From first usernames to full-stack contributions.From beginner-friendly handle hunting to AI-assisted tool-building, this episode covers everything from Issue 84 and 85 of The OSINT Newsletter.In the seventh episode of the rebooted OSINT Podcast, host @jakecreps breaks down two back-to-back issues: one focused on the fundamentals of username OSINT for new investigators, and another on how to use AI to improve and contribute to open-source OSINT tools.Highlights include:š§ Username OSINT That Goes Beyond Tools ā how to search, pivot, and build identity profiles using nothing but usernames and logic.š” Generating Variants ā predictable patterns, heuristics, and how to use AI to automate your variant lists.šµļø Pivoting Like a Pro ā following digital breadcrumbs from handle ā profile ā email ā employer ā full identity.āļø Contributing to Free OSINT Tools Using AI ā fixing bugs, adding features, and building interfaces directly in VS Code.ā” OPSEC and AI ā why your prompts can be subpoenaed, and how to protect your workflow.š°ļø Tools to Try Now ā BF Database Search, GeoVLM, and WebRecon for real-world recon and geolocation.š OSINT Tips for China ā Justen Chartersā method for tracking Chinese infrastructure companies overseas.š¬ OSINT for Bad ā understanding how open data can be weaponised, and why ethical tradecraft matters more than ever.Each segment builds on the last ā showing how curiosity, caution, and a few lines of AI-assisted code can take your investigations to the next level.References:* Username OSINT That Goes Beyond Tools (Issue 84)* Contributing to Free OSINT Tools Using AI (Issue 85)* BF Database Search | GeoVLM | WebRecon* OSINT Tips for China | OSINT for Bad | DHS Prompt Warrant Story Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
Episode 4 ā From Conflicts to Council Records: Lessons for Investigators
From dodging misinformation to archiving video and testing LLM geolocation, this episode unpacks the latest tactics and tradecraft shaping open-source investigations.In the fourth episode of the rebooted OSINT Podcast, host Jake Creps explores how OSINT is being used - and misused - across todayās information landscape. This instalment highlights new tools, recent community research, and practical case studies that show how to adapt your methods in a fast-changing environment.Highlights include:š° A Guide To Monitoring Conflict Amidst a Sea of Misinformation ā how investigators separate signal from noise when tracking warfare online. šµļø Private Investigator Case Studies: How We Find the Unfindable ā ten concise examples of creative approaches from professional PIs. š Trillions of Posts Go Dark on Facebook ā Hereās Your Flashlight ā lessons in building redundancy when platforms change or go offline. š„ YouTube Video Finder ā a tool that aggregates archives to recover lost content and metadata. š GeoIntel ā experimenting with LLMs to bulk-check and narrow down geolocation candidates. š Council Meeting Transcript Search ā making static datasets more accessible with smarter search.Each segment highlights practical ways OSINT practitioners can sharpen their methods, while also showing the risks and limits of open-source intelligence.References:* A Guide to Monitoring Conflict Amidst a Sea of Misinformation* Private Investigator Case Studies* Trillions of Posts Go Dark on Facebook* YouTube Video Finder* GeoIntel* Council Meeting Transcript Search Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
-------- Ā
33:08
--------
33:08
Episode 3 ā The Dark Side of OSINT: Influence Ops and Exploits