Episode 33: We speak with guest Jan Tegze from sourcing.games, analytic thinking, beyond EXIF in photos, and more...




The OSINT Curious Project show

Summary: <h3>People in this Episode</h3> <ul> <li>Nico (Dutch_Osintguy)</li> <li>Matthias Wilson (MWOsint)</li> <li>Nixintel</li> <li>Lorand Bodo (Lorandbodo)</li> <li>Rae Baker (wondersmith_rae)</li> <li>Technisette</li> <li>Special Guest : <strong>Jan Tegze</strong> (<a href="https://twitter.com/jantegze" rel="noreferrer noopener" target="_blank">@jantegze</a>) more info on <a href="https://www.sourcing.games/" rel="noreferrer noopener" target="_blank">sourcing.games</a> </li> </ul> <h3>Links to what we discussed</h3> <ul> <li>Training yourself how to be an analytical thinker <a href="https://medium.com/@raebaker/training-yourself-to-be-an-analytical-thinker-476bdb7e7c99">https://medium.com/@raebaker/training-yourself-to-be-an-analytical-thinker-476bdb7e7c99</a> </li> <li>Related to having an Analytical mind this shows analytical techniques in action through real cases <a href="https://study.sagepub.com/system/files/beebepherson2e_im_0.pdf">https://study.sagepub.com/system/files/beebepherson2e_im_0.pdf</a> </li> <li>Shows how EXIF data works, but also encourages people to keep digging into images even when EXIF data has been removed because it can still contain material of interest <a href="https://nixintel.info/osint/the-secret-life-of-jpegs/">https://nixintel.info/osint/the-secret-life-of-jpegs/</a> </li> <li>3 useful links for getting familiar with using api’s and python <a href="https://twitter.com/unknownuser1806/status/1244632977746718720?s=21">https://twitter.com/unknownuser1806/status/1244632977746718720?s=21</a> </li> <li>Alternative to Python? <a href="https://julialang.org/">https://julialang.org/</a> </li> <li>Thread by Thomas from Pointer on fake news during covid (graphic images warning) <a href="https://twitter.com/Thms_Pointer/status/1245701702092759042">https://twitter.com/Thms_Pointer/status/1245701702092759042</a> </li> <li>Great dashboard from OSINTCombine with loads of information on COVID19 from multiple sources <a href="https://twitter.com/osintcombine/status/1244383237494824960">https://twitter.com/osintcombine/status/1244383237494824960</a> </li> <li>Nice quiz on OPSEC, more OSINT related quizzes to come as well <a href="https://twitter.com/aware_online/status/1243087218270486529">https://twitter.com/aware_online/status/1243087218270486529</a> </li> <li>Great case in which lots of different OSINT techniques are used. Tracking illicit arms trading with GEOINT, reverse image searching, SOCMINT (Twitter and Facebook), corporate research and maritime OSINT <a href="https://openfacto.fr/mv-single-eagle-from-second-hand-cars-to-air-defense-systems/">https://openfacto.fr/mv-single-eagle-from-second-hand-cars-to-air-defense-systems/</a> </li> <li>An OSINT/DFIR project on an OSINT tool with a surprising outcome <a href="https://keyfindings.blog/2020/03/23/be-careful-what-you-osint-with/">https://keyfindings.blog/2020/03/23/be-careful-what-you-osint-with/</a> </li> <li>How to land a job in OSINT <a href="https://osintcurio.us/2020/04/01/how-to-land-an-osint-job/">https://osintcurio.us/2020/04/01/how-to-land-an-osint-job/</a> </li> <li>Facebook tips and 10 minute tip video <a href="https://osintcurio.us/2020/04/02/facebook-tips/">https://osintcurio.us/2020/04/02/facebook-tips/</a> </li> </ul> <h3>Self Promotion</h3> <ul> <li>Micah and Dutch_Osintguy will be doing OSINT SEC487 Sans Cybercast trainings the coming months <a href="https://www.sans.org/course/open-source-intelligence-gathering?utm_medium=Social&amp;utm_source=Twitter&amp;utm_content=CDE+BTO+-+2018&amp;utm_campaign=SEC487+Open-Source+Intel+Beta+One">https://www.sans.org/course/open-source-intelligence-gathering</a> </li> <li>Stay tuned for more OSINTcurious lunches/breaksfast/dinner <a href="https://twitter.com/osintcurious">https://twitter.com/osintcurious</a> </li> </ul> --- Support this podcast: <a href="https://anchor.fm/osintcurious/support" rel="payment">https://anchor.fm/osintcurious/support</a>