Executive EDC Bags

I am a bag nerd. I have more backpacks, briefcases, totes, and duffels than I will ever need, or could ever use. I am extremely picky about having the appropriate bag for each job. Many of you already know that I rely on the SLNT E3 Backpack when I travel, as I reviewed in Issue 006 of UNREDACTED Magazine. While it is ideal for me as the one encapsulation of all gear and clothing for short travel, it is not a catch-all for every situation. I also need specific bags for everyday carry (EDC).

Recently, I assisted a client with some urgent last-minute needs. I had all of the gear I needed, but was not prepared for the environment I would be in. First, it was very apparent that I needed a nice tailored suit to even attempt to blend in. My client had a "suit guy", so that was solved quickly. Next, I needed some specific gear with me at all times, but showing up with a backpack draped over my new suit was not an option. I needed a discreet briefcase which was efficient, secure, and private. I embrace any excuse to buy a new bag, so I went shopping.

This post is not an endorsement for any specific brand and I was not asked to write this review. This is only intended as documentation of my considerations when choosing a bag for specific needs. I hope it sparks interest in identifying your own needs and presents new considerations for your next bag.

First, let's discuss the aesthetics of an executive briefcase. I lean on the show Rubicon to start our discussion:

 

I never use that specific type of bag, but I appreciate the following opinions:

Nothing eye-catching
Nothing which announces its newness, its cost, or its distinctiveness
Nothing which makes a noise when opening
Requires a proper handle (not a shoulder strap)

From my experience, stores such as Walmart, Target, and Kohls will not provide anything of value. It is all cheap junk. My first stop was Best Buy. This may surprise you, but Best Buy usually carries a decent selection of bags. The rest of the store is typically useless to me, but I can always find a last-minute bag. I went with the Samsonite 15.6 Laptop Professional Grade 2 bag which was on sale for $50 with retail of $70. It was perfect, but I want to explain why.

I carry a 14" laptop, so most bags will enclose it fine. However, I do not want things to be too loose and sliding around. I also carry a 8.5" x 11" e-reader and I do not want the two items to be too tight. On top of that, I always travel with my laptop within a SLNT Farady sleeve, so I need extra room for that. I find most 15" bags work well for me, but some are too tight. This bag held both perfectly. The following displays both items in place while open and closed.

Next, I demand the perfect amount of storage. I do not like bags which are too tight and require me to remove things to get to the item I need. I also do not want things to ever move during transit. I need pockets. The following displays my item placement. Always consider your own items when choosing an EDC bag,

The outer pocket has compartments for small items, and the bottom has an extended gap for flashlight, knife, and extra pistol magazine. The secondary zipped pocket holds my Faraday wallet (far-right) which contains all cash, cards, and passport. It is thick enough to support an Apple USB-C charging block, which I use for my Linux laptop, GrapheneOS device, e-reader, and all other USB items. Although this compartment only possesses a single zipper, it can be attached to the side clasp with a zip-tie or lock. The other compartments are dual-zipper, which also supports zip ties to prevent access to pockets in crowded areas. The back pouch is thin, but supports cables. All zippers are silent.

Finally, I insist that my phone is protected in a Faraday bag when I travel and while I am in sensitive meetings. I could toss the Faraday bag into a large briefcase pocket, but I prefer a designated area. This bag possesses the perfect slot which houses my Faraday bag, and is extremely snug when the phone is inside of it. I would not trust this setup in congested public transportation, but it was ideal for this situation, and gave me easy access to my device. The final placement appeared as part of the bag, and did not seem to welcome a pick-pocketer.

This may be overkill for most, but I enjoy the luxury of a perfect bag. Nothing moves around as I walk, the bag is presentable in an executive environment, it supports the weight of all gear without sagging or feeling stressed, and I don't feel like a child at the big-boys meeting when I walk in with my Jansport school bag slung over my shoulder.

No bag is perfect for everyone, and this bag was my only real option in a moment of desperation. However, it has turned into one of my favorites for meetings.

Disclosures: I have no association to Samsonite and I receive no kickback for any purchases. I am a long-time affiliate of SLNT.

OSINT Techniques 11th Edition Now Available

Thanks to an incredibly talented co-author and extremely efficient editing team, we have released the 11th Edition of OSINT Techniques.

Full Details: https://inteltechniques.com/book1.html

47 Chapters | 590 Pages | Digital available now (Paperback Soon).

The previous edition of this book was originally written in late 2022. In mid 2024, I was asked to update this book, as it is required reading for numerous college courses, university degrees, and government training academies. I never want stale or inaccurate information being presented within training programs, so I created this special revision. I estimate that 20% of the content is brand new, 20% has been updated to reflect changes throughout 2024, and the remaining 60% is recycled from the from the previous edition. Much of the tenth edition content was still applicable and only needed minor updates to reflect changes since 2022. If you have read the previous edition, you will find most of those overall strategies within this book. However, I have added many new OSINT methods which complement the original text in order to cater to those who always need accurate information. I also removed a lot of outdated content which was no longer applicable. I believe there is much new value within this updated text. This edition presents several new chapters unavailable within previous versions and incorporates the previously-available digital supplement guides about virtual machines and data breaches, leaks, and logs.

