The OSINT Newsletter - Issue #31
Extracting profile information, followers, and following lists from Threads
π Welcome to the 31st issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. My goal with this newsletter is to help promote the OSINT industry, develop better investigators, and raise awareness of ethical use cases for open source intelligence.
π¨ The introduction and disclaimer pages are now complete and have been added to the preorder page of the print version of The OSINT Newsletter. Iβm also about 1/3 of the way complete with the print issue at the time of this writing. Itβs incredible to see that almost 100 people have preordered this first-of-its-kind publication. Thank you for your support.
π The OSINT Newsletter stickers have arrived! All print issues of The OSINT Newsletter will also include a free sticker as a token of appreciation.
π Geolocation challenge
In what city was this image taken? What are the specific coordinates?
The first person to provide the correct city gets 1 month of paid access to The OSINT Newsletter for free. The person with the closest coordinates to where the image was taken from will also get 1 month of paid access.
Bonus: When was this image taken? The month and the year are fine.
π Reply to this email with your answer; winners will be announced on Friday (or Saturday).
For those of you reading this on Substack or for those who subscribed after this issue was released, use the Substack comment section instead.
πͺ In case you missed the last newsletter, hereβs a link to catch up.
Letβs get started. β¬οΈ
OSINT News
π° Massive facial recognition search engine now blocks searches for childrenβs faces
This article is about PimEyes. If youβre in OSINT and havenβt tried PimEyes yet, youβre not actually in OSINT. PimEyes has started blocking searches that take a childβs image as input. While this might be a negative for missing persons investigations, itβs likely necessary to avoid harmful use cases where children are exploited.
π° Investigating bad carbon credits
If you donβt know what a carbon credit is, neither does anyone else. In all seriousness, though, a carbon credit is essentially a permission slip you can purchase from the government to offset the emissions you need to produce for your business. Itβs like indulgences during the Crusades but for climate change. Joking aside, carbon credits are ripe with fraud and Techjournalist shows you how to investigate them in this interesting OSINT case study.
π° Can AI Chatbots Be Used for Geolocation?
The answer is yes; however, the results vary greatly. Bellingcat does a side-by-side comparison of the results produced by Bing (ChatGPT) and Bard (Google) so you donβt have to. Iβm waiting for this capability (image upload) to land in the API so I can build some tooling around it.
π° Chinese βMiracle Waterβ Grifters Infiltrated the UN and Bribed Politicians to Build Pacific Dream City
Typically I like to summarize an article to let you know if you should read it or not but these folks did an excellent job so I donβt have to.
A pair of Chinese scam artists wanted to turn a radiation-soaked Pacific atoll into a future metropolis. They ended up in an American jail instead. How they got there is an untold tale of international bribery and grifting that stretched to the very center of the United Nations.
π° A Hollywood-Backed Nonprofitβs App Promises To Identify Sex Traffickers. But Critics Say It Endangers Survivors
Iβm Switzerland. I donβt have an opinion one way or another; however, if youβve seen DeliverFund in any of your circles, this is a worthwhile read. Iβm somewhat active in circles that aim to find missing persons, combat human trafficking, and prevent child exploitation. This article was sort of a shock for me to read.
OSINT Community
πΊ Tracking Down My Family Using Open-Source Research
Bellingcat Researcher Annique Mossou goes on a personal journey to find where her Indonesian roots come from. She discusses several tools, tactics, and techniques you can use to learn more about your own family history.
I think we need more content like this. Personal case studies.
πΊ OSINT at Home #21: Using Googleβs βFind Image Sourceβ Tool
Benjamin Strick in another high-quality video post shows you how to use Googleβs βFind Image Sourceβ tool in your investigations. This tool will help you find the source of the image youβre looking into which can create a timeline of the spread of content. Use cases vary from disinformation research to patterns of life on persons of interest.
π Bullshit Hunting
Justin Seitz is writing again. This time, heβs hunting for bullshit. Along the way, heβs sharing useful insights into normal, everyday things, like UPC barcodes and what information is encoded in them. Part humor, part thriller, this newsletter is definitely one you donβt want to miss out on.
π€ Fraudish - Avi Klein
Fraudish is a podcast about⦠fraud. Kelly Paxton interviews a wide range of guests who dabble in open source intelligence. Avi Klein is a licensed private investigator who focuses on supporting litigators (civil and criminal), in-house counsel, and investors. He specializes in asset searches, background investigations, locating and interviewing key witnesses, identifying anonymous online fraudsters, surveillance, and challenging service of process.
π¦ Using Huggingface models for OSINT
Huggingface is a directory of machine learning models that can be used in any relevant project. Similar to Rapid API, thereβs a built-in sandbox that allows you to test the models before you apply them. For open source intelligence, these sandbox trials are sufficient for most use cases. Cyber Detective shows you one of those use cases.
OSINT Tools
π π₯Έ Facebook Checker
I ran across this tool when doing my typical GitHub spelunking. There are two versions of it but the v2 version seems to be a clone that isnβt configured properly.
What is it? Itβs a brute-force Facebook registration checker to determine if an email or other supported login type is registered on Facebook. This seems more of an account takeover tool than an OSINT tool so this is part OSINT and part OPSEC.
Keep in mind that tools out there exist and if you see those attempted Facebook login emails (like I do), then understand these tools are being used.
π₯οΈ 1ft.io
If youβre looking to bypass a paywall and the tools in your toolkit arenβt working, try this tool. Titled F*** Paywalls, this doesnβt require any further description. One thing I do like is that the URL generated is a 1ft.io URL so your IP wonβt even show up on the site youβre trying to bypass.
π Reverse engineering TikTok
Nerd alert. This GitHub repo is not for the faint of heart. If youβre interested in doing advanced open source intelligence and want to potentially build a tool that interacts with TikTok, give this a read. If youβre curious how companies like Epieos, Predictalab, and OSINT Industries build modules, this is the way. Mobile devices + SSL pinning bypass + reverse engineering.
π furl
This tool is useful for OSINT and bug bounty. It takes a domain and checks the Wayback Machine. furl mines all instances of the Wayback Machine for a given URL and tries to find opportunities for bug bounties, fuzzing, etc. This type of information can also be useful for open source intelligence depending on your use case.
β Thatβs it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.
By upgrading to paid, youβll get access to the following:
β‘ An introduction to open source intelligence on Threads and a bit about Instagram.
Learn how to easily get a unique user ID that is used both on Instagram and Threads
Use that unique user ID to get profile information for that Threads account
π You get access to all paid posts in the archive. Go back and see what youβve missed!
π If you donβt have a paid subscription already, donβt worry thereβs a 7-day free trial. If you like what youβre reading, upgrade your subscription. If you canβt, I understand. Stay tuned for the geolocation challenge in next weekβs issue to get a shot at free access.
Keep reading with a 7-day free trial
Subscribe to The OSINT Newsletter to keep reading this post and get 7 days of free access to the full post archives.