š Welcome to the 92nd issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Hereās a summary of whatās in this issue:
-
Sharing sources and methods for high profile investigations
-
Privacy risks in mobile ad data
-
Automating large file analysis with AIWhisperer
-
A user friendly, beginner friendly OSINT tool directory
-
Behind the curtain on LLM inputs
-
Username OSINT with image extraction
šŖ If you missed the last newsletter, hereās a link to catch up.
ā” The Investigatorās Best Friend: OSINT With AI
Letās get started. ā¬ļø
š° Analysing Footage of Minneapolis ICE Shooting
If you caught the last episode of the podcast, I talked about sharing methods you used in high profile cases to help enrich the OSINT community. Hereās an example. No doxxing. Just sources and methods.
š© H/T: Jake Godin
š° Your Phone is a Tracking Device, and the Government (and Others) are Buying and Using the Data to Find You
A tale as old as time. Companies are getting a hold of your mobile information, often through advertisement networks and other mobile applications, aggregating it, and selling it to the government (or worse). If you arenāt familiar with this risk, read up on it here.
Read on Tateās Online Safety Communityā¦
š© H/T: Tate Jarrow
š° Introducing AIWhisperer. Feed massive files to AI with less data exposed
Iāve run into this problem; youāve run into this problem. You upload an attachment to your favorite LLM and it says the attachment is too large. You have to find a way to break it into smaller chunks. That sucks. Also, you have to redact information you donāt want uploaded to the cloud. AIWhisperer does both of these for you at the same time. Enjoy.
š© H/T: Henk Van Ess
š OSINT Investigatorās Toolkit
This is a beginner-friendly collection of OSINT tools that features both free and paid tools. Itās another directory; however, it has a search engine which makes tools easier to find. If youāre new to investigations, thereās a lot of staples here.
š LeakHub
Warning: This tool is pretty niche. If youāre curious about how LLMs work behind the scenes, LeakHub shows you the guidelines LLMs have to follow when fulfilling your request. The web page is missing an description but their GitHub page has more details. This is useful because the better you understand the inputs, the better you can control the outputs.
š© H/T: pliny
š The Big Brother
This is a username tool on steroids. Not only does it fetch profiles with matching usernames, it also extracts images from those profiles and provides you with search engine results for those images. Iād love to see this tool integrate OLlama for more analysis, though.
š© H/T: Chadi
š Missing Christmas Challenge
No one has solved last weeks CTF and so we will not be revealing the answers. This weeks challenge is a lot easier, a simple geolocation challenge.
šŖ If you missed the last CTF, hereās a link to catch up.
ā Thatās it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.
By upgrading to paid, youāll get access to the following:
ā” How I Discover New OSINT Methods
-
Follow along as I show you how I discover new methods both in collection and analysis. I have a heavy bias towards the former, though. Use these methods to build your own tools or use them for good like in missing persons investigations.
š All paid posts in the archive. Go back and see what youāve missed!
š If you donāt have a paid subscription already, donāt worry thereās a 7-day free trial. If you like what youāre reading, upgrade your subscription. If you canāt, I totally understand. Be on the lookout for promotions throughout the year.
šØ The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address.

