/ README.md
README.md
   1  <p align="center">
   2  <img width="auto" height="auto" alt="OSINT" src="./img/png/misc/OSINT.png" />
   3  </p>
   4  
   5  ----
   6  
   7  # Table of Contents
   8  
   9  
  10  1. [disclaimer](#disclaimer)
  11  2. [Suggestions](#Suggestions)
  12  3. [Why](#why)
  13  4. [OSINT/OPSEC Tools](#osintopsec-Tools)
  14     - [methodology](./markdown/methodology.md)
  15  5. [key points](#key-points)
  16  6. [OPSEC](#operations-security-is-a-systematic-process-for) 
  17     - [How to OPSEC](#how-to-opsec)
  18     - [Physical Security](./markdown/Physical-Security.md)
  19        - [disinformation](#disinformation) 
  20        - [scripts](./markdown/scripts.md) A collection of scripts from my gists
  21  7. [Open Source Intelligence (OSINT)](#open-source-intelligence-osint)
  22     - [Who uses Open-Source Intelligence (OSINT)?](#who-uses-open-source-intelligence-osint)
  23     - [Sources of OSINT](#sources-of-osint)
  24  8. [Digital Profiling](#digital-profiling-osint-profiling)
  25  9. [closed sourced](#closed-sourced-info)
  26        - [Breached Data](#breached-data)
  27        - [Curl commands](#curl-commands)
  28        - [CSINT](./markdown/CSINT.md)
  29  10. [IMINT](#imint)
  30      - [Reverse search](./markdown/IMINT.md#reverse-search-google)
  31      - [SOCMINT](./markdown/IMINT.md#socmint-social-intelligence)
  32  11. [Real world examples of OSINT](#real-world-examples-of-osint)
  33        - [2016 Airstrike Coordination](#in-the-year-2016-a-basket-weaving-image-board-used-osint-to-pay-some-supposed-terrorist-a-visit-from-a-govt-in-russia-resulting-in-airstrikes)
  34        - [2017 Shia LaBeouf Protest](#in-2017-shia-labeouf-had-a-protest-due-to-trumps-election-this-resulted-in-a-basket-weaving-image-board-using-osint-and-sky-patterns-to-figure-out-where-a-flag-is)
  35  12. [Tools](#tools)
  36        - [Toolchain Recommendations](#toolchain-recommendations)
  37  13. [People search tools (in the states)](#people-search-tools-in-the-states)
  38  14. [Grey literature](#grey-literature)
  39  15. [Breached Data](#breached-data)
  40  16. [Social Media](#social-media)
  41  17. [Curated lists](#curated-lists)
  42  18. [External Links](#external-links)
  43  19. [References](#references)
  44  
  45  ## ***DISCLAIMER***
  46  
  47  I am **not responsible** for any misuse, abuse, or unethical actions taken with the tools or methods listed here. **OSINT is a neutral technique** anyone can use it, and anyone can be targeted.
  48  
  49  **On a matter of privacy**
  50  
  51  > “Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know. Privacy is the power to selectively reveal oneself to the world.” (Hughes, 1993, para. 1)[^71]
  52  
  53  
  54  Also a forward to **YOU** the practitioners **of all kinds**:
  55  
  56  >Do not solely rely or depend on this guide alone, use various sources you may find out there on the Internet. Also see if in the **future*** there can be an AI that can gather info autonomously to supplement.
  57  
  58  Select quotes from Metal Gear Solid 2 Ending, which **inspired me to create this**.
  59  
  60  > "We've always kept records of our lives. Through words, pictures, symbols... from tablets to books... But not all the information was inherited by later generations ... in the current, digitized world, trivial information is accumulating every second, preserved in all its triteness. Never fading, always accessible. Rumors about petty issues, misinterpretations, slander... The digital society furthers human flaws and selectively rewards development of convenient half-truths."(GW, Metal Gear Solid 2)[^75]
  61  
  62  ## Suggestions
  63  
  64  Open an [issue](https://github.com/airborne-commando/OPSEC-OSINT-Tools/issues) for any suggestions or feedback.
  65  
  66  To update this guide use:
  67  ```
  68  git pull
  69  ```
  70  after cloning.
  71  
  72  ## Why?
  73  
  74  People trust the internet too much. In today’s world, online and offline are practically the same—truth and fiction blur. This README exists to raise awareness. Clone it, fork it, remix it, or even turn it into a [Rentry](https://rentry.co/) page. Spread the knowledge however you like.
  75  
  76  Clone the repo and it's submodules with:
  77  
  78      git clone --recurse-submodules
  79  
  80  and to update all the submodules
  81  
  82      git submodule update --remote --recursive
  83  
  84  These contain all the tools (or most of) inside the [submodules](https://github.com/airborne-commando/OPSEC-OSINT-Tools/tree/main/submodules) dir with this command.
  85  
  86  You may also just clone the repo with git clone and create empty submodules dirs to save space.
  87  
  88  This is easier for tool downloads and for other guides that may be of interest to you for offline use.
  89  
  90  Also this guide can help prevent issues such as doxing. The obvious way is to follow [Key-Takeaways](#Key-Takeaways) and use [people search tools](#people-search-tools-in-the-states) with a self audit to reduce the amount of info you have on yourself publicly[^66] [^50].
  91  
  92  Can you predict someone’s behavior with this? not exactly; people are unpredictable at times.
  93  
  94  Will also point out that some of the sources may be 404'd, use the [wayback machine](https://web.archive.org/) for a snapshot or [archive](https://archive.ph/).
  95  
  96  # OSINT/OPSEC Tools
  97  
  98  A list of OSINT/OPSEC tools I made, forked, and/or use.
  99  
 100  If you want some quick methodology I suggest you read this [markdown](./markdown/methodology.md).
 101  
 102  ## Key points
 103  
 104  ## Notable Examples of Bad Tor OPSEC
 105  
 106  - **School Bomb Threats**
 107      - Harvard’s Eldo Kim[^22] identified for using Tor on school network as the only user and admitting guilt.
 108  - **Silk Road Case**
 109      - Ross Ulbricht[^5] linked to Silk Road by using his real name/email, posting about Tor, and failing to hide server IPs. The laptop was basically seized according to the FBI.
 110  
 111  > "On Oct. 1, 2013, an F.B.I. operation in a public library in San Francisco ended with the arrest of Ross Ulbricht, who was the brain behind Silk Road... At that moment, another agent took the open laptop while logged into the Silk Road administrator's panel" (Oliyaee, 2024, para. 2).[^60]
 112  
 113  >"ULBRICHT created Silk Road in January 2011, and owned and operated the underground website until it was shut down by law enforcement authorities in October 2013" <br>(U.S. Department of Justice, 2015, para. 1).[^5]
 114  
 115  >"The FBI arrested Ulbricht and seized his laptop on October 1, 2013. A judge sentenced Ulbricht to life in prison for drug trafficking, computer hacking, and money laundering in 2015" (FBI, n.d., para. 2).[^59]
 116  
 117  >"In 2015, Ulbricht was sentenced to life in prison but was pardoned in 2025" (Reiff, 2025, para. 3).[^61]
 118  
 119  Ross was pardoned[^62] [^70] in 2025 by the trump administration.
 120  
 121  - **LulzSec Hacking Group**
 122      - Members exposed themselves by discussing ops in public IRC[^56] [^58] [^21] [^20], revealing personal info, using stolen cards[^57] to home addresses, and trusting informants.<br>
 123  
 124  >"Spitler admitted to communicating during the data breach with his co-defendant, Andrew Auernheimer, 25, who was arrested January 18, 2011, in Fayetteville, Ark., while appearing in state court on unrelated drug charges. The two wrote each other during the breach using Internet Relay Chat, an Internet instant messaging program. Those chats included discussions between Spitler, Auernheimer, and other Goatse Security members about the best way to take advantage of the breach and associated theft" <br>(Federal Bureau of Investigation, 2012).[^57]
 125  
 126  - **General Bad OPSEC Practices**
 127      - Poor compartmentalization, leaking sensitive info, predictable naming, traceable work hours, and unsecured servers.
 128  - **Mullvad VPN: Security Contrast**[^2] [^3]
 129      - Features: anonymous accounts, strong encryption, no-logs, lockdown mode, DNS blockers, open-source, accepts Monero/cash and is independently audited[^64] [^65] [^63].
 130      
 131  > [!CAUTION] 
 132  > No tool is foolproof; human error remains the weakest link.
 133  
 134  
 135  ## Digital Profiling and Behavioral Analysis Guide
 136  
 137  - **Understand the Basics**
 138      - Digital profiling gathers and analyzes online data; behavioral analysis infers motives, habits, and future actions.
 139  - **Collect Digital Biographical Information**
 140      - Gather identifiers, track online activity, search for recurring usernames, document findings.
 141  - **Analyze Behavioral Patterns**
 142      - Look for posting times, topics, language, interaction style, preferred platforms, and social networks.
 143  - **Examples**
 144      - Use AI tools to analyze old posts for recurring interests; tools like Blackbird/Maigret help track usernames across platforms.
 145  - **Assess Competencies and Affinities**
 146      - Evaluate technical skill, privacy awareness, sociability, and domain expertise.
 147  - **Use Analytical Tools**
 148      - Employ search engines, data aggregators, visualization/statistics tools and Natural Language Processing (NLPs) for deeper analysis.
 149  - **Iterate and Refine**
 150      - Continuously update the profile as new data emerges; use structured documentation.
 151  - **Ethical and Legal Considerations**
 152      - Only use legally accessible data; respect privacy and avoid harassment.
 153  - **Defending Against OSINT Profiling**
 154      - Practice good OPSEC, use disinformation, audit yourself, and set profiles to private.
 155  
 156  
 157  ## Real-World OSINT and OPSEC Examples
 158  
 159  **Criminals**
 160  
 161  *Sony Pictures Hack (2014):* Used OSINT on staff and infrastructure for phishing and breach.[^68]
 162  
 163  >"Email notifications sent via accounts like designedcuratedamy58[@]gmail.com alerted operators whenever targets began assessments or ran malicious curl commands" (Priya, 2025, para. 14).[^69]
 164  
 165  **Ashley Madison Breach (2015):** Used **CSINT** to leak sensitive user data, causing blackmail and public exposure.
 166  
 167  >“When the company balked, the group published personal information about 36 million users. That’s a lot of very personal information of a lot of people” (Schifferle, 2016, para. 5).[^25]
 168  
 169  **Civilians**
 170  
 171  - *Identifying Russian Soldiers:* Used facial recognition and open-source images to ID participants in conflicts.[^55]
 172  
 173  - *Cameroon Investigation:* Used metadata and geolocation to verify military abuses.[^23]
 174  
 175  **Law Enforcement**
 176  
 177  - *Tracking Stolen Property:* Monitored online marketplaces to recover stolen goods.[^24]
 178  
 179  - *ShadowDragon’s SocialNet:* Mapped social networks from 200+ sources to aid investigations.[^4]
 180  
 181  **OPSEC Failures**
 182  
 183  - *Guccifer 2.0:* Forgot to activate VPN, exposing real IP and identity.[^3]
 184  
 185  - *Silk Road’s Ross Ulbricht:* Used personal email and left digital traces, leading to arrest.[^5]
 186  
 187  ## (Operations Security) is a systematic process for:
 188  1. Identifying[^33]
 189  2. Protecting and controlling critical information[^33][^34]
 190  
 191  It's a security discipline and operations function that involves a continuous cycle of:
 192  * Identifying critical information and indicators (CII)
 193    * Critical information and indicators are essential components of Operations Security aimed at protecting sensitive data that could be exploited by adversaries. Critical Information includes unclassified or controlled unclassified information about activities, intentions, capabilities, or limitations that adversaries can use to gain an advantage. Indicators are observable actions or pieces of information that reveal critical details about operations, such as sudden changes in procedures or increased security measures. Protecting this information involves identifying vulnerabilities and implementing countermeasures to prevent unauthorized disclosure
 194  * Analyzing potential threats and vulnerabilities
 195  * Assessing risks
 196  * Developing countermeasures to protect CII
 197  
 198   is used to protect information and activities from adversaries. It helps identify and protect sensitive information that could give an adversary an advantage. OPSEC principles can be applied in daily life, such as not sharing personal information like a DOB, street address, email, phone number.
 199  
 200  **Examples of OPSEC mistakes include:**
 201  * Over-sharing personal information online
 202  
 203     * Chris Chan:<br>
 204       has a huge digital footprint and is easily fooled by trolls online.[^40][^41][^42"]
 205  
 206  * suspectAGB as stated by the BBC.
