41 episodes

The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, original blogs, instructional videos, and a bi-weekly webcast/podcast. Most of all, we want to inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions. We try to keep people curious about exploring web applications for bits of information or trying out new techniques to access important OSINT data.

We are an OSINT-learning catalyst.

OSINTCurious OSINTCurious

    • Technology
    • 4.6 • 11 Ratings

The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, original blogs, instructional videos, and a bi-weekly webcast/podcast. Most of all, we want to inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions. We try to keep people curious about exploring web applications for bits of information or trying out new techniques to access important OSINT data.

We are an OSINT-learning catalyst.

    Episode 44: Guest Julia Beyer, Geolocating without Street View and Google Maps, SOCMINT on foreign social media, FOCA for OSINT, DNS research

    Episode 44: Guest Julia Beyer, Geolocating without Street View and Google Maps, SOCMINT on foreign social media, FOCA for OSINT, DNS research

    This week’s guest is Julia Bayer (@bayer_julia)

    Julia Bayer is an investigative journalist, innovation manager and trainer at Deutsche Welle. At DW´s Investigative unit she is diving deep online collecting publicly available sources to uncover the (in)visible using OSINT. Before that she researched and verified UGC for (breaking) news at DW´s Social Media Newsroom.

    People in this Episode

    Nico Dekens (@DutchOSINTGuy)
    Matthias Wilson (@mwOsint)
    Lorand Bodo (@LorandBodo)
    Nixintel (@nixintel)
    Sector035 (@sector035)
    Rae Baker (@wondersmith_rae)

    Links to what we discussed

    OSINTCurious blog post by Technisette: https://osintcurio.us/2020/09/28/when-there-is-no-google-earth-or-street-view-what-can-you-do/
    Blog by Matthias Wilson: SOCMINT on foreign platforms: https://keyfindings.blog/2020/10/04/social-media-around-the-world/
    Updated browser extension by OSINTSupport: https://osint.support/chrome-extensions/2019/09/29/osint-socmint-tooling.html
    Google dorks to access confidential information: https://benjaminstrick.com/dear-x-your-staff-passwords-numbers-and-confidential-data-is-on-google/
    Blog post by Nixintel: https://nixintel.info/osint/do-dns-records-prove-that-jim-watkins-is-q/
    Blog post by Rae Baker: https://medium.com/@raebaker/using-foca-for-osint-document-metadata-analysis-6745c8d709fa
    Search for emojis: https://www.fastemoji.com/
    Update by Telegram: https://twitter.com/LorandBodo/status/1311591571498971136
    2020 OSINT tools & resources handbook by @i_intelligence: https://i-intelligence.eu/resources/osint-toolkit
    FREE online investigative training course for journalists: https://twitter.com/KnightCenterUT/status/1312508586216497153
    Create your own bookmarks database: https://www.aware-online.com/en/create-your-own-osint-database-with-bookmarks/
    Thread on how to investigate websites: https://twitter.com/aware_online/status/1308312883248467975
    How discover relationships between websites using Maltego: https://www.maltego.com/blog/tracing-internet-relationships-with-maltego/

    • 57 min
    Episode 43: Guest Emmanuelle Welch, Maltego for Telegram, Google Account Finder, WIPO Database, Twitter Analysis Framework

    Episode 43: Guest Emmanuelle Welch, Maltego for Telegram, Google Account Finder, WIPO Database, Twitter Analysis Framework

    This week’s guest is Emmanuelle Welch (@frenchpi)

    Emmanuelle Welch is a Licensed Private Investigator, Certified Fraud Examiner, and owner of French Connection Research, a private investigative agency in Brooklyn, NY, licensed in New York and Washington, DC. She specializes in white-collar crime investigations, cross-Atlantic litigation support and OSINT analysis.


