New Digital Book Provider

We are currently testing the waters with Payhip as a replacement for SendOwl. We expect a few hurdles, but let us know if you have any issues placing an order. They also do not allow us to send out updates, but the transition should allow us to continue to offer PDFs on our site. As a reminder, all future updates will be posted to our Blog, so please monitor things there, or better yet subscribe to the feed there.

New Ebook Updates

We were informed this week that our digital book distributor (Sendowl) will be terminating our distribution plan on April 24th, 2025 and will be forcing migration into their new structure at that time. This new plan eliminates the option to send readers free PDF updates and applies a 6-fold overall rate increase, which we will absorb without a price change. Because of this change at Sendowl, the final PDF updates to all digital guides were sent on March 29, 2025. Please be sure to download your PDFs before April 24th, 2025! From now on, any necessary content updates will appear on this Blog. This does not impact print books on Amazon. This Blog will stay active. The digital files for all guides will continue to receive updates.

Executive EDC Bags

I am a bag nerd. I have more backpacks, briefcases, totes, and duffels than I will ever need, or could ever use. I am extremely picky about having the appropriate bag for each job. Many of you already know that I rely on the SLNT E3 Backpack when I travel, as I reviewed in Issue 006 of UNREDACTED Magazine. While it is ideal for me as the one encapsulation of all gear and clothing for short travel, it is not a catch-all for every situation. I also need specific bags for everyday carry (EDC).

Recently, I assisted a client with some urgent last-minute needs. I had all of the gear I needed, but was not prepared for the environment I would be in. First, it was very apparent that I needed a nice tailored suit to even attempt to blend in. My client had a "suit guy", so that was solved quickly. Next, I needed some specific gear with me at all times, but showing up with a backpack draped over my new suit was not an option. I needed a discreet briefcase which was efficient, secure, and private. I embrace any excuse to buy a new bag, so I went shopping.

This post is not an endorsement for any specific brand and I was not asked to write this review. This is only intended as documentation of my considerations when choosing a bag for specific needs. I hope it sparks interest in identifying your own needs and presents new considerations for your next bag.

First, let's discuss the aesthetics of an executive briefcase. I lean on the show Rubicon to start our discussion:

 

I never use that specific type of bag, but I appreciate the following opinions:

Nothing eye-catching
Nothing which announces its newness, its cost, or its distinctiveness
Nothing which makes a noise when opening
Requires a proper handle (not a shoulder strap)

From my experience, stores such as Walmart, Target, and Kohls will not provide anything of value. It is all cheap junk. My first stop was Best Buy. This may surprise you, but Best Buy usually carries a decent selection of bags. The rest of the store is typically useless to me, but I can always find a last-minute bag. I went with the Samsonite 15.6 Laptop Professional Grade 2 bag which was on sale for $50 with retail of $70. It was perfect, but I want to explain why.

I carry a 14" laptop, so most bags will enclose it fine. However, I do not want things to be too loose and sliding around. I also carry a 8.5" x 11" e-reader and I do not want the two items to be too tight. On top of that, I always travel with my laptop within a SLNT Farady sleeve, so I need extra room for that. I find most 15" bags work well for me, but some are too tight. This bag held both perfectly. The following displays both items in place while open and closed.

Next, I demand the perfect amount of storage. I do not like bags which are too tight and require me to remove things to get to the item I need. I also do not want things to ever move during transit. I need pockets. The following displays my item placement. Always consider your own items when choosing an EDC bag,

The outer pocket has compartments for small items, and the bottom has an extended gap for flashlight, knife, and extra pistol magazine. The secondary zipped pocket holds my Faraday wallet (far-right) which contains all cash, cards, and passport. It is thick enough to support an Apple USB-C charging block, which I use for my Linux laptop, GrapheneOS device, e-reader, and all other USB items. Although this compartment only possesses a single zipper, it can be attached to the side clasp with a zip-tie or lock. The other compartments are dual-zipper, which also supports zip ties to prevent access to pockets in crowded areas. The back pouch is thin, but supports cables. All zippers are silent.

Finally, I insist that my phone is protected in a Faraday bag when I travel and while I am in sensitive meetings. I could toss the Faraday bag into a large briefcase pocket, but I prefer a designated area. This bag possesses the perfect slot which houses my Faraday bag, and is extremely snug when the phone is inside of it. I would not trust this setup in congested public transportation, but it was ideal for this situation, and gave me easy access to my device. The final placement appeared as part of the bag, and did not seem to welcome a pick-pocketer.