 207  >"Tariq Monteiro, 23, and Siyad Mohamud, 24, were part of a group which targeted Alex Smith over a gang-based feud as he left a restaurant near Euston station on 12 August 2019. The pair fled to Kenya immediately after the incident and were arrested in Nairobi last year. They both refused to appear for their sentencing hearing at the Old Bailey. Monteiro, of no fixed address, was ordered to serve a minimum of 24 years in prison, while Mohamud, of Barker Drive, Camden, will serve at least 23 years." (Evans 2023, para. 1–4)[^44]
 208  
 209  He shared a kitchen photo and people were able to deduce where he was due to an appliance. As stated by bugzorc opsecfail
 210  
 211  >"Observant individuals quickly pinpointed his location, thanks to telltale signs like common household plugs and the typical kitchen setup. Moreover, the metadata of his posts gave him away." <br>(bugzorc 2025, para. 1)[^43]
 212  
 213  * Leaving unused social media online
 214  
 215  **Interaction/elicitation:** 
 216  
 217  Interacting with a target on social media has been shown to compromise anonymity, as noted by opsecfail. For instance, w0rmer uploaded a photo of his girlfriend that still contained GPS Exif data, which ultimately led investigators to her. When questioned, she admitted he had asked her to take the picture.<br>(bugzorc 2025, para. 3; opsecfail.github.io/blog.html?filecase=w0rmer)[^45]
 218  
 219  Similarly, w0rmer himself explained in an interview that he often provoked people online and had a deliberate process for cleaning photos of metadata. However, during one publishing slip, he accidentally uploaded the wrong image that contained Exif data, which gave authorities critical information. <br>(“W0rmer – Darknet Diaries” 2020, 00:25:58–00:26:41; darknetdiaries.com/transcript/63)[^46]
 220  
 221  * [examples of good and bad opsec and some osint.](./markdown/examples.md)
 222  * Also some expanded [examples](./markdown/README.md#expanded-examples)
 223  
 224  OPSEC supplements other security disciplines rather than replacing them.
 225  
 226  ### How to OPSEC:
 227  
 228  * **Use services that can conceal your identity:**
 229  ---
 230  
 231  | **Category**               | **Tool/Technique**       | **Description**                                                                 | **Pros**                                      | **Cons/Limitations**                          |
 232  |---------------------------|-------------------------|-------------------------------------------------------------------------------|---------------------------------------------|---------------------------------------------|
 233  | **Encrypted Messaging**   | [Telegram](https://telegram.org/)                | Cloud-based messaging with optional E2E ("Secret Chats")                      | Widely adopted, feature-rich               | Not E2E by default; stores data on servers; requires phone number |
 234  |                            | [Simplex](https://simplex.chat/)                 | No user identifiers (not even random numbers)                                 | Maximum metadata privacy                   | Less user-friendly; smaller network         |
 235  |                            | [Signal](https://signal.org/download/)                  | E2E encrypted by default; minimal metadata retention                         | Gold standard for privacy; court-resistant | Requires phone number                       |
 236  | **Anonymity Networks**    | [Tor](https://www.torproject.org/)                     | Routes traffic through encrypted nodes to hide IP                             | Free; robust against tracking              | Slow; frequent CAPTCHAs                     |
 237  |                           | [i2p](https://i2p.net/en/)                         | see [intro](https://i2p.net/en/docs/overview/intro/)                                                          | See [about](https://i2p.net/en/about/)                          | Small network compared to TOR               |
 238  |                            | [Mullvad VPN](https://mullvad.net/en)             | No-logs VPN accepting Monero (XMR) payments                                   | Strong privacy; anonymous payment options  | VPNs can’t fix poor OPSEC habits            |
 239  | **Cryptocurrency**        | [Monero (XMR)](https://www.getmonero.org/)            | Untraceable cryptocurrency                                                   | Private transactions                       | Requires mining/local node for full anonymity + time |
 240  | **Identity Management**   | Unique Usernames        | Use different credentials per site                                           | Prevents correlation attacks               | Hard to manage without a password manager   |
 241  |                            | Word Spinners           | Paraphrase text to avoid detection                                           | Evades plagiarism/identity linking        | May sound unnatural                         |
 242  |                            | AI-Generated Faces      | Fake profile pictures (e.g., ThisPersonDoesNotExist.com)                     | Hides real identity                        | May look unnatural               |
 243  | **Self-OSINT**           | Opt-Out Guides          | Remove personal data from people-search sites                                | Reduces digital footprint                 | Time-consuming; not all sites honor requests without payment |
 244  | **OPSEC Resources**      | Bad OPSEC Examples      | [List of pitfalls](./markdown/badopsec.md) | Learn from others’ mistakes               | N/A                                        |
 245  |                            | Good OPSEC Practices    | [Guidelines](./markdown/good-opsec.md) | Actionable tips                          | Requires discipline                         |
 246  | **Tool Lists**           | OPSEC Tools             | [Curated list](./markdown/opsec.md) | Comprehensive resource                   | May need updates                            |
 247  
 248  ---
 249  
 250  ### **Key Takeaways**
 251  1. **Messaging**:  
 252     - **Signal** OR **Simplex** > **Telegram** for privacy.[^30] [^31] [^32]
 253  
 254     - Remember: E2E ≠ total anonymity (metadata leaks/habits matter)[^45] [^46] [^8] [^43].
 255  
 256  
 257  2. **Anonymity**:  
 258     - **Tor** + **Mullvad VPN** + **XMR** = layered protection.  
 259     - Avoid logging into personal accounts while using these tools.
 260     - Pitfalls: you need to use TOR and Mullvad separately for maximum Anonymity, use a [Virtual Machine](./markdown/opsec.md#virtualization) for VPN's and TOR on another (or the host).
 261  
 262  3. **Identity**:  
 263     - **Unique usernames** + **Unique behavior** = harder to trace.  
 264  
 265  4. **Self-Audit**:  
 266     - Regularly **opt out** of data brokers and **OSINT yourself**.  
 267  
 268  5. **OPSEC Mindset**:  
 269     - Follow **[good OPSEC](./markdown/good-opsec.md)** and avoid **[bad habits](./markdown/badopsec.md)**.
 270  
 271  
 272  > [!NOTE]
 273  > TOR is the Tor Browser, a VPN is typically the Virtual Private Network for consumers as in a Virtual Private Network Service - IE: Mullvad. 
 274  > 
 275  > XMR is Monero Coin or Monero for short, a Privacy Coin.
 276  > 
 277  > Check Wikipedia or the sources cited If you're confused on all of these here:
 278  > 
 279  > 1. VPN service[^9][^10], what we're gonna use here.
 280  > 2. TOR, What should be used separately.[^12] [^11] [^13]
 281  > 3. XMR, for VPN's that take XMR as payment.[^14]
 282  
 283  ---
 284  
 285  > [!TIP]
 286  > **Monero Mining**: Run a local node to avoid centralized exchanges tracing purchases.[^15]
 287  > 
 288  > For full tool details, see the **[OPSEC Tools List](./markdown/opsec.md)**.
 289  
 290  ## disinformation
 291  
 292  [Disinformation](./markdown/disinformation.md)[^16][^17] in the context of OSINT (Open Source Intelligence) refers to deliberate actions taken to obscure, mislead, or mask the true activities, intentions, or identities of individuals or organizations from those conducting open-source intelligence gathering.
 293  
 294  ## Open Source Intelligence (OSINT)
 295  
 296  **<div align="center">What is it, how is this used and why is it important:</div>**
 297  
 298  - OSINT is the practice of collecting and analyzing information from public sources to address specific intelligence needs. OSINT is used by government agencies and commercial organizations for various purposes, including:
 299  
 300    - Reconnaissance
 301    - Cyber crime investigations
 302    - Market trend analysis
 303    - Brand positioning analysis
 304    - Measuring risk to an organization
 305    - Understanding the actor, tactics, and targets
 306    - Gather real-time information
 307    - Make informed decisions
 308    - Receive early warnings of potential threats
 309  
 310  ## Who uses Open-Source Intelligence (OSINT)?
 311  
 312  - National Security and Intelligence Agencies, Law Enforcement, Businesses, Cybersecurity and Cyber-crime Groups, Privacy-Conscious People, Non-Governmental Organizations
 313  
 314    - The CIA[^27], Defense Intelligence Agency (DIA)[^26], and Office of the Director of National Intelligence (ODNI) all use OSINT[^1].
 315    - OSINT can protect citizens (private or otherwise) from identity theft, sexual violence, and abuse[^52][^53].
 316    - OSINT can monitor competitors, investigate new markets, and plan marketing activities[^51].
 317    - OSINT can gather intelligence about specific targets online.
 318    - OSINT can check how outsiders can break into their computing devices.[^49]
 319    - OSINT can be used on oneself to secure privacy.[^50]
 320    - Bellingcat[^48] and the Center for Information Resilience[^47] use OSINT.
 321    - And you! Yes, you can use OSINT.
 322  
 323  ## Sources of OSINT
 324  OSINT can gather information from various sources, including:
 325  - Public government data as stated by the University of North Texas Libraries[^35].
 326  
 327  Public data is data that is used, reused and or redistributed. Government entities operating at various judicial levels such as local, state, federal, and the international levels. This creates various amounts of public data, which is accessible without restrictions. Terms of use must be agreed to or approved depending on consideration before accessing these datasets and or records, such as Heath (HIPPA) and or Educational Data.
 328  
 329  Public data can include for example:
 330  
 331  * voter records and criminal history
 332  
 333  >"Public voter registration data is critical to democracy in the United States. In nearly every state, a public file contains essential information about voters’ eligibility (address, age, districts, precinct, and polling location). Beyond their value to campaigns and others promoting voter participation, these files are used by groups outside of the government (journalists, scholars, advocates, and election integrity experts like VoteShield) to independently verify the rights of voters, and the integrity of US elections." [^73][^74]
 334  
 335  You may use [casesearch](https://ujsportal.pacourts.us/casesearch) in Pennsylvania Courts; landlord, criminal, civil et al should have an address as that's public govt info.
 336  
 337  A Parcel search for [tax history](https://public.eriecountypa.gov/property-tax-records/property-records/property-tax-search/search-by-parcel.aspx).
 338  
 339  An official [Justice site](https://www.justice.gov/jmd/ls/state) listing all states and their local judicial. Case search should be in state judiciary, also for other information such as tax records and property records.
 340  
 341  - Commercial data:
 342  
 343  >"Commercial Data means any and all data and information relating to an identified or identifiable Person (whether the information is accurate or not), alone or in combination with other information, which Person is or was an actual or prospective customer of, or consumer of products offered by, the VS Business or L Brands Business, as applicable. Commercial Data means any and all data collected or otherwise processed by the Seller Entities relating to a customer of the Business" (Law Insider, 2025).[^36]
 344    
 345  - Grey literature:
 346  
 347  >"Grey literature, as defined by the Welch Medical Library, is "information produced on all levels of government, academics, business and industry in electronic and print formats not controlled by commercial publishing i.e. where publishing is not the primary activity of the producing body" <br>(Joseph, 2025, paras. 1–2)"[^37].
 348  
 349  - In academics, the definition for Scholarly Publishing would be the following in accordance to Johns Hopkins University:
 350  
 351  >“A subfield of publishing which distributes academic research and scholarship” (Shin, 2025)[^67].
 352  
 353  Which can also encompass these three things:
 354  * Grey literature 
 355  * Self-Publication
 356  * Scholarly Publishing
 357  
 358  Scholarly Publishing is done at a rigorous peer review process.
 359  
 360  - genealogical OSINT:
 361  
 362  > Genealogy: Using family history research and genealogy databases as an intelligence-gathering tool.
 363  > Death records: Gathering intelligence from records such as death notices, obituaries, gravestone databases, and burial registries.(news papers or local news sites) 
 364  
 365  >"Genealogical research is the tracing of an individual's ancestral history using historical records, both official and unofficial" (University of Maryland Libraries, 2023, para. 1).[^39]
 366  
 367  >"Genealogy is the study of families and their ancestors and histories" <br>(Virginia Tech University Libraries, n.d., para. 1).[^38]
 368  
 369  Genealogy is the study of a family member, or the study of someones family tree or genealogical background. Not to be confused with forensics and DNA.
 370   
 371  ----
 372  
 373  |                       |                  Google Dorks:                  |                               |
 374  | --------------------- | ----------------------------------------------- | ----------------------------- |
 375  | Operator              | Description                                     | Example                       |
 376  | `site:`               | Search within a specific website or domain      | `site:example.com`            |
 377  | `intitle:`            | Find pages with specific words in the **title** | `intitle:"login page"`        |
 378  | `allintitle:`         | All words must appear in the **title**          | `allintitle:admin login`      |
 379  | `inurl:`              | Words in the **URL**                            | `inurl:admin`                 |
 380  | `allinurl:`           | All terms in the **URL**                        | `allinurl:dashboard admin`    |
 381  | `filetype:` or `ext:` | Search for specific file types                  | `filetype:pdf` or `ext:xls`   |
 382  | `intext:`             | Word or phrase in the **page body**             | `intext:"confidential"`       |
 383  | `allintext:`          | All terms in the **body text**                  | `allintext:password username` |
 384  | `link:`               | Pages linking to a specified URL                | `link:example.com`            |
 385  | `define:`             | Look up a word definition                       | `define:opsec`                |
 386  | `related:`            | Find sites similar to a URL                     | `related:example.com`         |
 387  | `*`                   | Wildcard – matches any word                     | `"admin * login"`             |
 388  | `OR`                  | Either search term can appear                   | `login OR signin`             |
 389  | `AND`                 | Both terms must appear (default behavior)       | `username AND password`       |
 390  | `-`                   | Exclude term                                    | `login -facebook`             |
 391  | `"`                   | Exact phrase                                    | `"confidential file"`         |
 392  
 393  
 394  **Default Behavior**
 395  - Google treats multiple words as if connected by AND, so results must contain all terms unless you specify otherwise.