    People in this Episode

    Nico Dekens (@DutchOSINTGuy)
    Lorand Bodo (@LorandBodo)
    Nixintel (@nixintel)
    Kirby Plessas (@kirbstr)
    John (@thegumshoo)
    Rae Baker (@wondersmith_rae)

    Links to what we discussed

    Emmanuelle’s OSINT tools/resources start.me page for dating apps: https://start.me/p/VRxaj5/dating-apps-and-hook-up-sites-for-investigators
    Introduction to researching foreign influence in the US: https://osintcurio.us/2020/09/14/introduction-to-researching-foreign-influence-in-the-us/
    NEW Twitter Analysis framework by @sowdust: https://github.com/sowdust/tafferugli
    OSINT Intelligence Cycle by @sinwindie: https://www.secjuice.com/the-osint-intelligence-cycle-part-i-planning-and-direction/
    Maltego Transform for Telegram: https://twitter.com/noneprivacy/status/1304357985297346560?s=21
    Using R to find stories in financial publicly available data: https://medium.com/@itoufexi/how-i-used-the-companies-house-streaming-api-to-find-a-newsworthy-story-a96d787955b2
    How hackers can find sensitive information in your photos: https://medium.com/digital-marketing-lab/subtle-information-hackers-find-in-the-background-of-your-social-media-photos-938ec1876246
    Interesting and detailed case study about what can be found with someone’s passport number: https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram
    Google Account Finder: https://tools.epieos.com/google-account.php
    Best investigative podcasts: https://gijn.org/2020/09/09/a-global-tour-of-top-investigative-podcasts-the-2020-edition/
    Call for proposals for ConINT (@conint)_io: https://twitter.com/CONINT_io/status/1306676769718706181
    Database of industrial designs data: https://twitter.com/navlys_/status/1306333649877504000
    How to use industrial designs data for OSINT: https://keyfindings.blog/2020/05/03/using-the-wipo-ip-portal-for-osint/

    • 55 min
    Episode 42: New Facebook design, creating sock puppets, Redditor, OSINT on Telegram, WhatsMyName Update

    Episode 42: New Facebook design, creating sock puppets, Redditor, OSINT on Telegram, WhatsMyName Update

    Welcome back!
    We are back with a brand new episode after our one-month summer break! In this week’s episode, we catch up with the latest OSINT news, as usual!

    People in this Episode

    Micah Hoffman (@webbreacher)
    Nico Dekens (@Dutch_osintguy)
    Lorand Bodo (@LorandBodo)
    Sector035 (@Sector035)
    Technisette (@technisette)
    Rae Baker (@wondersmith_rae)

    What we discussed

    A big thank you to all our sponsors and Patreon patrons who have been supporting us! 
    Learn how to create a sock puppet account for your OSINT investigations here
    Learn about the main differences between the old and new Facebook design here
    Check out this new OSINT tool, called Redditor. It’s similar to Tweetdeck but just for Reddit
    Need some new OSINT resources? Then check out this amazing collection
    Dutch's talk about leveraging Telegram for OSINT purposes
    Sinwindie’s attack surface for Twitter. For similar flow charts, click here
    Interested in detecting deep fakes? Microsoft has launched a new tool to detect them
    Here’s a great thread about some of the most popular dark net markets. Get free and daily updates about new dark net sites
    Update about PimEye – a facial search engine
    Wanna track ‘dictators’? Check out this website that tracks aircraft associated with specific countries
    New updates for SentinelHub
    Also new updates for WhatsMyName – a username search engine developed by Micah in collaboration with OSINTCombine and many others. 
    Search for 393+ million US court records on JudyRecords
    Practice OSINT and work on real cases. Tracelabs has announced monthly OSINT Search Party CTFs!

