The OSINT Newsletter
The OSINT Podcast
Episode 3 – The Dark Side of OSINT: Influence Ops and Exploits
0:00
-24:43

Episode 3 – The Dark Side of OSINT: Influence Ops and Exploits

Tools, tactics, and fresh investigations expanding the open-source intelligence toolkit.

Tools, tactics, and investigations that show both the power and the risks of open-source intelligence.

In the third episode of the rebooted OSINT Podcast, host Jake Creps explores a mix of new tools and hard-hitting case studies that highlight how investigators can find, process, and analyse information at scale. From browser extensions that reveal hidden metadata to frameworks that structure analysis, this episode dives into the cutting edge of OSINT tradecraft.

Highlights include:

  • 🔎 VSCO SPY – a Chrome extension that reveals hidden metadata on VSCO photos, including geolocation, device details, and timestamps.

  • 🕵️ Shodan-hash – a CLI tool for pivoting on favicons, headers, and HTML to uncover related infrastructure.

  • 🎥 TikSpyder – a clever tool that combines Google search with Apify to make TikTok easier to investigate.

  • 🌍 West Papua bot network – how investigators exposed a $300,000 influence operation using only free OSINT tools.

  • 🧩 The Analytical Hierarchy of OSINT – why structure matters, and how to turn raw data into actionable intelligence.

  • ⚠️ Malicious uses of OSINT – how cybercriminals weaponise public data for attacks, from Sony Pictures to MGM and beyond.

Each segment unpacks how these methods work in practice, what risks they highlight, and how OSINT practitioners can adapt their own investigations accordingly.

Sources & Links:

Discussion about this episode

User's avatar