 396  - Quotation marks, site:, and filetype: are among the most commonly used explicit operators for more targeted searches.
 397  
 398  These operators are not used unless you include them in your query. Google’s default is simply to return results matching all your search terms, ranked by relevance.
 399  
 400  ----
 401  
 402  ### Real world examples of OSINT
 403  
 404  ## In the year 2016, a basket weaving image board used OSINT to pay some supposed terrorist a visit from a govt in Russia resulting in airstrikes.
 405  
 406  >"In 2016, amid the Syrian Civil War, rebel groups tried to overthrow President Assad, leading to foreign involvement from the U.S. and Russia. On 4chan, users identified a rebel camp from a Jaysh al-Izza video and relayed its coordinates to Russian contacts, resulting in airstrikes after the camp was located twice (Pezle, 2022)."[^8] [^7]
 407  
 408  UPDATE: Turns out it was a really complex war[^19] the 4chan got involved in, still keeping this up as a key example however; the main issue is that they exposed their training locations with geographic locations to the internet like complete morons.
 409  Thus bad opsec.
 410  
 411  ## In 2017, Shia LaBeouf had a protest due to Trumps election; this resulted in a basket weaving image board using OSINT and sky patterns to figure out where a flag is.
 412  
 413  >"In 2017, 4chan users managed to track down and replace Shia LaBeouf's "He Will Not Divide Us" protest flag. Using only the live-stream footage of the flag, they analyzed flight patterns, star positions, and a tweet to locate the flag in Greeneville, Tennessee. A local troll then honked his car horn until the sound was picked up on the live-stream, pinpointing the exact location. The flag was replaced with a Trump hat, marking the end of this elaborate trolling operation (Lamoureux, Mack 2017)."[^6]
 414  
 415  ## Digital profiling (OSINT profiling).
 416  
 417  Digital profiling and behavioral analysis are powerful techniques for understanding individuals based on their online activities and digital footprints. While these methods are often used by professionals, you can apply many of the same principles and processes yourself by following a structured approach. This creates possible interest and hobbies of an individual.
 418  
 419  Read more inside this readme on [Digital Profiling](./markdown/Digital-Profiling.md)
 420  
 421  ## Closed Sourced Info
 422  
 423  - [HUMINT](./markdown/HUMINT.md)
 424  
 425  **HUMINT can be collected overtly (e.g., interviews, debriefings, diplomatic reporting) or covertly (e.g., espionage, clandestine surveillance).**
 426  
 427  [Breached Data](#breached-data)
 428  
 429  > And remember, closed sourced info can change depending on context. If it came from social media then it's considered open source as it's already out there. If it's from a closed source document like let's say a USB drive then consider it closed source.
 430  
 431  See also **[CSINT](./markdown/CSINT.md)**
 432  
 433  # IMINT
 434  
 435  [IMINT](./markdown/IMINT.md)(Image Intelligence) involves collecting and analyzing visual imagery—satellite, aerial, drone, or ground photos—to extract useful information.[^1] [^28]
 436  Contains information such as [SOCMINT](./markdown/IMINT.md#socmint-social-intelligence) and [Reverse Search](./markdown/IMINT.md#reverse-search-google).
 437  
 438  [GEOINT](./markdown/IMINT.md#geoint-geographical-intelligence) [^1] [^28] is information on geographic locations. Geospatial data may also be called GEOINT data. It's to understand human activity or events and to layer that with data along with geolocations and timing. It has non-military uses as well, example would be for first responders issuing an emergency for a wildfire[^29].
 439  
 440  Three examples of GEOINT tools that you can access right now:
 441  - [Earth](https://earth.google.com/web/)
 442  - [Maps](https://www.google.com/maps)
 443  - [bing maps](https://www.bing.com/maps)
 444  
 445  ## Tools
 446  
 447  OSINT tools from Web queries to advanced methods such as a cli/gui wrapper
 448  
 449  ---
 450  
 451  | Tool | Lookup By | Returns | Limitations/Costs/Notes | Links |
 452  |------|-----------|---------|-------------------|-------|
 453  | **Search & Query Tools** | | | | |
 454  | Google | Manual queries | Google search results | Manual query building | [Link](https://www.google.com/) |
 455  | Google-FU | Advanced queries | Google search results | Rate limits, CAPTCHAs | [GitHub](https://github.com/airborne-commando/GoogleFU-improved) |
 456  | Google Advanced | Direct dorking | Google search results | No saved searches | [Link](https://www.google.com/advanced_search) |
 457  | Shodan | Search Quires | Exposed devices | only useful for insecure devices | [Shodan](https://www.shodan.io/) |
 458  | Awesome Shodan Search Queries | Shodan search queries | Exposed Devices | Only useful for insecure devices | [Link](https://github.com/jakejarvis/awesome-shodan-queries) |
 459  | **Biometric Analysis** | | | | |
 460  | Facecheck.ID | Reverse image | Face matching results | webpimages only from the site | you'll have to use a services such as [TinEye](https://tineye.com/), [lenso](lenso.ai) et al remember on not using this guide as a things change **also use TOR as it seems facecheck has banned my IP address go the manual route with this [method](#toolchain-recommendations).**. [Link](https://raw.githubusercontent.com/airborne-commando/tampermonkey-collection/refs/heads/main/SCRIPTS/facecheck-id-img-extractor.js) |
 461  | face-spy | Reverse image | Returns results on potential models | full avatar images + profile | use blackbird(crow), sherlock, et al. for full details. [Link to script](https://raw.githubusercontent.com/airborne-commando/tampermonkey-collection/refs/heads/main/SCRIPTS/facecheck-OF-edition.js) and [face-spy](https://face-spy.com/) | 
 462  | FaceMatch | username + face | match a username with a face (target) with a database | user would need to use their actual face, this script may not work on all sites. | [FaceMatch](https://github.com/airborne-commando/facematch) |
 463  | Social-Hunt | username + face | Search for a username and also match a face | Would need to download the face, may not work for all sites. Also see issue [#12](https://github.com/AfterPacket/Social-Hunt/issues/12#issue-3837957660) | [Social-Hunt](https://github.com/AfterPacket/Social-Hunt) |
 464  | **Archival** | | | | |
 465  | megalodon | Search and get Uotaku | url or free words | Japanese, web archive citation | [megalodon](https://megalodon.jp/) |
 466  | ghostarchive | Search archive | archive or find existing | see the [about](https://ghostarchive.org/about.html) | [ghostarchive](https://ghostarchive.org/) |
 467  | archive.ph | search existing archives | get a new archive | Free, donations are optional (XMR) also seems to ddos websites avoid for the time being and check for updates. You can get rate limited./[1](https://gyrovague.com/2026/02/01/archive-today-is-directing-a-ddos-attack-against-my-blog/)/[2](https://en.wikipedia.org/wiki/Wikipedia:Requests_for_comment/Archive.is_RFC_5)/[3](https://www.heise.de/en/news/Archive-today-Operator-uses-users-for-DDoS-attack-11171455.html)/[4](https://www.google.com/search?q=archive.today&tbm=nws&source)/[5](https://www.reddit.com/search/?q=archive.today&type=posts&t=week) | [archive.ph](https://archive.ph/). |
 468  | Wayback Machine | Search for snapshots / archive | Get a snapshot or archive | may not let you archive a domain (which can be good)/[1](https://wiki.archiveteam.org/index.php?title=List_of_websites_excluded_from_the_Wayback_Machine) | [Wayback Machine](https://web.archive.org/) |
 469  | **Genealogy & Records** | | | | |
 470  | genealogyintime | Genealogy parameters | Genealogy records | Not HTTPS; need specific info | [Link](http://www.genealogyintime.com/tools/genealogy-search-engine.html) |
 471  | findagrave | Name, location | Grave records | Requires name/location; may not be listed | [Link](https://www.findagrave.com/) |
 472  | **Professional & Financial** | | | | |
 473  | Resume Indeed | Professional criteria | Resumes | Expensive subscription | [Link](https://resumes.indeed.com/) |
 474  | LinkedIn | Professional info | Company/person data | Verification often needed | [Link](https://LinkedIn.com/) |
 475  | Paypal | Email/phone | Account confirmation | Account required | [Link](https://www.paypal.com/us/home) |
 476  | **Username/Email Search** | | | | |
 477  | Blackbird | Username/email | Cross-platform presence | CLI only | [GitHub](https://github.com/p1ngul1n0/blackbird) |
 478  | Crow (GUI) | Username/email | Cross-platform presence with IP spoofing | Same as CLI | [GitHub](https://github.com/airborne-commando/crow) |
 479  | Sherlock | Username | Presence on 300+ sites | CLI; false positives | [GitHub](https://github.com/sherlock-project/sherlock) |
 480  | No-Shit-Sherlock | Username | GUI version of Sherlock | Inherits CLI limitations | [GitHub](https://github.com/airborne-commando/no-shit-sherlock) |
 481  | Maigret | Username | Connections between accounts | Sherlock fork, comes with webui | [GitHub](https://github.com/soxoj/maigret) |
 482  | Maigret-Night (GUI) | Username | GUI for Maigret | Same as CLI, no webui functions (yet) | [GitHub](https://github.com/airborne-commando/maigret-night) |
 483  | MCP | Usernames | username and URL analyses | designed to integrate seamlessly with MCP-compatible applications like Claude Desktop for AI analyses/analytics; you'll need to enter `sudo npm install -g mcp-maigret` for lmstudio if not using docker, look at the [external links](#external-links) under "Maigret MCP Server" and "Maigret MCP Server: Installing manually" as this should be compatible for **most** if not all local LLMS. | [link](https://github.com/BurtTheCoder/mcp-maigret) |
 484  | instantusername | username | username | Instantly check username availability across multiple platforms as you type. | [Link](https://instantusername.com/) |
 485  | Holehe | Email | Email usage across sites | CLI; false positives | [GitHub](https://github.com/megadose/holehe) |
 486  | **Geolocation/GEOINT** | | | | |
 487  | Google Maps | Coordinates/address | Location data | Public data only | [Link](https://maps.google.com/) |
 488  | Bing Maps | Coordinates/address | Bird's eye/satellite view | Variable quality | [Link](https://www.bing.com/maps) |
 489  | Google Earth | Coordinates/address | 3D/2D, historical views | Use with other services | [Link](https://earth.google.com/web) |
 490  | geohints | Geolocation data | GeoGuessr metadata clues | Provides clues only | [Link](https://geohints.com/) |
 491  | GeoGuessr GPT | Photos | AI location guesses | AI hallucinations; 3 free uploads | [Link](https://chatgpt.com/g/g-brlHi7t2R-geoguessr-gpt) |
 492  | geospy | Image | get geolocation using ai | sign up required, LEO and govt only | [Link](https://geospy.ai/) |
 493  | picarta | Image | get geolocation using ai | no sign up however you'll need to login to get the full results details. | [Link](https://picarta.ai/) |
 494  | findpiclocation | Photos | AI location detection | Accuracy varies | [Link](https://findpiclocation.com/) |
 495  | **General OSINT Platforms** | | | | |
 496  | OSINT Rocks | Multiple inputs | Multi-tool interface | Web-based | [Link](https://osint.rocks/) |
 497  | dox.soy | multiple inputs | multiple tools | Seems to be a spinoff of breach.vip, still seems valuable | [dox.soy](https://dox.soy/) |
 498  | one-plus | Multiple inputs | Toolkit with bookmarks | Tools may change | [Link](https://one-plus.github.io/access.html) |
 499  | osint.sh | webpage | Tookits | Seems to be web based OSINT for web domains or ORG | [Link](https://osint.sh/) |
 500  | **MISC Tools** | | | | |
 501  | zabasearch-auto | US public info | Public records lookup | CLI; advanced usage | [GitHub](https://github.com/airborne-commando/zabasearch-auto) |
 502  | github-recon | commit history and others | possible email address | may be the real email address, you can do so manually with <commit-string>.patch | [GitHub](https://github.com/anotherhadi/github-recon) |
 503  | whois | domain | domain registrar info and IP | good if someone owns a website if they didn't make info private | [Link](https://who.is/) |
 504  | TinEye | upload an image | Image result(s) | can be used with biometric data | [TinEye](https://tineye.com/) |
 505  | phone number look up | Phone Number | Name | get facebook, matches ect. Use people search tools | [Link](https://www.numlookup.com/) |
 506  | link extractor and archive | URLs | archived page | CLI; basic pages; manual edits, no longer works for archives | [GitHub](https://github.com/airborne-commando/link-extractor-and-archive) |
 507  | archivebox | URLS | archive pdf, wayback machine, et al  | archive pages locally and also to the wayback machine, docker recommended use [pods](https://podman.io/) and check [scripts](./markdown/scripts.md) | [Archivebox](https://archivebox.io/) |
 508  | trace.rip | Discord info | Discord info | Beta access, use a dummy discord to apply (It will ask for a discord) | [trace.rip](https://www.trace.rip/)/[#192](https://github.com/airborne-commando/OPSEC-OSINT-Tools/issues/192#issue-3898719834) |
 509  | Flock camera map | A map of known flock camera's | Useful with Shodan | May get patched soon I don't know | [Flock Camera Map](https://banishbigbrother.com/flock-camera-map/) |
 510  | Spiderfoot | user input such as a username in "quotes" | data analysis and graphs | Advanced usage, docker image | [spiderfoot](https://hub.docker.com/r/josaorg/spiderfoot) | 
 511  | transit.land | information about transit stops and routes across entire countries. | | Sign up for a free subscription to download datasets, some countries don't have anything (China, Russa). | [Link](https://www.transit.land/map#1.5/12.7/-119.5) | 
 512  | **Email Compromises** | | | | |
 513  | Hudson Rock Extractor | Email | Manual breach check | Flask-based; manual input | [GitHub](https://github.com/airborne-commando/hudsonrock-search-extractor) |
 514  | **Tampermonkey Scripts** | | | | |
 515  | Collection | Various | Various scripts | Collection may update | [Link](https://github.com/airborne-commando/tampermonkey-collection/tree/main) |
 516  | voter reg status | PA voter data | Voter info export | CSV output; Tampermonkey required | [Collection Link](https://github.com/airborne-commando/tampermonkey-collection/tree/main?tab=readme#voter-reg-status-tapermonkey-edition) |
 517  | Universal Background Check | PeopleSearch data | Exports from public records | Not accurate for mm-dd DOB | [Collection Link](https://github.com/airborne-commando/tampermonkey-collection/tree/main?tab=readme#universal-background-check-exporter) |
 518  | Breach.vip search and reddit analyzer | Email/username | Breach data + Reddit analysis |                  | [Collection Link](https://github.com/airborne-commando/tampermonkey-collection/tree/main?tab=readme#breachvip-and-reddit-profile-analyzer) |
 519  | **Extensions** | | | | |
 520  | Wayback machine | URLs | Archived content | Archived content only | [FF](https://addons.mozilla.org/en-US/firefox/addon/wayback-machine_new/)/[Chrome](https://chromewebstore.google.com/detail/wayback-machine/fpnmgdkabkmnadcjpehmlllkndpkmiak) |
 521  | Archive Page | URLs | Archive.today search | Page must be archived | [FF](https://addons.mozilla.org/en-US/firefox/addon/archive-page/)/[Chrome](https://chromewebstore.google.com/detail/archive-page/gcaimhkfmliahedmeklebabdgagipbia) |
 522  | Xcancel | Twitter URLs | Privacy Twitter front-end | Conflicts possible | [FF](https://addons.mozilla.org/en-US/firefox/addon/toxcancel/)/[Chrome](https://chromewebstore.google.com/detail/xcancelcom-redirector) |
 523  | reddit-uncensored | Reddit URLs | Deleted content restoration | Arctic Shift API | [FF](https://addons.mozilla.org/en-US/firefox/addon/reddit-uncensored/)/[Chrome](https://chrome.google.com/webstore/detail/amfnaoebakgdklcahkilhjoglflgnhbm) |
 524  | usertoihsoyct | Usernames | Username redirect | Firefox addon | [GitHub](https://github.com/airborne-commando/usertoihsoyct) |
 525  | facecheck.id | Images | Biometric search | Firefox is GitHub only | [Chrome](https://chromewebstore.google.com/detail/facecheck-reverse-image-s/ciocmmdeghlmioiedoggnlefllfpfmdj?hl=en-US)/[Firefox](https://github.com/airborne-commando/firefox-facecheck-id) |
 526  | Who Am I | usernames | usernames from various OSINT DB's | Firefox will be missing features possibly | [Link](https://chromewebstore.google.com/detail/who-am-i/gdnhlhadhgnhaenfcphpeakdghkccfoo?hl=en)/[Firefox](https://addons.mozilla.org/en-US/firefox/addon/who-am-i-ff/) |
 527  | Markdown Viewer | view a markdown page | | Firefox and chrome | [FF](https://addons.mozilla.org/en-US/firefox/addon/markdown-viewer-chrome)/[Chrome](https://chromewebstore.google.com/detail/markdown-viewer/ckkdlimhmcjmikdlpkmbgfkaikojcbjk?hl=en) | 
