top of page

Search


An introduction to OSINT and III.
OSINT and III are acronyms that come from the Intelligence community, originating from national security and law enforcement...

Steve Adams
Dec 8, 20206 min read
1,824 views


A guide to participating in a Trace Labs Global OSINT Search Party CTF.
Trace Labs is a nonprofit organisation designed to help locate missing persons through crowdsourced OSINT.

Steve Adams
Jul 15, 202013 min read
2,503 views


A 5-minute guide to creating a covert account for Internet Investigations (OSINT).
Trained internet investigators and researchers are allowed to create ‘false persona’ or covert accounts to assist covert investigations.

Steve Adams
Jun 8, 20207 min read
8,612 views


The 5-minute guide to the intelligence grading process and its application in OSINT
Intelligence needs to be graded so that individuals can have the confidence to rely on it.

Steve Adams
May 20, 20205 min read
18,984 views


Searching LinkedIn by Location: Everything you need to know.
2020 has brought a number of changes to LinkedIn. The interface is identical, so you would be forgiven for not noticing, particularly...

Steve Adams
May 13, 20205 min read
5,169 views


The importance of OSINT training and a written policy in an organisation.
A recent survey of 338 Cyber Threat Intelligence analysts and practitioners highlighted a prevalent lack of OSINT training in the industry.

Steve Adams
May 6, 20204 min read
442 views


A guide to searching LinkedIn by email address
Searching LinkedIn for any accounts linked to an email address is a valuable tool for any OSINT practitioner.

Steve Adams
Apr 8, 20202 min read
28,841 views


An overview of the viral speculation of a hack of the Houseparty app.
The team behind the app Houseparty, which has become a lockdown phenomenon, has announced a $1 million bounty for proof that recent rumours

Steve Adams
Mar 31, 20203 min read
129 views


A guide to OSINT Investigation and Research on TikTok.
How to conduct OSINT Research and Investigations on TikTok, to identify users and extract data for evidential presentation.

Steve Adams
Nov 13, 20196 min read
11,319 views
bottom of page