🔍

Open Source Intelligence (OSINT) and Tools

Jul 18, 2024

Lecture Notes: Open Source Intelligence (OSINT) and Tools

General OSINT Techniques

  • Identifying and verifying data sources to gather information.
  • Using Google's search capabilities.
  • Importance of not overthinking and utilizing available tools effectively.

Security and Privacy

  • Concept of RFC1918 addresses for private IPs.
  • Public vs. Private IP addresses.
  • Use of tools to maintain privacy without VPNs.

Tools for OSINT Investigations

  • Kasum Workspaces: Anonymous research, secure browsing, web and browser isolation.
  • Forensic OSINT Tool: For capturing data such as screenshots and videos for persistent records.
  • Brave and Tor browsers: For browsing privately and anonymously.
  • Speed tests using tools like Fast.com to check browsing speed.
  • Google Chrome Extension: View page source for hidden metadata like the date of birth on Tinder.

User Contributions in OSINT

  • Lecturer collaborated with various programs & organizations for child and community safety.
  • Volunteering for initiatives like Operation Safe Escape and the National Child Protection Task Force (NCPTF).
  • Usage of Google for open-source investigations and personal security measures taken.

Practical Applications and Case Studies

  • Brandon Fugal and Skinwalker Ranch: Example of using tail number of an aircraft and personal watch to identify an anonymous owner.
  • Tools played a significant role in discovering hidden details.

Key Skills for OSINT

  • Critical thinking and persistence in investigations.
  • Use of technical skills like scripting (Python), familiarity with Linux and its tools for cost efficiency.
  • Understanding of various investigative tools is crucial.

Career Path and Learning Resources

  • Networking is essential for OSINT work.
  • Combining technical and non-technical people enhances team performance.
  • Volunteering for real-life investigations enhances practical skills.
  • Trace Labs: Volunteer opportunities, Capture the Flag (CTF) events for honing skills.

Advice for Emerging OSINT Professionals

  • Start slow, learn gradually; no one becomes an expert overnight.
  • Practical experience augmented by formal courses can bolster skill set.
  • Books: Justin Seitz’s books on Python for OSINT, various editions of OSINT Handbooks.

Collaboration and Community Involvement

  • Participating in diverse communities on platforms like Twitter, LinkedIn, Discord (e.g., OSINT For All, Recon Village).
  • Building connections across different areas such as law enforcement, journalism, threat intelligence.

Notable OSINT Experts Featured

  • MJ Banias: Background in journalism and OSINT, involved in tracking financials and sub-cultures.
  • Ray Baker: Specialized in maritime and sea travel OSINT, usage of domain tools and volunteering for skills development.
  • Elliot Higgins: Founder of Bellingcat, highlighted the importance of transparency, community collaboration, and tools developed by Bellingcat.

Tips from Experts

  • Diversifying skills and tools can lead to more comprehensive investigations.
  • Utilizing collaborative platforms and tools to better manage and process collected data.
  • The importance of practical, hands-on learning in real-world scenarios.

Conclusion

  • OSINT requires a balance of technical know-how and investigative tenacity.
  • Community support and collaboration amplify the effectiveness of OSINT efforts.