 528  
 529  ---
 530  
 531  **Typical intel collection**
 532  
 533  See [collection.md](./markdown/mermaid-data/collection.md) for details on intel collection.
 534  
 535  ---
 536  
 537  > [!WARNING]
 538  > **False Positives**:
 539  > 
 540  > Sherlock, Holehe, et al. you'll need to verify manually.
 541  > 
 542  > **Facecheck.ID**:
 543  > 
 544  > Extracts images but doesn’t analyze; cross-reference with [Pimeyes (10 searches)](https://pimeyes.com/en) or others listed on 6.  
 545  
 546  > [!NOTE]
 547  > CLI is more technical while the gui is more noob friendly.
 548  
 549  > [!NOTE]
 550  > **Email Investigations**:
 551  > 
 552  > Combine account detection methods + breached data for thorough checks; see [**Toolchain Recommendations**](#Toolchain-Recommendations).
 553  > 
 554  > For Gmail-specific OSINT, use **GHunt** (via OSINT Rocks) or epieos.  
 555  > 
 556  > to verify you can either login to your own email or use epieos/ghunt to look inside it and give you some info.
 557  > 
 558  > See https://calendar.google.com/calendar/u/0/embed?src=youremail@gmail.com to verify with a google calendar if it actually exists.
 559  > 
 560  > you may also use wayback machine with a google+ id, but that's ancient stuff.
 561  > 
 562  > This is Explained below.
 563  
 564  
 565  
 566  **A post from a linkedin account named Forensic OSINT[^18]**:
 567  
 568  > "In a clever LinkedIn post, 🔐Yoni  shares a privacy insight and a practical OSINT technique worth bookmarking.
 569  > 
 570  > First, the Gmail dot trick: Google ignores dots in addresses, so variations like davidsmith@gmail[.]com, d.a.v.i.d.s.m.i.t.h[@]gmail[.]com, and david.smith[@]gmail[.]com all route to the same inbox, a fact that’s often misunderstood in email investigations.
 571  > 
 572  > More importantly for OSINT work, Yoni highlights a method to check if an email is linked to a Google account using Google Calendar. Just plug the email into this URL while logged into your own Google account:
 573  > 
 574  > https[:]//calendar[.]google[.]com/calendar/u/0/embed?src=youremail@example[.]com
 575  > 
 576  > If the address is connected to a Google account, the calendar interface loads and displays the bolded email address in the bottom left. If it doesn’t exist, it simply shows “Google Calendar.”
 577  > 
 578  > 🔍 Why It Matters:
 579  > This is a quick, non-intrusive way to validate if an email is active on Google’s ecosystem, especially helpful when vetting aliases, burner accounts, or verifying user identities in investigations (Forensic OSINT, 2025)."
 580  
 581  > [!NOTE]
 582  >
 583  > Rate Limits: Tools like Google-FU may trigger blocks—use proxies/VPNs.
 584  >
 585  > Legality: Avoid scraping private data (e.g., Facebook pro) without consent.
 586  
 587  > [!TIP]
 588  > **Geolocation**:
 589  >
 590  > Use **Google Maps Street View [google earth](earth.google.com) or [bing maps](https://www.bing.com/maps)** to verify addresses/landmarks from other tools.
 591  > 
 592  > Different functions come from different services, such as Bing Maps, Google Earth, Google Maps.
 593  
 594  > [!TIP]
 595  > **Bio-metric Analysis**: You can supplement your bio-metric analytics with these tools by extracting the results from:
 596  >
 597  >  - faceonlive.com (3 or 4 search limit, may need TOR)
 598  >  - lenso.ai 
 599  >  - face-spy
 600  >  - peekyou.com
 601  >  - people search
 602  >  - breached data (breach.vip)
 603  
 604  
 605  After that open image in new tab and save or drag it into facecheck.id and compare (as mentioned earlier on step 1)
 606  
 607  ---
 608  
 609  ### **Toolchain Recommendations**
 610  
 611  **Quick Username Search**: 
 612  - Crow (GUI for in-depth)
 613      + Maigret (GUI for in-depth)
 614      + Sherlock (CLI for depth).  
 615  
 616  **Email Breaches**: 
 617  - Have I Been Pwned 
 618      + Pentester (freeish) 
 619      + OSINT Rocks (Hudson Rock/Holehe)
 620      + LOLArchiver.  
 621  
 622  > [!NOTE]
 623  > if you ever get banned from facecheck.id do the following:
 624  >
 625  > use TOR (ip masking) and proceed below.
 626  
 627  **Images**: 
 628  
 629  * upload your image, 
 630  * solve the captcha 
 631    
 632  then and you'll need to do this: 
 633  
 634  * go to inspect element on the results page.
 635  * pick an element from the page shift+ctrl+c
 636  * copy the rule usually fimg0 to the last number like fimg59
 637  * and you'll be be set
 638  
 639  here is an example of a rule that is copied (may be expired as of writing this, use a text editor):
 640  
 641      #fimg0 {
 642          background-image: url("data:image/webp;base64, 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");
 643      }
 644  
 645  > [!WARNING] 
 646  > Do not use additional extensions as that can make you identifiable (fingerprinting).
 647  
 648  **This should work with the following on a regular browser**
 649  * Pimeyes (unblur/show NSFW)
 650  * lenso.ai (tells you the source of a site, usernames)
 651  * TinEye
 652  * faceonlive (last resort)
 653        
 654  ***The Methods***
 655  - Source image will be ran though Facecheck.ID.
 656      + Facecheck.ID would then be extracted (results page).
 657  
 658  **the extracted image can than be ran though the following:**
 659  
 660  - Pimeyes (website name no url), gives you more images to work with and extract.
 661  - lenso.ai for potential URLS or Usernames
 662  - TinEye, which only finds matching images. This isn't as good for faces but isn't as strict as lets say Google/Yandex/et al.
 663      + Can also check the div under topdiv for facecheck for the websites and compare with the other sources such as TinEye.
 664  - faceonlive (faceseek), which would be your last resort would also potentially give you some results but seems to be the same thing as Facecheck.ID and asks you for credits. Partial URL with face which is a clue (just like facecheck.id).
 665  
 666  > [!TIP] 
 667  > If the image is of a public web (onlyfans, snapchat, twitter, et al) you may:
 668  > - Use the results from TinEye, lenso, Facecheck.ID, Pimeyes et al and upload it to yandex for the full username URL (that is if TinEye didn't beat Yandex to it)
 669  > - Still would have to be of a Face and needed to be indexed by TinEye.
 670  > - For the other clues, use tools such as blackbird(maigret-night GUI under crow tab or blackbird web), maigret(maigret night), people search tools(data brokers), breached data for leads.
 671  >
 672  > **Encrypted Files Pipeline**: 
 673  > - Encrypted drives (LUKS) → veracrypt → keepassxc = keepass/veracrypt use a secure masterpassword or keyfile while LUKS uses a secure password to encrypt/decrypt the entire drive(s).
 674  > - Luks being the strongest while veracrypt/keepassxc being strong but also the weakest depending on config.
 675  > - veracrypt supports encrypting an entire drive as opposed to keepassxc however, so it's slightly on par with LUKS.
 676  > - Leaving keepassxc only good for file encryption and secure notes.
 677  > - For LUKS/varacrypt/keepassxc it's always a good idea to keep a backup of masterpassword and store it somewhere safe, preferably on paper as it's easily destructible.
 678  
 679  > [!NOTE]
 680  > Pentester can provide free results on usernames, etc but on a time limit, not worth to buy a service if you're smart and keep records (snapshot).
 681  > 
 682  > For keepassxc it's a good idea to use a strong password or a YubiKey (hardware password/security key).
 683  > 
 684  > you may also create an additional database, one that has the password you can remember; the other that has the generated database password for sensitive files or a key-file (same with varacrypt).
 685  >
 686  > For niche tools, refer to the [Curated Lists](#curated-lists) section.
 687  >
 688  > Pipeline discussed [here](./markdown/opsec.md#opsec-pipeline-for-secure-files)
 689      
 690  ## People search tools (in the states):
 691  
 692  People search / information aggregation
 693  
 694  > [!CAUTION] 
 695  > The type of info found on these sites appear to from other data brokers, social media profiles that are public or viewable by everyone, compiled data/info from federal, state, and local government public records.
 696  
 697  > [!NOTE] 
 698  > Most judicial stuff is saved in a dabase of some kind, like PA
 699  > 
 700  > https://services.pacourts.us/public/v1/cases/search
 701  > 
 702  > people search aggregators[^54], typically used in the united states. can give you information on someone such as an email, home address, date of birth, etc.
