal, smart cropping, and AI restoration techniques that dramatically improve search outcomes.</p><p><strong>&#127761; Investigating Shadows</strong> &#8211; how tools like ShadeMap can be used to chronolocate images when time or place is missing, and where the limits of shadow analysis lie.</p><p><strong>&#128218; Offline OSINT</strong> &#8211; why some of the most valuable intelligence still lives in obscure books, fringe publications, and physical archives, and how to integrate them into modern workflows.</p><p><strong>&#127917; Office Stunt Doubles</strong> &#8211; a discussion on visual misdirection, room doubles, and how small photographic details have been used to infer high level locations.</p><p><strong>&#127760; Searching for Groups</strong> &#8211; exploring emerging tools like Waybien and the ongoing challenge of discovering Telegram, Discord, WhatsApp, and Facebook groups at scale.</p><p><strong>&#128202; Investigating X Account Locations at Scale</strong> &#8211; a walkthrough of a custom browser extension that collects quotes and retweets, extracts account locations, and outputs structured data for influence analysis.</p><p><strong>&#128302; OSINT Trends for 2026</strong> &#8211; AI content validation, agentic AI, and synthetic influence campaigns, and what investigators should prepare for going into the new year.</p><p>Throughout the episode, the focus stays on tradecraft over hype, emphasizing methodology, limitations, and ethical considerations at every step.</p><p><strong>References</strong></p><ul><li><p><strong><a href="https://osintnewsletter.com/p/88">Image OSINT That Goes Beyond Tools (Issue 88)</a></strong></p></li><li><p><strong><a href="https://www.linkedin.com/posts/kirbyp_here-are-three-things-i-believe-will-be-standard-activity-7403164055198171136-0w4Z?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABq6F0oBbmG93OZu2jSa-VZL4TF8Qv14q1Y">OSINT Trends for 2026</a> | <a href="https://www.telegraph.co.uk/world-news/2025/11/13/spot-difference-putin-replica-offices-exposed/">Office Stunt Doubles</a> | <a href="https://www.bullshithunting.com/p/ghosts-in-the-graph">Offline OSINT</a> <a href="https://osintnewsletter.com/p/89">(Issue 89)</a></strong></p></li><li><p><strong><a href="https://annas-archive.li/">Anna&#8217;s Archive</a> | <a href="https://shademap.app/@33.16262,-96.93751,15z,1765144191887t,0b,0p,0m">ShadeMap</a> | <a href="http://waybien.com/">Waybien</a></strong></p></li><li><p><strong><a href="https://osintnewsletter.com/p/89">Investigating X Account Locations at Scale</a></strong></p></li></ul>]]></content:encoded></item></channel></rss>