All purchases include free download of updated custom search tools; updated Linux scripts to build your own virtual machines; detailed cheat-sheets to simplify each process; and a single Linux command to build a complete OSINT VM with every tool in the entire book. The outline is below.

Introduction

SECTION I: OSINT Virtual Machines

CHAPTER 01: Why Virtual Machines?
CHAPTER 02: macOS Host Optimization
CHAPTER 03: macOS VM Software
CHAPTER 04: Linux Host Optimization
CHAPTER 05: Linux VM Software
CHAPTER 06: Windows Host Optimization
CHAPTER 07: Windows VM Software
CHAPTER 08: OSINT VM Operating Systems
CHAPTER 09: OSINT VM Web Browsers
CHAPTER 10: OSINT VM Applications
CHAPTER 11: OSINT VM Scripts
CHAPTER 12: OSINT VM APIs
CHAPTER 13: OSINT VM Maintenance
CHAPTER 14: OSINT VM Automated Build
CHAPTER 15: Android Virtualization
CHAPTER 16: Custom Search Tools

SECTION II: OSINT Resources & Techniques

CHAPTER 17: Search Engines
CHAPTER 18: Social Networks: Facebook
CHAPTER 19: Social Networks: X (Twitter)
CHAPTER 20: Social Networks: Instagram
CHAPTER 21: Social Networks: TikTok
CHAPTER 22: Online Communities
CHAPTER 23: Email Addresses
CHAPTER 24: Usernames
CHAPTER 25: People Search Engines
CHAPTER 26: Telephone Numbers
CHAPTER 27: Online Maps
CHAPTER 28: Documents
CHAPTER 29: Images
CHAPTER 30: Videos
CHAPTER 31: Broadcast Streams
CHAPTER 32: Domain Names
CHAPTER 33: IP Addresses
CHAPTER 34: Government & Business Records
CHAPTER 35: Virtual Currencies

SECTION III: Leaks, Breaches, Logs, & Ransomware

CHAPTER 36: Investigative Benefits
CHAPTER 37: Hardware Configuration
CHAPTER 38: Software Configuration
CHAPTER 39: Terminal Commands
CHAPTER 40: Data Leaks
CHAPTER 41: Data Breaches
CHAPTER 42: Stealer Logs
CHAPTER 43: Ransomware
CHAPTER 44: Scripts, Databases, & Backups

SECTION IV: OSINT Methodology

CHAPTER 45: Methodology & Workflow
CHAPTER 46: Documentation & Reporting
CHAPTER 47: Policy, Ethics, & Development

CONCLUSION

Digital Guide Updates 2024.11.01

Today, we updated seven of our digital supplement guides with new information. If you purchased any, please check your email for the download link(s). If you would like more information on these guides, please visit https://inteltechniques.com/books.html. The following provides details of each update:

Extreme Privacy-5th Edition:
Pages 60-61 (Major): Added tutorial for Brew re-installation of an application.
Page 103 (Minor): Slight clarification on Android Backups.
Pages 108-109 (Major): Updated iOS settings.
Pages 259-282 (Minor): Applied Strikethrough to all broken sites.
Data Removal Workbook (Minor): Removed all broken sites.

OSINT Techniques-Leaks, Breaches, and Logs:
Page 84 (Minor): Added section about another Telegram Search option.

OSINT Techniques-The Ultimate Virtual Machine:
Page 97 (Major): Updated SearXNG update path.
Page 106 (Minor): Removed Videodownloadhelper from book and Firefox import profile.

Extreme Privacy-Mobile Devices:
Page 13 (Minor): Updated supported Pixel devices
Page 114 (Minor): Added an extremely minor Signal number clarification.
Page 150 (Minor): Added Enhanced Visual Search setting.

Extreme Privacy-macOS Devices:
Page 49 (Major): Added tutorial for Brew re-installation of an application.

Extreme Privacy-Linux Devices:
Page 24 (Minor): Added section about Pop!_OS Cosmic Alpha builds.

Extreme Privacy-VPNs and Firewalls:
Page 32 (Minor): Included comments on newer Protectli devices.

 

Digital Guide Updates 2024.10.01

Today, we updated three of our digital supplement guides with vital information. If you purchased any, please check your email for the download link(s). If you would like more information on these guides, please visit https://inteltechniques.com/books.html. The following provides details of each update:

Extreme Privacy-5th Edition:
Page 85 (Major): Updated auto Wi-Fi settings
Page 86 (Major): Updated PIN scrambling settings
Page 87 (Major): Updated auto reboot settings
Page 527 (Minor): Added reference to a disinformation article.
Entire Guide (Minor): Several grammar tweaks.

Extreme Privacy-Mobile Devices:
Page 22 (Major): Updated auto Wi-Fi settings
Page 25 (Major): Updated PIN scrambling settings
Page 25 (Major): Updated auto reboot settings
Pages 149-150 (Major): Updated all items for iOS 18

Extreme Privacy-macOS Devices:
Pages 17-18 (Major): Updated all items for macOS Sequoia

OSINT Techniques-The Ultimate Virtual Machine (sent last week):
Pages 192,196,197,220,231 (Major): Updated all scripts and access URLs. This only matters if you are building a new VM, and will not impact any existing VMs.