    Self Promotion

    Micah will be at the OSINT Symposium in Australia and OSMOSISCon in October
    Rae will be presenting at the Bsides conference in Copenhagen on 18/19 September
    Lisette will be presenting at OSMOSISCon in October – check out her new website too

    • 57 min
    Episode 41: Special Guest Ines Narciso, video search tool Peteyvid, estimating crowd sizes, and more on facial recognition (even for dogs)

    Episode 41: Special Guest Ines Narciso, video search tool Peteyvid, estimating crowd sizes, and more on facial recognition (even for dogs)

    Special Guest

    Inês Narciso (@IWN_LX) – Ines worked in the Portuguese Intelligence Service for 12 years. She started up doing OSINT in 2008 and later became an OSINT and online undercover operations project manager. In 2019, she joined Iscte Iul a Lisbon University where she teaches Digital Methods and conducts research on disinformation. Since then, she’s also built a company that uses OSINT to find people’s ancestors and build family trees. In her spare time, she also helps pro bono fellow journalists in Portugal and abroad in their investigations and women who have been a victim of revenge porn or intimate image abuse.

    People in this Episode


    Micah Hoffman (@webbreacher)
    Nico (@DutchOSINTGuy)
    Matthias Wilson (@mwosint)
    Nixintel
    Lorand Bodo
    Sector035
    Ritu Gill (@OSINTTechniques)

    Links to what we discussed


    Protecting personal privacy against unauthorized deep learning models: https://sandlab.cs.uchicago.edu/fawkes/
    Search for videos across 60 platforms: https://www.peteyvid.com/
    Estimate the size of a crowd with this tool: https://www.mapchecking.com/
    Twitter thread about the video conferencing platform Zoom: https://twitter.com/securitytrails/status/1284187387103457282
    Great verification case study in French: https://ledesk.ma/desintox/le-bonimenteur-de-habanos-sa-encore-frappe-il-sest-paye-un-panama-paper/
    Twitter search tricks: https://www.labnol.org/internet/twitter-search-tricks/13693/
    Improved face detection software that even works on animals: https://www.omgubuntu.co.uk/2020/07/digikams-improved-face-detection-for-photos-even-works-on-animals
    Blog that has started dropping “0Days” with regards to the TOR project: https://www.hackerfactor.com/blog/index.php?/archives/888-Tor-0day-Stopping-Tor-Connections.html
    New Telegram update: https://telegram.org/blog/profile-videos-people-nearby-and-more
    Upcoming virtual OSINT Symposium between 10 and 13 October: https://www.osintsymposium.com/event-details/australian-osint-symposium-1

    Self Promotion


    Learn more about Ines’s work: https://medialab.iscte-iul.pt/ (in Portuguese with some English articles)
    The Open Source Intelligence Skills-building Conference (October 2020): https://www.osmosiscon.com/
    German Open Source Intelligence Conference (GOCON): https://www.gosintcon.de/ – if you have any questions, reach out to Matthias (@mwosint)

    • 59 min
    Episode 40: Geolocating IPs and mobile phones, PimEye, 3D reconstruction of facial images and more...

    Episode 40: Geolocating IPs and mobile phones, PimEye, 3D reconstruction of facial images and more...

    People in this Episode


    Micah Hoffman (@webbreacher)
    Matthias Wilson (@mwosint)
    Nixintel
    Technisette
    Baywolf88

    Links to what we discussed


    https://www.instagram.com/hushpuppi/?hl=en Big phishing criminal Hushpuppi arrested in Dubai. His Instagram account was well-known for flaunting his wealth. Allowed investigators to track his movements and identify his financial assets.
    https://pimeyes.com/en/ Matches facial images from across the web
    https://keyfindings.blog/2020/07/01/saving-images-from-google-maps-and-street-view/ Getting photo sphere images from Google Maps using developer tools
    https://nixintel.info/osint/geolocating-mobile-phones-with-an-ip/ Gives insight on the locations of IP adresses
    https://twitter.com/SebMeineck/status/1281577528164003841 PimEye reaction to a recent article (https://netzpolitik.org/2020/pimeyes-face-search-company-is-abolishing-our-anonymity/), now you can’t upload a pic anymore. You can only allow PimEye access to your camera
    https://pskreporter.info/pskmap Shows ham radio operators (with call sign and location) worldwide. Might be useful is ever working on a case involving ham radios
    https://twitter.com/LorandBodo/status/1281606517825974273 This website allows users to create a 3d reconstruction from a single image. super useful for osint investigations.
    https://medium.com/@CassiusXIII Guide to corporate OSINT recon
    https://keyfindings.blog/2020/07/12/how-to-geolocate-mobile-phones-or-not/ Follow-up on the IP geolocation article
    https://medium.com/analytics-vidhya/who-where-whomwith-wwww-a-facial-recognition-tool-for-image-based-data-gathering-and-graph-dd8f2b13c279
    https://www.reddit.com/r/videos/comments/fxgi06/not_new_news_but_tbh_if_you_have_tiktiok_just_get/fmuko1m/?context=1 TikTok mobile app security issues and how they may impact your investigations.

