Open Source Intelligence Tools and Resources Handbook 2020

Total Page:16

File Type:pdf, Size:1020Kb

Open Source Intelligence Tools and Resources Handbook 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 Aleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetis 2 Foreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Such arguments are not without merit. My fear, however, is that they are also shortsighted. I offer four reasons why. To begin, a shortlist betrays the widening spectrum of OSINT practice. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. A limited toolkit can never satisfy all of these constituencies. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Indeed, the right tool can determine whether you harvest the right information. It follows that the more tools you have in your portfolio, the more flexible your OSINT capabilities are likely to be. Finally, the process of compiling this handbook is an intelligence exercise in its own right, alerting us to where we are at as a community and the challenges we are likely to face going forward – not least of which are disinformation, the fracturing of the internet, the proliferation of niche social media platforms, and the urgent need for better tools to monitor and analyse the content they provide. Our hope is that this Handbook helps you plug any gaps in your collection efforts and alerts you to the many tools and resources you can consult for better intelligence, including on the discipline of OSINT itself. Of course, the Handbook makes no claim to being complete. Something new will doubtless pop-up tomorrow, and I suspect there are hundreds of tools we haven’t even come across at all. With your help, we can address any omissions. In any event, the usual caveats apply. While every effort has been made to test and validate these resources, we caution that today’s wonder tool may be tomorrow’s security liability. Thus, whenever testing a new script, application or browser extension, please do so in a secure environment to minimise any risk to your assets or operations. 3 I would like to thank my colleagues at i-intelligence for their efforts in compiling this Handbook. Much of the credit belongs to Aleksandra Bielska who, as our Head of Training, evaluates hundreds of tools every year to determine which ones make it into our courses. I am also indebted to Yves Baumgartner and Vytenis Benetis for routinely updating us on new solutions. Thanks too are also due to Noa Kurz who worked tirelessly over the summer to help us get this document ready. I close by acknowledging the contributions of the many students, practitioners and Twitter followers we’ve interacted with over the past two years. Your generosity, insights, suggestions and support are much appreciated. Chris Pallaris Director, i-intelligence GmbH 4 Table of Contents Foreword ............................................................................................................................. 3 Search Tools ..................................................................................................................... 17 General Search .......................................................................................................................... 17 Meta Search ............................................................................................................................... 18 Visual Search and Clustering Search Engines ......................................................................... 20 Decentralised Search Engines .................................................................................................. 21 Charitable Search Engines ........................................................................................................ 22 Code Search .............................................................................................................................. 23 File and FTP Search ................................................................................................................... 25 Open Database, Directories and Services Search .................................................................. 26 Similar Sites Search ................................................................................................................... 27 Children-Friendly Search Engines ............................................................................................ 28 National Search Engine Directories ......................................................................................... 29 Custom Search ........................................................................................................................... 30 Specialty Search Engines .......................................................................................................... 31 Search Tools ............................................................................................................................... 32 Social Media ..................................................................................................................... 34 Major Social Networks .............................................................................................................. 34 Social Media Search and Monitoring ...................................................................................... 37 Working with Hashtags ............................................................................................................. 39 Finding Influencers and Other Social Media Users ................................................................ 41 Social Media Management and Content Discovery ............................................................... 42 Social Media Analytics .............................................................................................................. 43 Social Media Tools: Twitter ...................................................................................................... 44 Social Media Tools: Facebook ................................................................................................. 49 Social Media Tools: Instagram ................................................................................................. 51 5 Social Media Tools: Pinterest ................................................................................................... 55 Social Media Tools: Reddit ....................................................................................................... 56 Social Media Tools: Voat .......................................................................................................... 59 Social Media Tools: VKontakte ................................................................................................. 60 Social Media Tools: LinkedIn .................................................................................................... 61 Social Media Tools: Github ...................................................................................................... 63 Social Media Tools: TikTok ....................................................................................................... 65 Messaging and Chat Tools ....................................................................................................... 66 Social Media Tools: Snapchat .................................................................................................. 68 Social Media Tools: WhatsApp ................................................................................................ 69 Social Media Tools: Skype ........................................................................................................ 70 Social Media Tools: Kik ............................................................................................................. 71 Social Media Tools: Telegram .................................................................................................. 72 Social Media Tools: IRC ............................................................................................................ 74 Dating Apps and Sites .............................................................................................................. 75 Fitness Apps and Communities ............................................................................................... 76 Working with Blogs .......................................................................................................... 77 Blog Search ...............................................................................................................................