 703  
 704  | **Tool**                        | **Lookup By**                            | **Returns**                              | **Notes**                                                                                            
 705  |------------------------------- | ------------------------------------------|------------------------------------------|----------------------------------------------------------------------------------------------------- |
 706  | **[FastPeopleSearch](https://www.fastpeoplesearch.com/)**    | Name, Phone, Address                     | Age, Address, Phone, Email               | Free; data may be outdated.                                                                          |
 707  | **[That's Them](https://thatsthem.com/)**         | Name, Email, IP, VIN, Phone              | IP, Addresses, Phone, Email              | Aggregates data from Intelius/Spokeo; some paid results.                                             |
 708  | **[Nuwber](https://nuwber.com/)**              | Name, Phone, Email, Address              | DOB, Address, Email, Phone               | Detailed reports may require payment.                                                                |
 709  | **[IDCrawl](https://idcrawl.com/)**             | Name, Username, Phone, Email             | Names, Usernames, Phone, Email           | Focuses on usernames/social media.                                                                   |
 710  | **[PeekYou](https://www.peekyou.com/)**             | Name, Username, State                    | Age, Social Media, Emails, Addresses     | Strong for social media profiling.                                                                   |
 711  | **[Webmii](https://webmii.com/)**              | First + Last Name                        | Social Media, Search Results             | Lightweight; scans public web/social profiles.                                                       |
 712  | **[PublicRecords](https://www.publicrecords.onlinesearches.com/)**       | Name, Address, State                     | Name, Address, Partial Phone             | Free directory; redirects to Intelius for paid details.                                              |
 713  | **[ClustrMaps](https://clustrmaps.com/)**          | Name, Address                            | Addresses, Residents, Property, IP Data  | Focuses on geolocation/demographics; may include ownership history.                                  |
 714  | **[fastbackgroundcheck](https://www.fastbackgroundcheck.com)** | Name, Address, Phone Number              | Name, Address, Phone Number, Emails      | Seems to comb though billions of records as stated on it's [website](https://www.fastbackgroundcheck.com/about)                           |
 715  | **[ZabaSearch](https://www.zabasearch.com/)**          | first, last name, city state             | Names, Possible Relatives, et al         | comes from various sources, as stated on it's [faq](https://www.zabasearch.com/faq/), free partial look up and is **accurate*** |
 716  | **DoJ/State**                   | DoJ Resource                             | [Justice site](https://www.justice.gov/jmd/ls/state)                     | Various states and public govt info, Public govt info                                                |
 717  ||                                  Megans Law website/FBI                   | [FBI registry](https://www.nsopw.gov/?AspxAutoDetectCookieSupport=1)                     | Look up registered individuals, Only for registered individuals (sex offenders)                      |
 718  
 719  
 720  
 721  
 722  ---
 723  
 724  ### **Key Observations**:
 725  1. **Free vs. Paid**: Most tools offer basic info for free but upsell detailed reports (e.g., PublicRecords → Intelius).  
 726  2. **Data Sources**: Many pull from the same breaches/public records (emails/phones often outdated but still in use).  
 727  3. **Specializations**:  
 728     - *Social Media*: PeekYou, IDCrawl.  
 729     - *Geo-location*: ClustrMaps.  
 730     - *Comprehensive*: FastPeopleSearch, Nuwber, fastbackgroundcheck.  
 731  
 732  **Disclaimer**: Accuracy varies; users rarely update emails unless compromised. Use ethically!
 733  
 734  - For additional tools see [Curated lists](#curated-lists)
 735  
 736  ## Grey literature
 737  
 738  >"Grey literature refers to various forms of information created outside conventional publishing and distribution systems, which are often not thoroughly indexed in major databases."[^77]
 739  
 740  Use the [google dorking assistant](https://github.com/airborne-commando/tampermonkey-collection/tree/main) or just use the google advanced search tool [Link](https://www.google.com/advanced_search), `site:.gov` would be a good start for gray literature.
 741  
 742  ## Breached Data:
 743  
 744  Breached data that is publicly available for public viewing, typically from hibp or breach.vip; typically.
 745  
 746  ---
 747  
 748  > [!NOTE] 
 749  > Some domains (e.g., [exposed.lol (Wayback Machine)](https://web.archive.org/web/20240115103938/https://exposed.lol/)) may be expired. Refer to the curated list or alternate links provided.
 750  
 751  | Tool | Lookup By | Returns | Limitations/Costs | Notes |
 752  |------|-----------|---------|-------------------|-------|
 753  | **[Have I Been Pwned](https://haveibeenpwned.com/)** | Email, Phone | Breach names, dates, compromised data | Free; no passwords/raw data | Trusted source; alerts for new breaches |
 754  | **[BreachDirectory](https://breachdirectory.org/)** | Email, Username | Partial password hashes (SHA-1, first 4 chars), length | Free; no full passwords | Useful for credential stuffing checks |
 755  | **[Breach.vip](https://Breach.vip)** | Email, Username | Minecraft-focused leaks (usernames, IPs) | Free; requires login | Niche for gaming accounts; "memey" but functional |
 756  | **[LeakPeek](https://leakpeek.com/)** | Email, Username | Partial breach snippets (e.g., domains) | 5 free searches; Tor bypass possible | Paid plans for full data; obfuscates results |
 757  | **[LOLArchiver](https://osint.lolarchiver.com/)** | Email, Username | Full breach databases (e.g., emails, passwords) | Paid service only | For OSINT professionals; curated high-value leaks |
 758  | **[Icebreaker](https://github.com/airborne-commando/ice-breaker)** | Local breach files | Parses/analyzes large breach datasets | Python/EXE; works best for <1000GB files | Demo script provided; use with caution (e.g., [Facebook 533M leak](https://github.com/davidfegyver/facebook-533m)) |
 759  | **[big file reader](https://archive.ph/EaPmx)** | python | data in files | Storage/hardware | Big file reader written in python | 
 760  | **[large database file leak folder](https://cloud.mail.ru/public/AuvN/VJuLUgsZY)** | using ice-breaker or big file reader | Usernames, etc | hardware/space | All known breaches, in Russian.
 761  | **[hashes.com](https://hashes.com/)** | Hash (MD5, SHA-1, etc.) | Decrypted passwords (if hash is cracked) | Free/paid cracking tools | Useful for reversing hashes from breaches |
 762  | **[pentester.com](https://pentester.com/)** | Email, Username | Full breach details (more than HIBP) | **Free**; no Tor needed; use incognito/private browsing mode | Extensive; may include sensitive data |
 763  | **[Hudson Rock](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools)** | Email, Username, Domain, APK | Infostealer infection indication, general information | Free; no passwords/raw data | Infostealer only data |
 764  | **[combo-list](https://www.google.com/search?q=site%3Ascribd.com+combolist)** | email, username, password etc | a pdf document | you need an account to download from scribd, use these if you can [vdownloaders](https://scribd.vdownloaders.com/) or `https://www.scribd.com/embeds/CONTENT-NUM/content`, scroll the embed (load it) and ctrl+a ctrl+cp into a text file, that will be messy however... use [poppler](https://man.archlinux.org/man/pdftotext.1.en) | may be old data, public info at that point (Web index) [Here have an example](https://www.scribd.com/embeds/771686160/content). |
 765  | **[filemood.com](https://filemood.com/)** | Torrent indexer | Torrents found | List of torrents of various sizes that are tied to a breach | May need to be seeded, also needs a [VPN](./markdown/opsec.md#anonymity-tools), same results for [btdig](https://btdig.com), can also try [weekpass](https://weakpass.com/) |
 766  
 767  ## Curl commands
 768  
 769  **Breach VIP API curl commands / Alias**
 770  
 771      breachemail() {
 772        curl -X POST https://breach.vip/api/search \
 773             -H "Content-Type: application/json" \
 774             -d "{\"term\": \"$1\",\"fields\": [\"email\"],\"wildcard\": false, \"case_sensitive\": false}" \
 775         >     /tmp/results-email.txt && cat /tmp/results-email.txt
 776      }
 777      
 778      breachuser() {
 779        curl -X POST https://breach.vip/api/search \
 780             -H "Content-Type: application/json" \
 781             -d "{\"term\": \"$1\",\"fields\": [\"username\"],\"wildcard\": false, \"case_sensitive\": true}" \
 782         >     /tmp/results-user.txt && cat /tmp/results-user.txt
 783      }
 784      
 785      breachphone() {
 786        curl -X POST https://breach.vip/api/search \
 787             -H "Content-Type: application/json" \
 788             -d "{\"term\": \"$1\",\"fields\": [\"phone\"],\"wildcard\": true, \"case_sensitive\": false}" \
 789         >     /tmp/results-phone.txt && cat /tmp/results-phone.txt
 790      }
 791      
 792      breachname() {
 793        curl -X POST https://breach.vip/api/search \
 794             -H "Content-Type: application/json" \
 795             -d "{\"term\": \"$1\",\"fields\": [\"name\"],\"wildcard\": false, \"case_sensitive\": true}" \
 796         >     /tmp/results-name.txt && cat /tmp/results-name.txt
 797      }
 798  
 799  
 800  **R00M101**
 801  
 802      analyze() {
 803        curl -X GET "https://api.r00m101.com/analyze/$1" -H "accept: application/json" > /tmp/reddit-user.txt && cat /tmp/reddit-user.txt
 804      }
 805  
 806  
 807  Take a look at the documents which I will [link here](https://breach.vip/api/docs) | [room101 docs](https://api.r00m101.com/swagger)
 808  
 809  Most API's use swagger documentation.[^76]
 810  
 811  ---
 812  
 813  ### **Key Takeaways**:
 814  1. **Free vs. Paid**:  
 815     - *Free*: HIBP, BreachDirectory, Pentester, Hashes.com, breach.vip.  
 816     - *Limited Free*: LeakPeek (5 searches), Breach.vip (login required).  
 817     - *Paid*: LOLArchiver, LeakPeek plans.  
 818  
 819  2. **Specializations**:  
 820     - *Password Recovery*: Hashes.com (decrypt hashes), BreachDirectory (partial hashes).  
 821     - *Gaming Leaks*: Breach.vip (Minecraft).  
 822     - *Local Analysis*: Icebreaker (Python tool for large datasets).  
 823  
 824  3. **Ethical/Legal Notes**:  
 825     - Many tools provide **partial data** (e.g., first 4 chars of passwords) to comply with ethics.  
 826     - Use **Tor** with LeakPeek to bypass search limits.  
 827     - Avoid misuse: Some tools (e.g., Pentester) may expose sensitive data.  
 828  
 829  4. **For Large Datasets**:  
 830     - [Icebreaker](https://github.com/airborne-commando/ice-breaker) + [Facebook 533M](https://github.com/davidfegyver/facebook-533m) (no passwords) for bulk analysis.  
 831  
 832  ---
 833  
 834  ### **Additional Resources**:
 835  - **Curated Lists**: Check [Curated Lists](#curated-lists) for more niche tools.  
 836  - **Demo Scripts**: [Icebreaker](https://github.com/airborne-commando/ice-breaker) includes a demo for testing.  
 837  
 838  ## social media
 839  
 840  Social media collection of public data (if applicable), such as snapchat, facebook, et al.
 841  
 842  ---
 843  
 844  | **Platform**  | **Tool**               | **URL**                              | **Functionality**                          | **Limitations/Notes**               |
 845  |--------------|-----------------------|------------------------------------- |------------------------------------------|-----------------------------------------|
 846  | **General**  | Social Searcher       | [social-searcher.com](https://www.social-searcher.com/)          | Searches multiple platforms at once      | see the [about](https://www.social-searcher.com/about/) page               |
 847  |              | People DeepSearch     | [webvetted.com/detect/people](https://webvetted.com/detect/people)  | AI Powered search, various socials medias| Limited to one report, searches are ok   |
 848  | **Snapchat** | Snapchat Map          | [map.snapchat.com](https://map.snapchat.com/)             | View maps for snapchat                   | Requires Snapchat account                |
 849  | **Instagram**| Dumpor                | [dumpor.com](https://dumpor.com/)                   | View profiles/stories anonymously        | May have rate limits                     |
 850  ||               imginn                | [imginn.com](https://imginn.com/)                   | View profiles/stories anonymously        | May be offline from time to time         |
 851  | **Twitter**  | Sotwe                 | [sotwe.com](https://www.sotwe.com/)                    | Privacy-focused Twitter front-end        | No login required                        |
 852  ||               Xcancel               | [xcancel.com](https://xcancel.com/)                  | Privacy-focused Twitter front-end        | No login required, Lightweight interface |
 853  ||               Nitter                | [nitter.net](https://nitter.net/)                   | Privacy-focused Twitter front-end        | No login required                        |
 854  | **Facebook** | Facebook Search       | [facebook.com/search](https://www.facebook.com/search/)          | Native Facebook search tool              | Limited without login                    |
 855  |              | WhoPostedWhat         | [whopostedwhat.com](https://www.whopostedwhat.com/)            | Search Facebook posts by date/keyword    | Requires precise queries, public accounts|
 856  | **reddit**   | r00m101.com           | [r00m101](https://r00m101.com/)                      | Get detailed a reddit deleted or active  | Pricing for full scope and features      |
 857  ||               ihsoyct               | [ihsoyct](https://ihsoyct.github.io/index.html)                      | Get archived posts from a reddit account | see [limitations](https://github.com/Fubs/reddit-uncensored?tab=readme-ov-file#limitations) different repo   |
 858  ---
 859  
 860  > [!TIP]
 861  > **Facebook Private Accounts**:
 862  > Method 1: Create a fake account (difficult due to Facebook's verification)
 863  > 
 864  > Method 2: Use browser's *Inspect Element* → *Device Simulator* (or mobile phone) + direct URL
 865  > 
 866  > Always try logged out or in private mode first
 867  
 868  > [!TIP]
 869  > **LinkedIn**:
 870  > profiles cannot load
 871  > 
 872  > Wait 1-2 minutes (cookie/IP rotation)
 873  > 
 874  > Create a basic account (avoid looking suspicious)
 875  > 
 876  > HWID/IP tracking may block repeated searches
 877  > 
 878  > you can also enter in stuff like this
 879  > 
 880  > https://www.linkedin.com/pub/dir/first/lastname
 881  
 882  
 883  > [!TIP]
 884  > **Twitter**:
 885  > Use **Nitter**/**Xcancel**/**Sotwe** to browse anonymously.
