OSINT Techniques

Resources for Uncovering Online Information - 10th Edition (2023)

36 chapters | 260,000 words | 550 pages | Hardcover & Paperback

It is time to look at OSINT in a different way. For many years, and within the previous editions of this book, we have relied on external resources to supply our search tools, virtual environments, and investigation techniques. We have seen this protocol fail us when services shut down, websites disappear, and custom resources are dismantled due to outside pressures. This book aims to correct our dilemma. We will take control of our investigative resources and become self-reliant. There will be no more need for online search tools; we will make and host our own locally. We will no longer seek pre-built virtual machines; we will create and configure our own. The new OSINT professional must be self-sustaining and possess their own tools and resources. You will become a more proficient subject matter expert who will be armed with the knowledge and readiness to articulate the sources of your findings.

This new 10th edition contains hundreds of pages which have been updated to keep your OSINT investigative methods fresh. It includes new online and offline search tools; a new Linux OSINT virtual machine; and tutorials to replicate Linux OSINT tools within Mac and Windows operating systems. Brand-new search methods for Facebook, Instagram, LinkedIn, YouTube, and others ensure you have the latest techniques within your online investigation arsenal. An entire section is devoted to Methodology, Workflow, Documentation, and Ethics which provides a clear game plan for your next active investigation. All digital files are included via download. Today, we start over.

10th Edition Changes & Summary


If you have the 9th edition of this book, you may want to know what has changed in this 10th edition. The previous edition of this book was originally written in late 2021. In late 2022, I was asked to update this book, as it is required reading for numerous college courses, university degrees, and government training academies. I never want stale or inaccurate information being presented within training programs, so I created this special revision. I estimate that 20% of the content is brand new, 20% has been updated to reflect changes throughout 2022, and the remaining 60% is recycled from the from the previous edition. Much of the ninth edition content was still applicable and only needed minor updates to reflect changes since 2021. If you have read the previous edition, you will find most of those overall strategies within this book. However, I have added many new OSINT methods which complement the original text in order to cater to those who always need accurate information. I also removed a lot of outdated content which was no longer applicable. I believe there is much new value within this updated text. The majority of the updates are available in chapters 2, 3, 4, 5, 6, 7, 8, 23, 28, 30, 31, 32, and 33, along with the digital files which accompany them. The other chapters all have minor updates.

This edition presents six new chapters unavailable within previous versions. These include Broadcast Streams (23), Application Programming Interfaces (28), and an entire new section containing four chapters about Data Leaks (30), Data Breaches (31), Stealer Logs (32), and Ransomware (33). I am very excited to release these new chapters, as I believe they introduce the future of OSINT analysis.

All purchases include free download of updated custom search tools; updated Linux, Mac, and Windows OSINT scripts to build your own virtual machines; detailed cheat-sheets to simplify each process; and a single Linux command to build a complete 2023 OSINT VM with every tool in the entire book. You can find your custom login link and credentials within chapters 3, 4, 5, and 6 of each book which provides permanent online access to all files. The outline is below.

Introduction

SECTION I: OSINT Preparation

CHAPTER 01: Computer Optimization
CHAPTER 02: Linux Virtual Machine
CHAPTER 03: Web Browsers
CHAPTER 04: Linux Applications
CHAPTER 05: VM Maintenance & Preservation
CHAPTER 06: Mac & Windows Hosts
CHAPTER 07: Android Emulation
CHAPTER 08: Custom Search Tools

SECTION II: OSINT Resources and Techniques

CHAPTER 09: Search Engines
CHAPTER 10: Social Networks: Facebook
CHAPTER 11: Social Networks: Twitter
CHAPTER 12: Social Networks: Instagram
CHAPTER 13: Social Networks: General
CHAPTER 14: Online Communities
CHAPTER 15: Email Addresses
CHAPTER 16: Usernames
CHAPTER 17: People Search Engines
CHAPTER 18: Telephone Numbers
CHAPTER 19: Online Maps
CHAPTER 20: Documents
CHAPTER 21: Images
CHAPTER 22: Videos
CHAPTER 23: Broadcast Streams
CHAPTER 24: Domain Names
CHAPTER 25: IP Addresses
CHAPTER 26: Government & Business Records
CHAPTER 27: Virtual Currencies
CHAPTER 28: Application Programming Interfaces (APIs)
CHAPTER 29: Advanced Linux Tools

SECTION III: Leaks, Breaches, Logs, & Ransomware

CHAPTER 30: Data Leaks
CHAPTER 31: Data Breaches
CHAPTER 32: Stealer Logs
CHAPTER 33: Ransomware

SECTION IV: OSINT Methodology

CHAPTER 34: Methodology & Workflow
CHAPTER 35: Documentation
CHAPTER 36: Policy & Ethics

Conclusion

Release Schedule


OSINT Techniques (10th Edition Hardcover, Paperback, and Digital) was originally published in January 2023. There are currently no plans for any future print or digital editions. Any future digital releases will be supplemental guides to this text.

Print Versions


Amazon-United States
Amazon-Canada
Amazon-Mexico
Amazon-UK
Amazon-Germany
Amazon-France
Amazon-Italy
Amazon-Spain
Amazon-Sweden
Amazon-Netherlands
Amazon-Poland
Amazon-Australia
Amazon-Japan
Amazon-Singapore
Amazon-Turkey
Amazon-UAE
Amazon-Brazil
Amazon-India

Please note: We do not sell books directly, and we carry no stock. Many readers report the ability to order copies from local book stores. We have no control over distribution or pricing. Unfortunately, most POD distributors refuse to print a book of this size, forcing us to rely on Amazon for online distribution. As an Amazon Associate we earn from qualifying purchases from this page.

Digital Version



Click buttons above to order only this book or all books, or click HERE to place this item in a cart for multiple book purchases, then click the following to continue shopping.

OSINT Techniques (10th Edition)
OSINT Techniques: Leaks, Breaches & Logs
OSINT Techniques: The Ultimate Virtual Machine
Extreme Privacy (4th Edition)
Extreme Privacy: Mobile Devices
Extreme Privacy: macOS Devices
Extreme Privacy: Linux Devices
Extreme Privacy: VPNs & Firewalls

PDFs will be immediately available for download after purchase, and an email will also include the download link. You must provide an email address where we can reach you to deliver your content. This can be a masked, forwarding, or private email provider, but please do not use temporary addresses which you will not be able to control in the future. All PDFs will include a visible and hidden watermark with your order number, but will not include your name, email, or any other personally identifying text. There will be no digital updates to this version, as we want to preserve the content as originally published. It is designed for those who prefer a digital experience and want the ability to easily copy text or print a specific page. All orders are delivered via SendOwl, and purchasing details are submitted through our own Stripe account. We do not store your credit card information. Due to the nature of instant delivery of digital products, all sales are final.

Digital Files


All purchases include free download of updated custom search tools; updated Linux, Mac, and Windows OSINT scripts to build your own virtual machines; detailed cheat-sheets to simplify each process; and a single Linux command to build a complete 2023 OSINT VM with every tool in the entire book. You can find your custom login link and credentials within chapters 3, 4, 5, and 6 of each book which provides permanent online access to all files.