Powered by RND
PodcastsEnsinoThe OSINT Podcast

The OSINT Podcast

Jake Creps
The OSINT Podcast
Último episódio

Episódios Disponíveis

5 de 5
  • Episode 4 – From Conflicts to Council Records: Lessons for Investigators
    From dodging misinformation to archiving video and testing LLM geolocation, this episode unpacks the latest tactics and tradecraft shaping open-source investigations.In the fourth episode of the rebooted OSINT Podcast, host Jake Creps explores how OSINT is being used - and misused - across today’s information landscape. This instalment highlights new tools, recent community research, and practical case studies that show how to adapt your methods in a fast-changing environment.Highlights include:📰 A Guide To Monitoring Conflict Amidst a Sea of Misinformation – how investigators separate signal from noise when tracking warfare online. 🕵️ Private Investigator Case Studies: How We Find the Unfindable – ten concise examples of creative approaches from professional PIs. 🔁 Trillions of Posts Go Dark on Facebook – Here’s Your Flashlight – lessons in building redundancy when platforms change or go offline. 🎥 YouTube Video Finder – a tool that aggregates archives to recover lost content and metadata. 🌍 GeoIntel – experimenting with LLMs to bulk-check and narrow down geolocation candidates. 📂 Council Meeting Transcript Search – making static datasets more accessible with smarter search.Each segment highlights practical ways OSINT practitioners can sharpen their methods, while also showing the risks and limits of open-source intelligence.References:* A Guide to Monitoring Conflict Amidst a Sea of Misinformation* Private Investigator Case Studies* Trillions of Posts Go Dark on Facebook* YouTube Video Finder* GeoIntel* Council Meeting Transcript Search Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
    --------  
    33:08
  • Episode 3 – The Dark Side of OSINT: Influence Ops and Exploits
    Tools, tactics, and investigations that show both the power and the risks of open-source intelligence.In the third episode of the rebooted OSINT Podcast, host Jake Creps explores a mix of new tools and hard-hitting case studies that highlight how investigators can find, process, and analyse information at scale. From browser extensions that reveal hidden metadata to frameworks that structure analysis, this episode dives into the cutting edge of OSINT tradecraft.Highlights include:* 🔎 VSCO SPY – a Chrome extension that reveals hidden metadata on VSCO photos, including geolocation, device details, and timestamps.* 🕵️ Shodan-hash – a CLI tool for pivoting on favicons, headers, and HTML to uncover related infrastructure.* 🎥 TikSpyder – a clever tool that combines Google search with Apify to make TikTok easier to investigate.* 🌍 West Papua bot network – how investigators exposed a $300,000 influence operation using only free OSINT tools.* 🧩 The Analytical Hierarchy of OSINT – why structure matters, and how to turn raw data into actionable intelligence.* ⚠️ Malicious uses of OSINT – how cybercriminals weaponise public data for attacks, from Sony Pictures to MGM and beyond.Each segment unpacks how these methods work in practice, what risks they highlight, and how OSINT practitioners can adapt their own investigations accordingly.Sources & Links:* Full show notes and newsletter: OSINTNewsletter.com/79* VSCO SPY – Chrome Extension* Shodan-hash CLI* TikSpyder – GitHub* West Papua Bot Network* The Analytical Hierarchy of OSINT* Malicious Uses of OSINT Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
    --------  
    24:44
  • Episode 2 – Scraping Smarter: AI Agents, Tattoos, & Hidden Data