 886  
 887  > [!TIP]
 888  > **Instagram**:
 889  >
 890  > **imginn** to look at accounts anonymously and to avoid that annoying login popup.
 891  >
 892  > **Will not work with private accounts**
 893  >
 894  > [firefox](https://addons.mozilla.org/en-US/firefox/addon/imginn/)
 895  >
 896  > [chrome](https://github.com/claromes/socialswitch) make sure to not use picuki, disable tiktok; use a different profile or browser. Can use firefox.
 897  > 
 898  > - For additional tools see the Curated Lists section below.
 899  
 900  ## Curated lists
 901  
 902  | Tool | Directs to| Notes   | Limitations       | Links |
 903  |------|-----------|---------|-------------------|-------|
 904  | Awesome OSINT | Webpage | A curated list of amazingly awesome open source intelligence tools and resources | Info may be outdated | [Awesome OSINT](https://github.com/jivoi/awesome-osint) |
 905  | OSINT for countries V2 | Webpage | open data, legal, maps, vehicles, people, procurement, WHOIS | User contrib | [OSINT for countries V2](https://github.com/paulpogoda/OSINT-for-countries-V2.0) |
 906  | OSINT Framework | Webpage | A larger tree list of tools | Some links are out of date | [OSINT Framework](https://osintframework.com/) |
 907  | OSINT Resources | Webpage | Collection of OSINT resources that seems to be more up to date | | [OSINT Resources](https://sizeof.cat/post/osint-resources/)/[Archive](https://archive.ph/rZZf0) |
 908  | cipher387's OSINT collection | Webpage | A collection of several hundred online tools for OSINT | obsolete tools in list | [cipher387's OSINT collection](https://github.com/cipher387/osint_stuff_tool_collection) |
 909  | internet tools - FMHY | Webpage | A curated list from FMHY | | [OSINT](https://fmhy.xyz/internet-tools#open-source-intelligence)/[archiving](https://fmhy.xyz/internet-tools#archiving) |
 910  | OSINT toolbox | Webpage/Quick Links | OSINT, Privacy & OPSEC bookmarks / links | Some resources are completely free to use, others you will need to pay for however they may offer a free trial. | [OSINT toolbox](https://github.com/The-Osint-Toolbox) |
 911  | the ultimate osint collection | Webpage | Various tools and links for OSINT | May need to reload the page, I/O[^72] | [the ultimate osint collection](https://start.me/p/DPYPMz/the-ultimate-osint-collection) |
 912  | osint 500 tools | Webpage | Various tools and links for OSINT | May need to reload the page, I/O[^72] | [osint 500 tools](https://start.me/p/0Pqbdg/osint-500-tools) |
 913  | OSINT Tools and Resources Handbook | webpage | An index of OSINT tools and resources | A curated list | [OSINT Tools and Resources Handbook](https://www.osinthandbook.com/) |
 914  | Download Managers | Webpage | A curated list from FMHY | | [Download Managers](https://fmhy.net/file-tools#download-managers) |
 915  | prism-break | A webpage containing Categories | | surveillance shielding from the states and govts, not a 100% guarantee also hasn't been updated within a year | [Link](https://prism-break.org/en/all/)/[Source code](https://gitlab.com/prism-break/prism-break)/[github mirror](https://github.com/prism-break/prism-break) |
 916  | Wikipedia categories||| Anyone can edit Wikipedia, check sources ||
 917  | Forests by country | subcategories | 103 subcategories, out of 103 total. || [Link](https://en.wikipedia.org/wiki/Category:Forests_by_country) |
 918  | Parks by country | subcategories | 180 subcategories, out of 180 total. || [Link](https://en.wikipedia.org/wiki/Category:Parks_by_country) |
 919  | Cities by country | subcategories | 131 subcategories, out of 131 total. || [Link](https://en.wikipedia.org/wiki/Category:Cities_by_country) |
 920  
 921  | **Wiki(s):**            |                   |                  
 922  |-------------------------|-------------------|
 923  | [OSINT community](https://www.reddit.com/r/OSINT/wiki/index/) | Reddit Wikipedia  |
 924  | [Open-source intelligence](https://en.wikipedia.org/wiki/Open-source_intelligence) | Wikipedia|
 925  
 926  **Look at the sources of wikipedia**
 927  
 928  | **Toolkit(s):**         |                  |                  
 929  |-------------------------|------------------|
 930  |  [bellingcat toolkit](https://bellingcat.gitbook.io/toolkit) | Belling cat  |
 931  
 932  | **Newsletter and topics:**      |                  |                  
 933  |---------------------------------|------------------|
 934  | [OSINT news letter](https://osintnewsletter.com)       |    Newsletter    |
 935  | [Github topics - osint](https://github.com/topics/osint)   |    Github Topics |
 936  | [r/OSINT](https://www.reddit.com/r/OSINT/)                 |    Reddit        |
 937  | [r/osinttools](https://www.reddit.com/r/osinttools/)            |    Reddit        |
 938  | [osint-news](https://osint-news.com/)              | OSINT news/tools |
 939  | [hackernews - Topic OSINT](https://thehackernews.com/search/label/OSINT)|    OSINT topic   |
 940  | [Bellingcat](https://www.bellingcat.com/)              | OSINT news/tools |
 941  | [osinttechnical - bsky](https://bsky.app/profile/osinttechnical.bsky.social)   | OSINT account    |
 942  
 943  | **Feeds:**                      |                  |                  
 944  |---------------------------------|------------------|
 945  | [OSINT Accounts - Bluesky](https://bsky.app/profile/did:plc:4hgp7p2mqov4iemltisq6cws/feed/aaadi46fvqjwc) | A Bluesky Feed  |
 946  | [OSINT - X Search](https://xcancel.com/search?f=tweets&q=OSINT)        | A Twitter Search |
 947  | [OSINT tools - Reddit](https://www.reddit.com/search/?q=osint+tools)    | A Reddit Search  |
 948  
 949  > [!TIP]
 950  >  use "topic" site:https://osintnewsletter.com
 951  >  
 952  > ***example:*** "facecheck.id" site:https://osintnewsletter.com
 953  
 954  
 955  | **AI Helpers:**                      |                         |
 956  |--------------------------------------|-------------------------|
 957  |  [perplexity - OSINT Research](https://www.perplexity.ai/spaces/osint-research-GLt9lRgIRY.Gm5em9qYzdg) | OSINT Research           |
 958  |  [perplexity - Google Dorking](https://www.perplexity.ai/spaces/google-dorking-rkHx6yQLQweCt7vlFkmK4g#0) | Google Dorking "Hacking" |
 959  |  [Coding - Tampermonkey](https://www.perplexity.ai/spaces/coding-m2PpkGBUTjeypO6yq9oO3A)       | Coding                   |
 960  |  [mcp-maigret - Github](https://github.com/BurtTheCoder/mcp-maigret)        | Maigret MCP Server       |
 961  
 962  | **OPT OUTs / self OSINT** |   **Compare info**                                                                                            |
 963  |----------------------|--------------------------------------------------------------------------------------------------------------------|
 964  | [Google dorks](https://www.google.com/advanced_search) ||
 965  | [Results about you (google index)](https://myactivity.google.com/results-about-you) | Check what google emails you; actually visit the website and see about doing an opt-out there. |
 966  | [Opt Out list](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List) ||
 967  | [inteltechniques opt out workbook](https://inteltechniques.com/workbook.html) ||
 968  | [people search tools](#people-search-tools-in-the-states)||
 969  | [osintframework](https://osintframework.com/) ||
 970  | [osint resources](https://sizeof.cat/post/osint-resources/) ||
 971  | [awesome osint](https://github.com/jivoi/awesome-osint?tab=readme-ov-file#-people-investigations) ||
 972  | [Internet tools](https://fmhy.xyz/internet-tools#open-source-intelligence) ||
 973  | [The Osint Toolbox](https://github.com/The-Osint-Toolbox/People-Search-OSINT) ||
 974  | [osint stuff tool collection](https://github.com/cipher387/osint_stuff_tool_collection?tab=readme-ov-file#universal-contact-search-and-leaks-search) ||
 975  
 976  **Note for FMHY you can self host [here](https://github.com/fmhy/FMHY/wiki/Backups)**
 977  
 978  Google will find websites containing your first-last name and address and will ask to remove it from the index. Before applying the removal process on google search be sure to remove info from the website itself that it's hosted on. Google Dorking seems to be a bit quicker and preemptive on removing info about yourself after you visit said sites (if applicable).
 979  
 980  Google dork the manual way so that you don't get flagged as a bot.
 981  
 982  ### And the final graph, the data collection pipeline:
 983  
 984  <p align="center"><img width="auto" height="auto" alt="data collection" src="./img/png/graphs/data-collection-pipeline.png"/></p>
 985  
 986  ## Donations:
 987  
 988  If you find this useful feel free to donate to this monero address:
 989  
 990  <p align="left"><img width="15%" height="auto" alt="monero" src="./img/png/misc/monero.png"/></p>
 991  
 992  ```
 993  -----BEGIN PGP SIGNED MESSAGE-----
 994  Hash: SHA512
 995  
 996  Monero Address
 997  
 998  438kDinvd6y2e5kuKbu3MfXwLgV4pd3wb7GbzBphVdXubyacXUhFga3TPmMnNLmwkBA5EQnGSGsom8tsfu72eYcC7xiH2NJ
 999  -----BEGIN PGP SIGNATURE-----
1000  
1001  iHUEARYKAB0WIQSqMaHvdxncX6eJu/uujDIK2tNKXwUCaanwwwAKCRCujDIK2tNK
1002  X44YAP4y5ggL3qZ/6tN+U0VKebHM/ibxfHfJZA8PfB1Gk7/WlgEAsv0pQuKIP74I
1003  s5Q7OLnv1P75aOy1eiT+gNLILCwEVQY=
1004  =gXyc
1005  -----END PGP SIGNATURE-----
1006  ```
1007  
1008  
1009  **Made a radicle account for some of my forks and repos! Feel free to seed, clone and fork.**
1010  
1011  
1012  My PGP:
1013  
1014  [pgp.txt](https://gist.githubusercontent.com/airborne-commando/0ca1153f3312bc6341b1ed695f8693e7/raw/pgp.txt)
1015  
1016  ```
1017  Comment: Valid from: 12/12/25 7:01 PM
1018  Comment: Valid until:12/12/30 11:58 PM
1019  Comment: If this key doesn't change and is expired either something happened to me or I simply forgot.
1020  -----BEGIN PGP PUBLIC KEY BLOCK-----
1021  
1022  mDMEaTys3RYJKwYBBAHaRw8BAQdAUSiVaO5JG1716tJSBWd3pQr0Irt0ai9Ka6jV
1023  EIa43fm0H2pjLWRlbnRvbiA8amMtZGVudG9uQG9zaW50LmNvbT6IlgQTFgoAPgIb
1024  AwULCQgHAgYVCgkICwIEFgIDAQIeAQIXgBYhBKoxoe93Gdxfp4m7+66MMgra00pf
1025  BQJpPK4CBQkJZ5i2AAoJEK6MMgra00pfNZEBAKmiJNydL3HfZ9SJoMp6uIFKZNIT
1026  0CHD8WLHFmxYxHppAQD43mos91KN2qFzUcPiaOxf+7Kdj8zF+MZcAn/jtIPECrg4
1027  BGk8rN0SCisGAQQBl1UBBQEBB0AgayhEEluPo/fQBNQg8JSrLTaVrYqGWFbv5vyY
1028  67HZRAMBCAeIeAQYFgoAIBYhBKoxoe93Gdxfp4m7+66MMgra00pfBQJpPKzdAhsM
1029  AAoJEK6MMgra00pfIt0BAIHT2LmrhUSrMu/tPcZm2lp9hwLhll+ay9c3hLEL3Uvg
1030  AP0ZyMix6CQSXCIr18VuCcfofdVvS/Zc5wlZMKxJXfUjAw==
1031  =vB9J
1032  -----END PGP PUBLIC KEY BLOCK-----
1033  
1034  ```
1035  
1036  Github gitea and rad:
1037  
1038  [Messages](https://gist.githubusercontent.com/airborne-commando/b55a40c20edd0a2cc29797cd163d1632/raw/messages.txt)
1039  
1040  ```
1041  -----BEGIN PGP SIGNED MESSAGE-----
1042  Hash: SHA512
1043  
1044  https://app.radicle.xyz/nodes/rosa.radicle.xyz/users/did:key:z6MkvGytBYjSqWAzTQwiWnNHkRxBM3zvyvvFRCprxHzoZEj9
1045  
1046  https://app.radicle.xyz/nodes/iris.radicle.xyz/users/did:key:z6MkvGytBYjSqWAzTQwiWnNHkRxBM3zvyvvFRCprxHzoZEj9