    Self Promotion


    Micah Hoffman, Nico Dekens & John TerBush: SANS SEC487 Open-Source Intelligence (OSINT) Gathering & Analysis. Several options for Live Online & In Person

    • 1 hr 4 min
    Episode 39: Ibexmind with Peter King, Twitter history, aircraft and drone monitoring, TraceLabs OSINT Virtual Machine and more...

    Episode 39: Ibexmind with Peter King, Twitter history, aircraft and drone monitoring, TraceLabs OSINT Virtual Machine and more...

    People in this Episode


    Micah Hoffman (@webbreacher)
    Nico Dekens (@dutch_osintguy)
    Rae Baker (@wondersmith_rae)
    Nixintel
    Ginsberg5150
    Special Guest: Peter King (@ibexmind) additional info: https://ibexmind.com/

    Links to what we discussed


    https://spoonbill.io/ Shows historic profile and pinned tweet changes for Twitter accounts.
    https://radar.freedar.uk/VirtualRadar/desktop.html Aircraft monitoring site but includes military/drones too.
    https://www.inquirer.com/news/philly-protests-arrests-fbi-lore-elisabeth-blumenthal-george-floyd-20200617.html Good OSINT case study, using social media to ID suspect
    https://citizenevidence.org/2020/06/26/investigating-infrastructure-links-with-passive-dns-and-whois-data/ Explains how to use OSINT to investigate a website, very beginner friendly
    https://www.tracelabs.org/trace-labs-osint-vm/ Trace Labs OSINT VM
    https://www.sans.org/webcasts/tech-tuesday-workshop-introduction-osint-video-image-verification-115875/ Nico’s free SANS image verification workshop
    https://www.youtube.com/channel/UCynWOUeHAOflEQtJnrZpkNA/videos Layer8 OSINT and Social Engineering conference videos are posted
    https://www.youtube.com/watch?v=-Psyw3ADNvo&feature=youtu.be Sector035’s Google Dorking 10 minute tip
    https://www.osintcombine.com/post/download-social-media-videos-without-tools OSINTCombine’s blog post on using the web developer tools in web browsers to download videos on several social media platforms
    https://twitter.com/TraceLabs/status/1273950482214641665 Trace Labs has renamed their Missing CTF to OSINT Search Party CTF and is doing monthly global events!
    https://www.npr.org/sections/health-shots/2017/04/09/523011446/how-playing-tetris-tames-the-trauma-of-a-car-crash?t=1593371114814 How Playing Tetris helps Tame Trauma

    Self Promotion


    Micah Hoffman, Nico Dekens & John TerBush: SANS SEC487 Open-Source Intelligence (OSINT) Gathering & Analysis. Several options for Live Online & In Person
    Several Online workshops at dutchosintguy.com

    • 55 min

Customer Reviews

4.6 out of 5
11 Ratings

11 Ratings

StephenAHart ,

Learning Lots

Thanks for introducing me to OSINT. Enjoying your conversations and insights. ~Stephen H

Matt Zimm ,

Brilliant

All things OSINT! Love it thank you!

Top Podcasts In Technology

Listeners Also Subscribed To