Recommended publications
  • Document Management System Design Architecture for Interdepartmental Organization
    Date September 2009 Page/of 1/487 Document Management System design architecture for interdepartmental organization H. Safari Asl 1063405 Y.F. Tang 1107860 Master Thesis Honeywell B.V & Department: Information Architecture Faculty: Electrical Engineering, Mathematics and Computer Science, Delft University of Technology Date: September 2009 Date September 2009 Page/of 2/487 Document Management System design architecture for interdepartmental organization Authors: H. Safari Asl, BSc, Student nr: 1063405, Email: [email protected] Y.F. Tang, BSc, Student nr: 1107860, Email: [email protected] MSc presentation: 16 December 2009 Graduation committee Prof.dr.ir. J. L.G. Dietz(Chair) Electrical Engineering, Mathematics and Computer Science Department 2: Software Technology Web Information Systems Dr.ir. Jan van den Berg(Member) Technology, Policy and Management Infrastructures, Systems and Services Section Information & Communication Ir. Bernard Sodoyer(Supervisor) Electrical Engineering, Mathematics and Computer Science Department 2: Software Technology Web Information Systems Date September 2009 Page/of 3/487 Table of Contents List of tables .......................................................................................................................................... 4 List of figures ......................................................................................................................................... 5 List of appendix .....................................................................................................................................
    [Show full text]
  • Opera Mini Application for Android
    Opera Mini Application For Android Wat theologized his eternities goggling deathy, but quick-frozen Mohammed never hammer so unshakably. Fain and neverfringillid headline Tyrone sonever lambently. reapplied his proles! Tracie meows his bibulousness underdevelop someplace, but unrimed Ephrayim This application lies in early on this one knows of applications stored securely for example by that? Viber account to provide only be deactivated since then. Opera Mini is a super lightweight browser that loads web pages faster than what every other browser available. Opera Mini Browser Latest News Photos Videos on Opera. The Opera Mini for Android lets you do everything you any to online without wasting your fireplace plan It's stand fast safe mobile web browser that saves you tons of. Analysis of tomorrow with a few other. The mini application for opera android open multiple devices. Just with our site on a view flash drives against sim swap scammers? Thanks for better alternative software included in multitasking is passionate about how do you can browse, including sms charges may not part of mail and features. Other download option for opera mini Hospedajes Mirta. Activating it for you are you want. Opera mini 16 beta android app has a now released and before downloading the read or full review covering all the features here. It only you sign into your web page title is better your computer. The Opera Mini works the tender as tide original Opera for Android This app update features a similar appearance and functionality but thrive now displays Facebook. With google pixel exclusive skin smoothing makeover tool uses of your computer in total, control a light.