1047  
1048  https://gitea.com/jc-denton/OPSEC-OSINT-Tools
1049  
1050  https://github.com/airborne-commando/OPSEC-OSINT-Tools
1051  
1052  https://gitlab.com/jcdenton0961/OPSEC-OSINT-Tools
1053  
1054  https://codeberg.org/cwhitman/OPSEC-OSINT-Tools
1055  
1056  If this expires and isn't renewed, either something happened to me or I forgot.
1057  -----BEGIN PGP SIGNATURE-----
1058  
1059  iHUEARYKAB0WIQSqMaHvdxncX6eJu/uujDIK2tNKXwUCaZtNvgAKCRCujDIK2tNK
1060  XxJIAQCy6kUuv85c2Y9XsdHYakGV4PsC6tQSSj8OiDfyv32iewEAjLZabL2EK+Vq
1061  +VcSHohdBL4IFPTOIrt4dLPI2XvomA0=
1062  =kaq8
1063  -----END PGP SIGNATURE-----
1064  
1065  ```
1066  
1067  
1068  ## External links:
1069  
1070  [Academic publishing overview - Copyright (updated Jun. 24, 2025)](https://guides.library.cmu.edu/c.php?g=1161877&p=9949658)
1071  
1072  [An in-depth guide to choosing a VPN - Network security (Updated Jan. 18, 2025)](https://freedom.press/digisec/blog/choosing-a-vpn/)
1073  
1074  [Best VPN Services: Which performs best? - VPN (Nov. 1, 2025)](https://cyberinsider.com/vpn/best/)
1075  
1076  [Guerilla Open Access Manifesto - Internet Archive (Swartz, Jul. 2008)](https://ia600101.us.archive.org/1/items/GuerillaOpenAccessManifesto/Goamjuly2008.pdf)
1077  
1078  [A Standalone Osint Agency For Stronger National Security - George Mason University (Gauthier, 2025)](https://nationalsecurity.gmu.edu/wp-content/uploads/2025/01/A-Standalone-OSINT-Agency-for-Stronger-National-Security-FINAL-WEB.pdf)
1079  
1080  [Why haven't technologies fixed open source intelligence? - James Madison University. (Sparks, 2014. pg. 110-111 "Developments to Watch")](https://commons.lib.jmu.edu/cgi/viewcontent.cgi?article=1013&context=master201019#page=118)
1081  
1082  [Data Brokers: What They Are and What You Can Do About Them - Safety Net Project (NNEDV, 2022)](https://archive.ph/CtGVB)
1083  
1084  [List of “People Searching” websites - Minnesota House of Representatives (n.d.)](https://www.house.mn.gov/comm/docs/6d27576c-8677-4541-b7c5-7be3a375a72c.pdf)
1085  
1086  [People Search - peopleconnect (n.d.)](https://peopleconnect.us/people-search/)
1087  
1088  [digital profiling - techtarget (Hanna, Jun. 11, 2024)](https://www.techtarget.com/whatis/definition/digital-profiling)
1089  
1090  [Beginner’s Guide to Hidden Data with Google Dorking - dorksearch (Jamie, Jan. 20, 2023)](https://archive.ph/BuniB)
1091  
1092  [Personal Security of First Responders in the Digital Age - JCAT (Mar. 31, 2021)](https://www.dni.gov/files/NCTC/documents/jcat/firstresponderstoolbox/111s_-_First_Responders_Toolbox_-_Personal_Security_of_First_Responders_in_the_Digital_Age-survey.pdf)
1093  
1094  [More about Dan - dmrussell (Russell, n.d.)](https://sites.google.com/site/dmrussell/more-about-dan)
1095  
1096  [Advanced Search Operators - Google Docs (Russell, Feb. 8, 2024)](https://docs.google.com/document/d/1ydVaJJeL1EYbWtlfj9TPfBTE5IBADkQfZrQaBZxqXGs) 
1097  
1098  [Washington Court Rules That Data Captured on Flock Safety Cameras Are Public Records - EFF (Lipton, Nov. 12, 2025)](https://www.eff.org/deeplinks/2025/11/washington-court-rules-data-captured-flock-safety-cameras-are-public-records)
1099  
1100  [This Flock Camera Leak is like Netflix For Stalkers - 404 Media (Jordan, Dec. 22, 2025)](https://www.youtube.com/watch?v=vU1-uiUlHTo)
1101  
1102  [OSINT: How to Find Information about ANYONE! - CyberFlow (Jan. 21, 2024)](https://www.youtube.com/watch?v=nd5W82KN9B8)
1103  
1104  [Google Hacking Database (Long, 2002)](https://www.exploit-db.com/google-hacking-database)
1105  
1106  [OSINT: how to find ALL information about ANYONE!! - Mad Hat (Oct. 24, 2025)](https://youtu.be/5wYMZVJupDg?t=309)
1107  
1108  [What is AI data poisoning? - cloudflare (2026)](https://www.cloudflare.com/learning/ai/data-poisoning/)
1109  
1110  [Maigret MCP Server - playbooks (n.d.)](https://playbooks.com/mcp/burtthecoder/mcp-maigret)
1111  
1112  [Maigret MCP Server: Installing manually - BurtTheCoder (Dec. 13, 2024)](https://github.com/BurtTheCoder/mcp-maigret?tab=readme-ov-file#installing-manually)
1113  
1114  [Publicly Available Data - West Virginia University (Oct. 12, 2023)](https://researchdata.wvu.edu/available-technology/human-data/data-source/publicly-available-data)
1115  
1116  [About the Right-to-Know Law - Pennsylvania Open Records (updated Oct. 31, 2018)](https://www.openrecords.pa.gov/RTKL/About.cfm)
1117  
1118  [25 records that you think would be publicly accessible but aren't in Pa. - pennlive.com (Murphy, Sep. 14, 2017)](https://www.pennlive.com/news/2017/09/inaccessible_public_records_th.html)
1119  
1120  [Docket Sheets - pacourts.us (2026)](https://www.pacourts.us/courts/supreme-court/docket-sheets)
1121  
1122  [US Supreme Court declines to hear dispute over copyrights for AI-generated material - reuters (Brittain, Mar. 2, 2026)](https://www.reuters.com/legal/government/us-supreme-court-declines-hear-dispute-over-copyrights-ai-generated-material-2026-03-02/)
1123  
1124  [AI Search Has a Citation Problem - Columbia Journalism Review(Jaźwińska Chandrasekar, Mar. 6, 2025)](https://www.cjr.org/tow_center/we-compared-eight-ai-search-engines-theyre-all-bad-at-citing-news.php)
1125  
1126  ## References:
1127  
1128  [^1]: Office of the Director of National Intelligence. “Intelligence Community.” Office of the Director of National Intelligence, www.odni.gov/index.php/ncsc-what-we-do/121-dni/intelligence-community. Accessed 24 Sept. 2025. (Office of the Director of National Intelligence, sec.HUMINT)
1129  
1130  [^2]: Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, and Narseo Vallina-Rodriguez. 2018. An Empirical Analysis of the Commercial VPN Ecosystem. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). Association for Computing Machinery, New York, NY, USA, 443–456. https://doi.org/10.1145/3278532.3278570
1131  
1132  [^3]: “Library Research Guides: Digital Privacy: Digital Privacy Practices.” Indiana University Bloomington, wayback machine, 7 July 2025, https://web.archive.org/web/20250208104257/https://guides.libraries.indiana.edu/c.php?g=1325689&p=9771453.
1133  
1134  [^3]: Department Of Justice. “Grand Jury Indicts 12 Russian Intelligence Officers for Hacking.” U.S. Department of Justice, 6 Feb. 2025, www.justice.gov/archives/opa/pr/grand-jury-indicts-12-russian-intelligence-officers-hacking-offenses-related-2016-election.
1135  
1136  [^4]: Department of Homeland Security. Freedom of Information Act (FOIA) Activity for the Week of March 20, 2025- March 26, 2025 DHS Privacy Office March 31, 2025 Weekly FOIA Report. 31 Mar. 2025, www.dhs.gov/sites/default/files/2025-07/25_0731_PRIV_Chief_FOIA_Officers_Weekly_Report_March_31_25_to_June_30_25.pdf.
1137  
1138  [^5]: “Ross Ulbricht, a/K/a ‘Dread Pirate Roberts,’ Sentenced in Manhattan.” U.S. Department of Justice, 29 May 2015, www.justice.gov/usao-sdny/pr/ross-ulbricht-aka-dread-pirate-roberts-sentenced-manhattan-federal-court-life-prison.
1139  
1140  [^6]: Lamoureux, Mack, and Mack Lamoureux. “How 4Chan’s Worst Trolls Pulled off the Heist of the Century.” VICE, 27 July 2024, www.vice.com/en/article/4chan-does-first-good-thing-pulls-off-the-heist-of-the-century1.
1141  
1142  [^7]: chasd00. "remember when 4chan figured out the location of a terrorist training camp from one of their PR photos and called in a literal airstrike? I like how 4chan is sometimes described as weaponized autism." 8 Dec. 2022, Imgur, https://imgur.com/N7DwWP1?r. Online forum comment.
1143  
1144  [^8]: “The Time 4Chan Called in an Airstrike.” Youtube, uploaded by Pezle, 17 Aug. 2023, www.youtube.com/watch?v=OR6epSP_Xlw.
1145  
1146  [^9]: "*Washington State Technology. What Is a VPN, and How Does It Work?*" Washington Technology Solutions. https://web.archive.org/web/20250403151533/https://watech.wa.gov/what-vpn-and-how-does-it-work. Accessed 25 Sept. 2025.
1147  
1148  [^10]: State Of New Jersey. “Virtual Private Networks.” State Of New Jersey Cybersecurity & Communications Integration Cell, www.cyber.nj.gov/guidance-and-best-practices/wi-fi-network-security/virtual-private-networks. Accessed 25 Sept. 2025.
1149  
1150  [^11]: New York University. “Demystifying the Dark Web: An Introduction to Tor and Onion Routing – Networks at ITP.” New York University, https://web.archive.org/web/20250811141831/https://itp.nyu.edu/networks/explanations/demystifying-the-dark-web-an-introduction-to-tor-and-onion-routing/.
1151  
1152  [^12]: CISA. “Defending Against Malicious Cyber Activity Originating From Tor.” Cybersecurity Infrastructure Security Agency, 2 Aug. 2021, https://web.archive.org/web/20250908095402/https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-183a.
1153  
1154  [^13]: CIA. “CIA’s Latest Layer: An Onion Site - CIA.” CIA, 7 May 2019, https://web.archive.org/web/20210205193613/https://www.cia.gov/stories/story/cias-latest-layer-an-onion-site/.
1155  
1156  [^14]: Kuo, Tsung-Ting et al. “Comparison of blockchain platforms: a systematic review and healthcare examples.” Journal of the American Medical Informatics Association : JAMIA vol. 26,5 (2019): 462-478. doi:10.1093/jamia/ocy185
1157  
1158  [^15]: Rüth, Jan, et al. “Digging into Browser-Based Crypto Mining.” Proceedings of the Internet Measurement Conference 2018, ACM, 2018, pp. 70–76. Crossref, https://doi.org/10.1145/3278532.3278539.
1159  
1160  [^16]: College of Staten Island Library. (2025, August 26). *Misinformation and disinformation: Thinking critically about information sources.* https://library.csi.cuny.edu/misinformation
1161  
1162  [^17]: Ghenai, Amira, and Yelena Mejova. "Catching Fire: Identifying Propaganda on Social Media in the Context of the Russia-Ukraine War." *PLOS ONE*, vol. 17, no. 2, Feb. 2022, p. e0263421. *PubMed Central*, doi:10.1371/journal.pone.0263421. Accessed 22 Sept. 2025.
1163  
1164  [^18]: Osint, Forensic. “In a Clever LinkedIn Post, Yoni Shares a Privacy Insight and a Practical OSINT Technique Worth Bookmarking.” linkedin, 7 Aug. 2025, www.linkedin.com/posts/forensicosint_in-a-clever-linkedin-post-yoni-shares-activity-7359045935919755266-JdTX.
1165  
1166  [^19]: “Syria’s Civil War Reignites in Dramatic Fashion as Russia Joins Airstrikes on Rebels Who Seized Aleppo.” CBS News, 2 Dec. 2024, www.cbsnews.com/news/syria-war-aleppo-airstrikes-russia-assad-rebels-offensive.
1167  
1168  [^20]: FBI. “Leading Member of the International Cyber Criminal Group LulzSec Sentenced in Manhattan Federal Court.” FBI, 27 May 2014, https://www.fbi.gov/contact-us/field-offices/newyork/news/press-releases/leading-member-of-the-international-cyber-criminal-group-lulzsec-sentenced-in-manhattan-federal-court.
1169  
1170  [^21]: Hope Trampski. “Hacktivism: The Short Life of LulzSec.” Purdue University cyberTAP, 5 Dec. 2024, https://web.archive.org/web/20250303215642/https://cyber.tap.purdue.edu/blog/articles/hacktivism-the-short-life-of-lulzsec/.
1171  
1172  [^22]: “Harvard Student Charged With Making Hoax Bomb Threat.” United States Department of Justice, 16 Dec. 2014, https://web.archive.org/web/20250710222935/https://www.justice.gov/usao-ma/pr/harvard-student-charged-making-hoax-bomb-threat.
1173  
1174  [^23]: “Cameroon: Soldiers Get 10 Years for Murder of Civilians.” Human Rights Watch, 28 Oct. 2020, www.hrw.org/news/2020/09/23/cameroon-soldiers-get-10-years-murder-civilians.
