OSINT 11 Almost Ready

The final draft of OSINT Techniques, 11th Edition is finished: 47 chapters | 276,000 words | 590 pages @ 8.5 x 11 | Paperback & Digital

We are putting it through the final paces and the digital version should be released very soon. However, the print version will take some extra time. As a reminder, all digital supplemental guides (OSINT & Privacy) will be removed from the site and will no longer be available for purchase once this book is published (but we will continue to update them as needed for those who purchased them).

I am excited for this release. This edition presents several new chapters unavailable within previous versions and incorporates the previously-available digital supplement guides about virtual machines and data breaches, leaks, and logs. All purchases include free download of updated custom search tools; updated Linux scripts to build your own virtual machines; detailed cheat-sheets to simplify each process; and a single Linux command to build a complete OSINT VM with every tool in the entire book. The outline is below.

Introduction

SECTION I: OSINT Virtual Machines
CHAPTER 01: Why Virtual Machines?
CHAPTER 02: macOS Host Optimization
CHAPTER 03: macOS VM Software
CHAPTER 04: Linux Host Optimization
CHAPTER 05: Linux VM Software
CHAPTER 06: Windows Host Optimization
CHAPTER 07: Windows VM Software
CHAPTER 08: OSINT VM Operating Systems
CHAPTER 09: OSINT VM Web Browsers
CHAPTER 10: OSINT VM Applications
CHAPTER 11: OSINT VM Scripts
CHAPTER 12: OSINT VM APIs
CHAPTER 13: OSINT VM Maintenance
CHAPTER 14: OSINT VM Automated Build
CHAPTER 15: Android Virtualization
CHAPTER 16: Custom Search Tools

SECTION II: OSINT Resources & Techniques
CHAPTER 17: Search Engines
CHAPTER 18: Social Networks: Facebook
CHAPTER 19: Social Networks: X (Twitter)
CHAPTER 20: Social Networks: Instagram
CHAPTER 21: Social Networks: TikTok
CHAPTER 22: Online Communities
CHAPTER 23: Email Addresses
CHAPTER 24: Usernames
CHAPTER 25: People Search Engines
CHAPTER 26: Telephone Numbers
CHAPTER 27: Online Maps
CHAPTER 28: Documents
CHAPTER 29: Images
CHAPTER 30: Videos
CHAPTER 31: Broadcast Streams
CHAPTER 32: Domain Names
CHAPTER 33: IP Addresses
CHAPTER 34: Government & Business Records
CHAPTER 35: Virtual Currencies

SECTION III: Leaks, Breaches, Logs, & Ransomware
CHAPTER 36: Investigative Benefits
CHAPTER 37: Hardware Configuration
CHAPTER 38: Software Configuration
CHAPTER 39: Terminal Commands
CHAPTER 40: Data Leaks
CHAPTER 41: Data Breaches
CHAPTER 42: Stealer Logs
CHAPTER 43: Ransomware
CHAPTER 44: Scripts, Databases, & Backups

SECTION IV: OSINT Methodology
CHAPTER 45: Methodology & Workflow
CHAPTER 46: Documentation & Reporting
CHAPTER 47: Policy, Ethics, & Development

CONCLUSION