    [Show full text]
  • Affinity Photo-Digikam Summer 2020
    UCLA Research Workshop Series Summer 2020 Affinity Photo & digiKam Anthony Caldwell What is Affinity Photo? Wikipedia: Affinity Photo is a raster graphics editor Serif: If you could create your own photo editing software, it would work like this. What is digiKam? Wikipedia: digiKam is a free and open-source image organizer and tag editor digiKam: digiKam is an advanced open-source digital photo management application that provides a comprehensive set of tools for importing, managing, editing, and sharing photos and raw files. Color Color Space Wikipedia: A color space is a specific organization of colors. In combination with physical device profiling, it allows for reproducible representations of color, in both analog and digital representations. Color depth The human eye can distinguish around a million colors Color depth 1-bit color 2 colors 2-bit color 4 colors 3-bit color 8 colors 4-bit color 16 colors 5-bit color 32 colors 8-bit color 256 colors 12-bit color 4096 colors High color (15/16-bit) 32,768 colors or 65,536 colors True color (24-bit) 16,777,216 colors Deep color (30-bit) 1.073 billion 36-bit approximately 68.71 billion colors 48-bit approximately 281.5 trillion colors Note: different configurations of software and hardware can produce different color values for each bit depth listed Color Space Commission internationale de l’éclairage 1931 color space Image Source: https://dot-color.com Color Space Additive color mixing Image Source: https://en.wikipedia.org Color Space K Subtractive color mixing Image Source: https://en.wikipedia.org Color Space The Lab Color Space Image Source: https://docs.esko.com/ Color Space Color Space Comparison Image Source: https://www.photo.net Affinity Photo and digiKam… Questions? Anthony Caldwell UCLA Digital Research Consortium Scholarly Innovation Labs 11630L Charles E.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • The Publishing Plan
    NONFICTIONTHE BOOK PUBLISHING PLAN THE PROFESSIONAL GUIDE TO PROFITABLE SELF-PUBLISHING STEPHANIE CHANDLER KARL W. PALACHUK Copyright © 2018 by Stephanie Chandler and Karl W. Palachuk. All rights reserved. No part of this publication may be reproduced, stored in a retrieval sys- tem, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, without the prior written permission of the author. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representa- tions or warranties with respect to the accuracy or completeness of the con- tents of this book and specifically disclaim any implied warranties of mer- chantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional when appropriate. Neither the publisher nor the author shall be liable for any loss of profit or any other commer- cial damages, including but not limited to special, incidental, consequential, personal, or other damages. The Nonfiction Book Publishing Plan The Professional Guide to Profitable Self-Publishing By Stephanie Chandler and Karl W. Palachuk 1. LAN027000 2. LAN002000 3. REF026000 Print ISBN: 978-1-949642-00-1 Ebook ISBN: 978-1-949642-01-8 Printed in the United States of America Authority Publishing 11230 Gold Express Dr. #310-413 Gold River, CA 95670 800-877-1097 AuthorityPublishing.com CONTENTS Chapter 1: The Business of Self-Publishing Nonfiction Books .
    [Show full text]
  • Assessing the Quality of Mobile Graphical User Interfaces Using Multi-Objective Optimization
    Noname manuscript No. (will be inserted by the editor) Assessing the Quality of Mobile Graphical User Interfaces using Multi-objective Optimization Makram Soui · Mabrouka Chouchane · Mohamed Wiem Mkaouer · Marouane Kessentini · Khaled Ghedira the date of receipt and acceptance should be inserted later Abstract Aesthetic defects are a violation of quality attributes that are symp-toms of bad interface design programming decisions. They lead to deteriorating the perceived usability of mobile user interfaces and negatively impact the Users eXperience (UX) with the mobile app. Most existing studies relied on a subjective evaluation of aesthetic defects depending on end-users feedback, which makes the manual evaluation of mobile user interfaces human-centric, time-consuming, and error-prone. Therefore, recent studies have dedicated their effort to focus on the definition of mathematical formulas that each targets a specific structural quality of the interface. As the UX is tightly dependent on the user profile, the combi-nation and calibration of quality attributes, formulas, and users characteristics, when defining a defect, is not straightforward. In this context, we propose a fully automated framework which combines literature quality attributes with the users profile to identify aesthetic defects of MUI. More precisely, we consider the mobile user interface evaluation as a multi-objective optimization problem where the goal is to maximize the number of detected violations while minimizing the detection complexity of detection rules and enhancing the interfaces overall quality in means M. Soui College of Computing and Informatics Saudi Electronic University, Saudi Arabia E-mail: [email protected] Mabrouka Chouchane School of computer science of Manouba, Tunisia E-mail: [email protected] Mohamed Wiem Mkaouer Rochester Institute of Technology E-mail: [email protected] Marouane Kessentini University of Michigan E-mail: [email protected] Khaled Ghedira Honoris United Universities E-mail: [email protected] 2 Makram Soui et al.
