Category: OSINT — Techniques and Methodology
-

Instagram password resets: what's going on?
Setting the Stage During the week of January 5th to 11th, many people posted on social media about unexpected emails requesting a password reset for their Instagram accounts. In this article, we analyze what actually happened, to the best of our knowledge and available information, and debunk some attempts to…
-

Why Telegram's "one-click IP leak" isn't a vulnerability
Recently, worrying rumors about a vulnerability that could allow a Telegram user's IP address to be leaked have been circulating across the internet. In this article, we assess the severity of this alleged "vulnerability," how the "exploit" works, and what you can do before falling for it. Finally, we explore a series of considerations to keep in mind...
-

An app for safe everyday browsing
Why Everyday Privacy Matters Everyday browsing may seem like a casual scroll, but it's also a constant stream of data silently following you across the internet. Most popular sites embed multiple third-party trackers into a single page, so every click delivers snippets of your behavior to dozens…
-

Emoji: Signals in Digital Noise
Emojis can become intelligence data. Online communities use them to signal group identity, communicate in code, and circumvent moderation and monitoring systems. Their meaning is not universal, but contextual, so it can be identified and understood.
-

Debriefing a Broken Heart: A Review of "Emotional Cognitive Warfare"“
The most common professional bias of an intelligence analyst is analyzing everything, including romantic relationships. Astore dei Boschi's "Emotional Cognitive Warfare" begins precisely with this assumption, analyzing a "non-relationship" as if it were a war scenario. The author applies the concepts of HUMINT, cognitive bias, and cognitive warfare to the field of…
-

Why do you need to know ICD 203?
Let's be clear: a lot of people pontificate online about OSInt. The problem? They often focus on the tools and techniques for data collection, completely neglecting the methodologies and analysis techniques to use. Collecting data isn't "doing OSInt." It's just taking up disk space. The real difference is made by you, OSInt analyst, with your skills...