The OSINT Newsletter - Issue #38
Discovering Telegram channels, groups, and users on social media platforms using Google Dorks
👋 Welcome to the 38th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Among those topics are data privacy, OSINT trends for 2024, investigating social media profiles, understanding exploit research, satellite OSINT tools, and more.
🚨 At the time of this writing, the first print edition of The OSINT Newsletter will be in final edits while coordination with production continues throughout the week. All content is written and formatted. It’s looking pretty awesome…
🎉 The OSINT Newsletter now has over 11,000 subscribers. This makes it the number one OSINT newsletter on Substack.
🪃 If you missed the last newsletter, here’s a link to catch up.
🗒️ This is a 2-part series
Let’s get started. ⬇️
OSINT News
📰 Decoding IncogniGate: What Google’s Lawsuit Means for Your Privacy in 2024
Google's lawsuit reveals incognito mode doesn't fully protect user privacy. The case urges better privacy communication by tech companies.
🎩 H/T: Sam Bent
📰 2023 OSINT Landscape Trends: A Data-Driven Analysis
The 2023 OSINT Trends Analysis discusses the growth of open-source intelligence tools. It underscores their increasing use in social media and geopolitical conflict analysis.
🎩 H/T: Scott Small
📰 Happy New Year & Happy OSINT Hunting
Ginger T focuses on creating a custom virtual machine for OSINT. It highlights the importance of using specialized tools for digital investigations.
🎩 H/T: Ginger T
OSINT Community
📺 Reveal Hidden Information on Facebook Profiles
Learn how to use Google Dorking to find hidden information about a Facebook user. You can partially create a graph search by using these techniques.
🎩 H/T: CyberSudo
🐦 Cyber Detective shares tips for exploit research
Shodan has an exploit search engine. Netlas also has a similar functionality. Cyber Detective compares and contrasts with images. If you’re interested in cyber threat intelligence, give this a read.
🎩 H/T: Cyber Detective
🐦 Satellite Tracking OSINT Tools
Angelina compiles and shares her list of satellite OSINT tools and data sources. I’m considering adding satellite positioning to a new historical OSINT location tool I’m working on and this list has been awesome.
🎩 H/T: Angelina Tsuboi
OSINT Tools
🌟 Sponsor: Authentic8
Blending in is critical to OSINT research
Are you sticking out like a sore thumb on foreign websites? With Silo for Research, you have full control over your digital fingerprint, appear as an in-region visitor to sites, and are fully protected from potentially malicious web code. To learn more, visit our website.
🔎 SnapIntel
SnapIntel is an open-source Python script that lets you find information about a Snapchat user. There’s an option to download user stories and other interesting features.
🎩 H/T: Kr0wZ
🖥️ GoOSINT
GoOSINT is an aggregation of free OSINT and cybersecurity-related tools. With 130+ in the collection, you’re bound to find something useful.
🎩 H/T: Khalil B
🖥️ Linux for OSINT: 21-day course for beginners
Cyber Detective releases another 21-day series to help beginners learn Linux. This free resource will help you get more proficient at more advanced OSINT techniques.
🎩 H/T: Cyber Detective
✅ That’s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.
By upgrading to paid, you’ll get access to the following:
⚡ Discovering Telegram channels, groups, and users on social media platforms using Google Dorks
👀 You get access to all paid posts in the archive. Go back and see what you’ve missed!
🚀 If you don’t have a paid subscription already, don’t worry there’s a 7-day free trial. If you like what you’re reading, upgrade your subscription. If you can’t, I totally understand. Stay tuned for the geolocation challenge in next week’s issue to get a shot at free access.
Keep reading with a 7-day free trial
Subscribe to The OSINT Newsletter to keep reading this post and get 7 days of free access to the full post archives.