    [Show full text]
  • English Collocations in Use Intermediate Book with Answers
    McCarthy and O’Dell McCarthy and ENGLISH COLLOCATIONS IN USE Collocations are combinations of words, which frequently appear together. Using Intermediate them makes your English sound more natural. Knowledge of collocations is often tested in examinations such as Cambridge FCE, CAE, CPE and IELTS. This book is suitable for ENGLISH students at good intermediate level and above. Using collocations will improve your style of written and spoken English: ENGLISH • Instead of ‘a big amount’, say ‘a substantial amount’ • Instead of ‘think about the options’, say ‘consider the options’ COLLOCATIONS • Using collocations will make your English sound more natural: • Instead of ‘get ill’, say ‘fall ill’ COLLOCATIONS • Instead of ‘a bigCURRENT fine’, say ‘a BCC heavy TOO fine’ LONG Using collocationsFOR will helpNEW you DESIGN avoid common learner errors: How words work • Instead of ‘do a choice’, say ‘make a choice’ together for fluent • Instead of ‘make your homework’, say ‘do your homework’ IN USE and natural English English Collocations in Use Intermediate Self-study and • 60 easy-to-use two-page units: collocations are presented and explained IN USE on left-hand pages with a range of practice exercises on right-hand pages. classroom use • Presents and explains approximately 1,500 collocations in typical contexts Second Edition using short texts, dialogues, tables and charts. Also available • Contains a comprehensive answer key and full index for easy reference. CAMBRIDGE LEARNER’S DICTIONARY• FOURTHHighlights EDITION register to help students choose the appropriate language for ENGLISH VOCABULARY IN USE UPPER-INTERMEDIATEparticular situations. Intermediate ENGLISH PRONUNCIATION IN USE INTERMEDIATE • Informed by the Cambridge English Corpus to ensure that the most frequently used collocations are presented.
    [Show full text]
  • What Is a Podcast? the Term Podcast Comes from a Combination of Ipod and Broadcast
    What is a podcast? The term podcast comes from a combination of iPod and Broadcast. Thus, it is a broadcast that is created to be listened to on a digital device of some kind: iPod or other MP3 player, SmartPhone, iPad or other tablet, or computer. A podcast can be entertainment, music, drama, sermon, health, business, or other coaching information. It is an MP3 file just like any song that you may listen to – only much larger. When you subscribe to my blog, you can simply listen by clicking the Play button embedded in the blog post. However, you may want to listen away from your computer. You can subscribe to podcasts and have them automatically delivered to your MP3 player for you to listen to whenever you wish. Or you can go out and listen from a site like iTunes or Stitcher. If you have a SmartPhone or Tablet, you can install an app that will collect these podcasts for you. Subscribing in iTunes You must have an iTunes account and have iTunes on your device. Go to this link: https://itunes.apple.com/us/podcast/finding-your-groove-kathleen/id829978911 That will bring you to this screen Click the button that says “View in iTunes” That opens this window in iTunes Click the Subscribe button just underneath the photo. To share this podcast with someone else, click the drop-down arrow just to the right of the Subscribe button. That will give you these share options: Tell a Friend, Share on Twitter, Share on Facebook, Copy Link (allows you to manually e-mail someone).
    [Show full text]
  • Avast Browser Download Remove How to Uninstall Avast! Free Antivirus 8
    avast browser download remove How to Uninstall Avast! Free Antivirus 8. wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, volunteer authors worked to edit and improve it over time. This article has been viewed 37,797 times. Some avast! users encountered unexpected error like the "setiface error" while they tried to uninstall the latest version of avast! Free Antivirus software. To effectively troubleshoot such uninstall issue, we try the reinstallation as the system administrator and then reuse the Windows Uninstall (aka, avast!'s supplied uninstaller) to remove the free Anti-Virus program. Moreover, to fully remove the avast! Free Antivirus 8, you may also wish to get rid of the following optional software: the potentially unneeded Google Chrome, the Google Toolbar for Internet Explorer. Here is the complete tutorial on how on uninstall avast! FREE ANTIVIRUS 8.0.1489 FINAL for a Windows 8 computer. How to Uninstall Avast! Free Antivirus 8. wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, volunteer authors worked to edit and improve it over time. This article has been viewed 37,797 times. Some avast! users encountered unexpected error like the "setiface error" while they tried to uninstall the latest version of avast! Free Antivirus software. To effectively troubleshoot such uninstall issue, we try the reinstallation as the system administrator and then reuse the Windows Uninstall (aka, avast!'s supplied uninstaller) to remove the free Anti-Virus program.