1175  
1176  [^24]: MPA, Brandon Burley. “OSINT Tools for Investigators to Track Criminal Activity Online.” Lexipol Media Group, 23 Aug. 2025, www.police1.com/investigations/thinking-like-a-criminal-how-osint-can-take-your-investigations-further.
1177  
1178  [^25]: Schifferle, L. W. (2016, December 14). *Ashley Madison settles with FTC over data security.* Federal Trade Commission. https://web.archive.org/web/20250801210212/https://www.ftc.gov/business-guidance/blog/2016/12/ashley-madison-settles-ftc-over-data-security
1179  
1180  [^26]: DIA. “OPEN SOURCE INTELLIGENCE (OSINT).” Defense Intelligence Agency, 23 Oct. 2023, www.dia.mil/About/Open-Source-Intelligence.
1181  
1182  [^27]: ODNI and CIA. “ODNI and CIA Release the Intelligence Community OSINT Strategy for 2024-2026.” office of the director of national intelligence, 8 Mar. 2024, www.dni.gov/index.php/newsroom/press-releases/press-releases-2024/3784-odni-and-cia-release-the-intelligence-community-osint-strategy-for-2024-2026.
1183  
1184  [^28]: “IC21: The Intelligence Community in the 21st Century.” U.S. Government Publishing Office, https://web.archive.org/web/20250118091240/https://www.govinfo.gov/content/pkg/GPO-IC21/html/GPO-IC21-6.html. Accessed 25 Sept. 2025.
1185  
1186  [^29]: dni. “JCAT Intelligence Guide for First Responders.” Office of the Director of National Intelligence, www.dni.gov/nctc/jcat/jcat_ctguide/intel_guide.html. Accessed 25 Sept. 2025.
1187  
1188  [^30]: Gomzin, Slava. “Telegram May Not Be as Secure as It Claims.” IEEE Spectrum, 14 Oct. 2024, https://web.archive.org/web/20250905150200/https://spectrum.ieee.org/telegram-security.
1189  
1190  [^31]: Signal. “Is It Private? Can I Trust It?” Signal, www.support.signal.org/hc/en-us/articles/360007320391-Is-it-private-Can-I-trust-it. Accessed 25 Sept. 2025.
1191  
1192  [^32]: “SimpleX: Redefining Privacy by Making Hard Choices.” SimpleX, 16 May 2024, www.simplex.chat/blog/20240516-simplex-redefining-privacy-hard-choices.html.
1193  
1194  [^33]: CSRC Content Editor. “*Operations Security (OPSEC) - Glossary.* *CSRC.*” Computer Security Resource Center, www.csrc.nist.gov/glossary/term/operations_security. Accessed 25 Sept. 2025.
1195  
1196  [^34]: Department Of Labor. “Operations Security (OPSEC).” United States Department Of Labor, https://web.archive.org/web/20250516072228/https://www.dol.gov/agencies/oasam/centers-offices/emergency-management-center/operations-security. Accessed 25 Sept. 2025.
1197  
1198  [^35]: “Guides: Finding Datasets: Public Data Sources.” University of North Texas Libraries, 22 Jan. 2025, https://guides.library.unt.edu/datasets/public-data-sources.
1199  
1200  [^36]: Law Insider. (2025). *Commercial data definition*. Law Insider Dictionary. Retrieved from https://www.lawinsider.com  
1201  
1202  [^37]: Joseph, E. (2025, September 24). *What is grey literature?* Johns Hopkins University, Welch Medical Library. https://browse.welch.jhmi.edu/c.php?g=1195274
1203  
1204  [^38]: University of Maryland Libraries. (2023). *Research guides: Maryland genealogy: What is genealogical research?* University of Maryland. https://lib.guides.umd.edu/c.php?g=326980&p=2198795 
1205  
1206  [^39]: Virginia Tech University Libraries. (n.d.). *Research guides: Genealogy: Index.* Virginia Tech. https://guides.lib.vt.edu/topics/genealogy
1207  
1208  [^40]: “The Comprehensive Chris Chan Documentary.” www.youtube.com, uploaded by GenoSamuel, 24 Feb. 2019, www.youtube.com/playlist?list=PLABqEYq6H3vpCmsmyUnHnfMOeAnjBdSNm. 
1209  
1210  [^41]: Leighton, Mara, et al. “A Timeline of Chris Chan’s Incest Charge and Dismissal, Which Came After Years of Online Trolling That Documented the Creator’s Relationship With Her Mother.” Business Insider, 18 Aug. 2024, www.businessinsider.com/chris-chan-saga-timeline-incest-charges-arrest-2021-8. 
1211  
1212  [^42"]: IMDb. “Christine Weston Chandler.” IMDb, www.imdb.com/name/nm4813395. Accessed 25 Sept. 2025.
1213  
1214  [^43]: bugzorc. “suspectAGB.” *opsecfail*, http://web.archive.org/web/20250811043247/http://www.opsecfail.github.io/blog.html?filecase=suspectAGB. wayback machine archive.
1215  
1216  [^44]: Evans, Jacob. “Alex Smith: Drill Rappers Sentenced to Life Over Street Stabbing.” *BBC*, 12 May 2023, www.bbc.com/news/uk-england-london-65570367.
1217  
1218  [^45]: bugzorc. “W0RMER.” opsecfail, http://web.archive.org/web/20250811043247/https://opsecfail.github.io/blog.html?filecase=w0rmer. wayback machine archive.
1219  
1220  [^46]: “W0rmer – Darknet Diaries.” darknetdiaries, episode 63, 14 Apr. 2020, https://darknetdiaries.com/transcript/63.
1221  
1222  [^47]: Centre for Information Resilience. “OSINT 101: What Is Open Source Intelligence (OSINT)? - Centre for Information Resilience.” Centre for Information Resilience, 1 Sept. 2023, https://info-res.org/afghan-witness/articles/osint-101-what-is-open-source-intelligence-osint. Accessed 25 Sept. 2025.
1223  
1224  [^48]: Wild, Johanna. “Introducing Bellingcat’s Collaborative Open Source Toolkit.” Bellingcat, 24 Sept. 2024, www.bellingcat.com/resources/2024/09/24/bellingcat-online-investigations-toolkit.
1225  
1226  [^49]: Ibm. “Penetration Testing.” ibm.com, www.ibm.com/think/topics/penetration-testing. Accessed 25 Sept. 2025.
1227  
1228  [^50]: Martisiute, Laura. “A Guide to Doxxing Yourself on the Internet - JoinDeleteMe.” joindeleteme, 22 Jan. 2024, www.joindeleteme.com/doxxing/a-guide-to-doxxing-yourself-on-the-internet.
1229  
1230  [^51]: U.S. Small Business Administration. “Market Research and Competitive Analysis.” U.S. Small Business Administration, https://web.archive.org/web/20250928084324/https://www.sba.gov/business-guide/plan-your-business/market-research-competitive-analysis archived. Accessed 25 Sept. 2025.
1231  
1232  [^52]: FBI. “Behavioral Analysis.” FBI, https://web.archive.org/web/20251002110329/https://www.fbi.gov/how-we-investigate/behavioral-analysis archived. Accessed 25 Sept. 2025.
1233  
1234  [^53]: Bagdasar, Hannah. “Recognising Sexual and Gender-Based Violence as an Open Source Researcher - Bellingcat.” Bellingcat, 3 Mar. 2023, www.bellingcat.com/resources/2023/03/03/sexual-and-gender-based-violence-open-source-researche-osint-digital.
1235  
1236  [^54]: FTC. “What to Know About People Search Sites That Sell Your Information.” FTC, July 2022, https://web.archive.org/web/20251004225452/https://consumer.ftc.gov/articles/what-know-about-people-search-sites-sell-your-information. archived
1237  
1238  [^55]: Bhuiyan, Johana. “Ukraine Uses Facial Recognition Software to Identify Russian Soldiers Killed in Combat.” The Guardian, 24 Mar. 2022, www.theguardian.com/technology/2022/mar/24/ukraine-facial-recognition-identify-russian-soldiers.
1239  
1240  [^56]: “Hacker Pleads Guilty to Infiltrating AT&T Servers, iPad Data Breach.” FBI, 23 June 2011, https://web.archive.org/web/20250418203907/archives.fbi.gov/archives/newark/press-releases/2011/hacker-pleads-guilty-to-infiltrating-at-t-servers-ipad-data-breach. archived
1241  
1242  [^57]: Federal Bureau of Investigation. (2012, March 6). Six hackers in the United States and abroad charged for crimes affecting over one million victims. FBI. https://web.archive.org/web/20251006042908/https://archives.fbi.gov/archives/newyork/press-releases/2012/six-hackers-in-the-united-states-and-abroad-charged-for-crimes-affecting-over-one-million-victims archived
1243  
1244  [^58]: Katz, Basil. “Four Irish, British Suspects Helped Stratfor Hack: U.S.” Reuters, 2 May 2012, www.reuters.com/article/world/us/four-irish-british-suspects-helped-stratfor-hack-us-idUSBRE8411P7.
1245  
1246  [^58]: Adler, David. “Silk Road: The Dark Side of Cryptocurrency.” Fordham Journal of Corporate and Law, 21 Feb. 2018, news.law.fordham.edu/jcfl/2018/02/21/silk-road-the-dark-side-of-cryptocurrency.
1247  
1248  [^59]: “Ross William Ulbricht’s Laptop.” FBI, www.fbi.gov/history/artifacts/ross-william-ulbrichts-laptop. Accessed 25 Sept. 2025.
1249  
1250  [^60]: Oliyaee, A. (2024, March 31). *Ross Ulbricht’s laptop: The heart of the Silk Road.* *Plasbit.* https://web.archive.org/web/20241110235927/https://plasbit.com/blog/ross-ulbricht-laptop
1251  
1252  [^61]: Reiff, Nathan. “Who Is Ross Ulbricht?” Investopedia, 24 Jan. 2025, www.investopedia.com/tech/ross-ulbricht-dark-net-pirate.
1253  
1254  [^62]: Hayes, Christal. “Trump Pardons Silk Road Creator Ross Ulbricht.” BBC, 22 Jan. 2025, www.bbc.com/news/articles/cz7e0jve875o.
1255  
1256  [^63]: Mullvad. “No-logging of User Activity Policy.” Mullvad, 23 May 2025, mullvad.net/en/help/no-logging-data-policy.
1257  
1258  [^64]: mullvad. “*Mullvad VPN* *Privacy Is a Universal Right.*” Mullvad, 27 Mar. 2025, mullvad.net/en/blog/tag/audits.
1259  
1260  [^65]: “Why Mullvad VPN?” Mullvad, mullvad.net/en/why-mullvad-vpn. Accessed 25 Sept. 2025.
1261  
1262  [^66]: Electronic Frontier Foundation. "Doxxing: Tips To Protect Yourself Online & How to Minimize Harm." Electronic Frontier Foundation, 14 Dec. 2020, www.eff.org/deeplinks/2020/12/doxxing-tips-protect-yourself-online-how-minimize-harm. Accessed 23 Sept. 2025.
1263  
1264  [^67]: Shin, Nancy. "Scholarly Publishing Explained." *Welch Medical Library*, Johns Hopkins University, Sep 25, 2025. https://browse.welch.jhmi.edu/scholarly_publishing/explanation
1265  
1266  [^68]: “North Korean Regime-Backed Programmer Charged With Conspiracy To.” United States Department of Justice, 6 Feb. 2025, https://web.archive.org/web/20251006082434/https://www.justice.gov/archives/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and.
1267  
1268  [^69]: Priya. (2025, September 5). *North Korean hackers shift strategies – Replacing old infrastructure with new assets*. *Cyberpress*. https://cyberpress.org/north-korean-hackers/
1269  
1270  [^70]: Department of Justice. (2025, January 21). Ross William Ulbricht: A full and unconditional pardon. https://web.archive.org/web/20250124015136/https://www.justice.gov/pardon/media/1386096/dl
1271  
1272  [^71]: Hughes, E. (1993, March 9). *A Cypherpunk’s manifesto*. Activism.net. https://www.activism.net/cypherpunk/manifesto.html
1273  
1274  [^72]: Arnold, Miriam et al. “Dealing with information overload: a comprehensive review.” Frontiers in psychology vol. 14 1122200. 21 Jun. 2023, doi:10.3389/fpsyg.2023.1122200
1275  
1276  [^73]: Protect Democracy. (2024, June 26). Why is voter registration data public? https://protectdemocracy.org/work/why-is-voter-registration-data-public/
1277  
1278  [^74]: Colorado Secretary of State. (n.d.). Public voter data and information requests FAQs. Retrieved December 8, 2025, from https://www.sos.state.co.us/pubs/elections/FAQs/VoterRegistrationData.html
1279  
1280  [^75]: *Metal Gear Solid 2: Sons of Liberty.* Written and directed by Hideo Kojima, Konami, 2001. Transcript by Artemio Urbina, *Junker HQ*, junkerhq.net/MGS2/Text.html. Accessed 25 Dec. 2025.
1281  
1282  [^76]: Swagger, "Get started with the OpenAPI Specification," [Online]. Available: https://swagger.io/solutions/getting-started-with-oas/. [Accessed: Dec. 27, 2025].
1283  
1284  [^77]: University of Exeter Library. (2025, December 4). *Grey literature*. https://libguides.exeter.ac.uk/greylit