This may be overkill for most, but I enjoy the luxury of a perfect bag. Nothing moves around as I walk, the bag is presentable in an executive environment, it supports the weight of all gear without sagging or feeling stressed, and I don't feel like a child at the big-boys meeting when I walk in with my Jansport school bag slung over my shoulder.

No bag is perfect for everyone, and this bag was my only real option in a moment of desperation. However, it has turned into one of my favorites for meetings.

Disclosures: I have no association to Samsonite and I receive no kickback for any purchases. I am a long-time affiliate of SLNT.

OSINT Techniques 11th Edition Now Available

Thanks to an incredibly talented co-author and extremely efficient editing team, we have released the 11th Edition of OSINT Techniques.

Full Details: https://inteltechniques.com/book1.html

47 Chapters | 590 Pages | Digital available now (Paperback Soon).

The previous edition of this book was originally written in late 2022. In mid 2024, I was asked to update this book, as it is required reading for numerous college courses, university degrees, and government training academies. I never want stale or inaccurate information being presented within training programs, so I created this special revision. I estimate that 20% of the content is brand new, 20% has been updated to reflect changes throughout 2024, and the remaining 60% is recycled from the from the previous edition. Much of the tenth edition content was still applicable and only needed minor updates to reflect changes since 2022. If you have read the previous edition, you will find most of those overall strategies within this book. However, I have added many new OSINT methods which complement the original text in order to cater to those who always need accurate information. I also removed a lot of outdated content which was no longer applicable. I believe there is much new value within this updated text. This edition presents several new chapters unavailable within previous versions and incorporates the previously-available digital supplement guides about virtual machines and data breaches, leaks, and logs.

All purchases include free download of updated custom search tools; updated Linux scripts to build your own virtual machines; detailed cheat-sheets to simplify each process; and a single Linux command to build a complete OSINT VM with every tool in the entire book. The outline is below.

Introduction

SECTION I: OSINT Virtual Machines

CHAPTER 01: Why Virtual Machines?
CHAPTER 02: macOS Host Optimization
CHAPTER 03: macOS VM Software
CHAPTER 04: Linux Host Optimization
CHAPTER 05: Linux VM Software
CHAPTER 06: Windows Host Optimization
CHAPTER 07: Windows VM Software
CHAPTER 08: OSINT VM Operating Systems
CHAPTER 09: OSINT VM Web Browsers
CHAPTER 10: OSINT VM Applications
CHAPTER 11: OSINT VM Scripts
CHAPTER 12: OSINT VM APIs
CHAPTER 13: OSINT VM Maintenance
CHAPTER 14: OSINT VM Automated Build
CHAPTER 15: Android Virtualization
CHAPTER 16: Custom Search Tools

SECTION II: OSINT Resources & Techniques

CHAPTER 17: Search Engines
CHAPTER 18: Social Networks: Facebook
CHAPTER 19: Social Networks: X (Twitter)
CHAPTER 20: Social Networks: Instagram
CHAPTER 21: Social Networks: TikTok
CHAPTER 22: Online Communities
CHAPTER 23: Email Addresses
CHAPTER 24: Usernames
CHAPTER 25: People Search Engines
CHAPTER 26: Telephone Numbers
CHAPTER 27: Online Maps
CHAPTER 28: Documents
CHAPTER 29: Images
CHAPTER 30: Videos
CHAPTER 31: Broadcast Streams
CHAPTER 32: Domain Names
CHAPTER 33: IP Addresses
CHAPTER 34: Government & Business Records
CHAPTER 35: Virtual Currencies

SECTION III: Leaks, Breaches, Logs, & Ransomware

CHAPTER 36: Investigative Benefits
CHAPTER 37: Hardware Configuration
CHAPTER 38: Software Configuration
CHAPTER 39: Terminal Commands
CHAPTER 40: Data Leaks
CHAPTER 41: Data Breaches
CHAPTER 42: Stealer Logs
CHAPTER 43: Ransomware
CHAPTER 44: Scripts, Databases, & Backups

SECTION IV: OSINT Methodology

CHAPTER 45: Methodology & Workflow
CHAPTER 46: Documentation & Reporting
CHAPTER 47: Policy, Ethics, & Development

CONCLUSION