    [Show full text]
  • OSINT) Analyst Overtly Passive / Covertly Active Surveillance / Reconnaissance Observation / Exploration Eye / Spy
    Open Source Intelligence (OSINT) Analyst Overtly Passive / Covertly Active Surveillance / Reconnaissance Observation / Exploration Eye / Spy PREFACE This deskside/pocket smartbook contains information to assist you, the open source intelligence analyst, in carrying out your research responsibilities in a Intelligence Oversightmanner that first of all adhere to intelligence oversight and follow the guide lines of AR 381-10, Executive Order 12333, and unit standard operating procedures (SOP). The second is to practice and implement effective operational security (OPSEC) measures during data and information collection activities online. A fine line exists between collection and acquisition, and examples will be pointed out throughout the handbook. This handout is not written specifically for the military active or passive OSINT Analyst but rather as an all-purpose guide for anyone doing research. The one big advantage for the passive OSINT Analyst is that it does not require interaction with the mark. Therefore, it poses little risk since it does not alert the target to the presence of the analyst. If a technique violates Intelligence Oversight and OPSEC, then common sense must take center stage. For those in the civilian community (law enforcement, journalists, researchers, etc.), you are bound by a different set of rules and have more latitude. One important thing to keep in mind is that when threats are mentioned the majority tend to think they are military in nature. We think of Iran, North Korea, and other countries with a military capability. That is not the case. Threats can be the lone wolf types, a disgruntled worker, someone calling in a bomb threat to a hospital, etc.
    [Show full text]
  • Free Your Android! Not Free As in Free Beer About the FSFE This flyer Was Printed by the Free Software You Don't Have to Pay for the Apps from F-Droid
    Free as in Freedom Free Your Android! Not Free as in Free Beer About the FSFE This flyer was printed by the Free Software You don't have to pay for the apps from F-Droid. A lot Foundation Europe (FSFE), a non-profit organi- of applications from Google Play or Apple's App Store sation dedicated to promoting Free Software Get a are also free of charge. However, Free Software is not and working to build a free digital society. about price, but liberty. Free App Store Access to software de- When you don't control a program, the program termines how we can take for Your Android controls you. Whoever controls the software therefore part in our society. There- controls you. fore, FSFE is dedicated to ensure equal access and For example, nobody is allowed to study how a non- participation in the infor- free app works and what it actually does on your mation age by fighting for phone. Sometimes it just doesn't do exactly what you digital freedom. want, but there are also apps that contain malicious features like leaking your data without your knowledge. Nobody should ever be forced to use software that does not grant the freedoms to use, Running exclusively Free Software on your device puts study, share and improve the software. You you in full control. Even though you may not have the should have the right to shape technology as skills to directly exercise all of your freedom, you you see fit. benefit from a vibrant community that is enabled by freedom and uses it collaboratively.
    [Show full text]
  • Typology of Free Web-Based Learning Technologies (2020)
    Typology of Free Web-based Learning Technologies (2020) Matt Bower Jodie Torrington Macquarie University, Australia Macquarie University, Australia E: [email protected] E: [email protected] Tw: @mattgbower Tw: @jtorro1 [The original 2015 Typology of Web 2.0 Technologies is available from the Educause website at https://library.educause.edu/resources/2015/2/a-typology-of-web-20-learning-technologies ] Abstract The Typology of Free Web-based Learning Technologies (2020) provides educators with a list of 226 technologies arranged into 40 types and 15 clusters that can be used via a browser to promote more productive and interactive learning. The 2020 Typology constitutes an update to the previously published Typology of Web 2.0 Learning Technologies (Bower, 2015), which was also based on a systematic search and categorical analysis (see Bower, 2016, for methodology). This 2020 Typology of Free Web-based Learning Technologies returns to the original analysis to remove tools that are no longer available and add new tools and categories that have entered the online learning ecosystem. Based on these emerging tools, new categorical types and clusters have also been added. Brief descriptions, example tools and pedagogical uses were provided for each category, in order to support ease of conceptualization and application. The analysis makes it possible to gauge trends in online learning technologies over the last five years, for instance the unsustainability of many smaller tools, the marketisation of many others, the trend towards more integrated platforms of tools, and greater dominance by larger providers. The paper concludes by inferring future trends in the online learning technology landscape.
    [Show full text]