    In the second episode of the rebooted OSINT Podcast, host Jake Creps spotlights some of the most inventive tools and recent case studies reshaping open-source investigations. From tattoo recognition datasets to AI-driven scraping, this episode dives deep into how practitioners can sharpen their tradecraft with the latest resources.Highlights include:* 🔍 Meawfy – the most advanced crawler for searching Mega.nz, surfacing everything from open-source software to hidden educational troves.* 🤖 Parse.bot – an AI-powered scraping tool that instantly turns any website into a structured API.* 🕵️ Tattoodo as a biometric dataset – why tattoos could become the next frontier in image-based investigations.* ⚡ Agent.ai – a growing library of task-specific AI agents, including a Company Research Agent that pulls instant org intel.* 📍 Instagram’s Snap Map-like feature – how quiet location updates in DMs can reveal where someone lives or travels.* 📧 Validating Gmail addresses ethically – using Calendar embeds to check if burner accounts are real.* 🈺 Phishing with Japanese characters – a subtle but dangerous trick exploiting punycode and lookalike symbols in URLs.Jake unpacks what each of these means for investigators, how they might be applied in practice, and what risks they raise for both privacy and security.Sources & Links:* Full show notes & newsletter: OSINTNewsletter.com/78* Meawfy* Parse.bot* Tattoodo OSINT– Aidan Raney * Agent.ai* Instagram’s New Map Tool* Gmail Validation Tips – Yoni * Japanese Character Phishing – Michel Coene / JAMESWT Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
    --------  
    26:34
  • Episode 1 – OSINT in Action: From Counterterrorism to Chinese Content
    Listen to the podcast on Spotify, Apple Podcasts, or on Substack. In the first episode of the rebooted OSINT Podcast, host Jake Creps dives into the latest trends, tools, and investigations shaping open-source intelligence. Topics include OSINT’s role in counterterrorism, monitoring Chinese content for geopolitical insights, the risks of publicly indexed ChatGPT conversations, and creative pivots like SoundCloud-to-YouTube tracking. Jake also explores practical tools, from bookmarklets to geolocation training, and how AI-powered setups like VS Code + Copilot can supercharge investigations.Sources & Links:Full show notes & newsletter: OSINTNewsletter.com/77* Op-Ed: David Cook – How Publicly Available Clues Could Thwart the Next Lone Actor Terror Attack (https://washingtonreporter.news/p/op-ed-david-cook-how-publicly-available)* Investigating Chinese Content for OSINT – Justin Charters (https://www.linkedin.com/posts/justen-charters-1b99a953_chinese-osint-tips-1-belt-and-road-activity-7354278158306566144-p7Xz/)* ChatGPT Public Conversations Indexed on Google – Oliver Molander(https://www.linkedin.com/posts/olivermolander_artificialintelligence-activity-7356621639284862976-jlEL/)* New OSINT Bookmarklets from My OSINT Training – Micah Hoffman* BandLab: https://www.linkedin.com/posts/micahhoffman_another-osint-bookmarklet-this-bandlab-user-activity-7353427318880538625-cjsC/* TikTok: https://www.linkedin.com/posts/micahhoffman_extract-dates-from-tiktok-urls-with-click-activity-7353086892084482048-dkJh/* TraceTracks (https://github.com/Oblivios/TraceTracks)* GeoHints (https://geohints.com/) Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
    --------  
    30:05
  • The OSINT Podcast is back! (Trailer)
    We’re returning with sharper insights, deeper investigations and the same mission as before: keeping you ahead of the curve in open source intelligence. Join Jake Creps every fortnight for episodes bringing you the latest in tools, tactics and investigations, with some extra special guests lined up to share their expertise and insights.🔎 Follow the OSINT Podcast:X / Twitter: https://x.com/osintpodcastLinkedIn: https://www.linkedin.com/company/osint-podcast/ Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
    --------  
    0:44

Mais podcasts de Ensino

Sobre The OSINT Podcast

OSINT news, tools, tactics, and techniques. osintnewsletter.com
Site de podcast

Ouça The OSINT Podcast, Podcasts do Clóvis e muitos outros podcasts de todo o mundo com o aplicativo o radio.net

Obtenha o aplicativo gratuito radio.net

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções
Aplicações
Social
v7.23.9 | © 2007-2025 radio.de GmbH
Generated: 9/28/2025 - 8:07:45 PM