Major Books Update

As we creep toward the end of the year, I want to offer some updates for the next book and some major changes to the way we facilitate sales.

First and foremost, the 11th Edition of OSINT Techniques is over half-way completed and still slated for release on or before January 1, 2025. It will be 590 pages at 8.5" x 11", and we will offer digital and print options. It is a drastic change from the 10th Edition, as two years have passed since that release. Jason and I are both very excited about the new content.

As soon as OSINT 11 is released, we are restructuring our books page. We will no longer offer the digital supplement guides (Mobile Devices, macOS Devices, Linux Devices, VPNs & Firewalls, Leaks, Breaches, & Logs, The Ultimate Virtual Machine, and Self-Publishing) for new purchases. They will be removed from our site. If you already possess any of those guides, or purchase them before they are removed, you will still receive free updates as needed. Nothing has changed there and we keep our promises. We simply will no longer offer them as a product for sale. We will only offer Extreme Privacy 5th Edition and OSINT Techniques 11th Edition for sale by the end of the year.

This is mostly due to the new OSINT book incorporating all of the vital instruction from the two OSINT supplemental guides which were released after the 10th Edition was published. Similarly, The 5th Edition of Extreme Privacy pulled in a lot of the techniques within the Extreme Privacy supplemental guides. Therefore, it no longer makes sense to offer all of the products while adding complexity to a purchase.

I won't pretend piracy did not play a role. While the supplemental guides went deeper into many territories, the sales plummeted 90% as soon as they were pirated online. People would rather download free illegal copies than support the work of independent authors. I am not mad, that is just where society is. There is a growing community which believes all books should be free, and authors should never be paid for their work. I do not believe that is sustainable, and expect we will see more authors leave the space. As a business, we can no longer justify the expense of putting out new titles when so many readers are choosing to use pirated copies. Therefore, we have scrapped the plans for any future privacy books including the self-hosting guide. It is great that the guides have been so popular, but unfortunately, popularity does not pay my employees. The abundance of credit card disputes and fraud is also an issue. These are costly and damaging to our business reputation. I cannot risk the ability to accept credit cards for our services.

All actions have consequences. Our only available response is to stop making products and re-focus our efforts on our existing client needs. The goal of the books has always been to offer an extremely affordable way to replicate the services we offer. That model worked for several years, but it seems broken now. All good things come to an end!

Since the OSINT Techniques book is used by so many universities, instructors, and investigators, we feel compelled to provide an update, regardless of the piracy. Jason Edison is co-authoring that book with me, and I will pass the torch to him after this release. It will be up to him to consider any future releases.

Once again, thanks for all of the interest and thank you to everyone who has supported the books by purchasing legitimate copies over the years. We know that some of you buy every edition and we really appreciate your support. We hope they helped in some way.

MB

Digital Guide Updates 2024.09.01

Today, we updated seven of our digital supplement guides with vital information. If you purchased any, please check your email for the download link(s). If you would like more information on these guides, please visit https://inteltechniques.com/books.html. The following provides details of each update:

Extreme Privacy-5th Edition:
Page 26 (Minor): Corrected the "pop-upgrade" commands.
Page 130 (Minor): Slight clarifications on Signal requirements.
Page 133 (Minor): Corrected Session calling details (unreliable vs unavailable).
Page 137 (Minor): Clarified SearXNG usage.
Page 143 (Minor): Clarified Apple Webkit for EU vs US.
Entire Guide (Minor): Corrected several typos and grammatical errors.

OSINT Techniques-Leaks, Breaches, and Logs:
Page 17 (Major): Added section to recover missing Linux disk space.

OSINT Techniques-The Ultimate Virtual Machine:
Page 95-97 (Major): Added sections about SearXNG (Online and Self-Hosted) to match the recommendations in the newly-release Extreme Privacy, 5th Edition (https://inteltechniques.com/book7.html).
Page 106 (Major): Added note advising against Video Download Helper.
Page 137 (Major): Updated Sherlock installation steps and commands.
Page 139 (Major) Updated Blackbird command.
Page 140 (Major): Updated Maigret installation steps.
Page 192 (Major): Uploaded new user.sh script to reflect new commands.
Page 231 (Major): Uploaded new install.sh script to reflect new installations.

Extreme Privacy-Mobile Devices:
Page 26 (Major): Added section about Online SearXNG to match the recommendations in the newly-release Extreme Privacy, 5th Edition (https://inteltechniques.com/book7.html).

Extreme Privacy-macOS Devices:
Page 52-54 (Major): Added sections about SearXNG (Online and Self-Hosted) to match the recommendations in the newly-release Extreme Privacy, 5th Edition (https://inteltechniques.com/book7.html).

Extreme Privacy-Linux Devices:
Page 45-47 (Major): Added sections about SearXNG (Online and Self-Hosted) to match the recommendations in the newly-release Extreme Privacy, 5th Edition (https://inteltechniques.com/book7.html).
Page 124 (Major): Added section to recover missing disk space.

Extreme Privacy-VPNs and Firewalls:
Page 87 (Major): Added section about Online SearXNG to match the recommendations in the newly-release Extreme Privacy, 5th Edition (https://inteltechniques.com/book7.html).

Extreme Privacy 5th Edition Now Available

Due to an incredibly efficient and talented team, we have released the 5th Edition of Extreme Privacy sooner than expected.

Full Details: https://inteltechniques.com/book7.html

30 Sections | 228 Chronological Tasks | 340,000 Words | 590 Pages | Paperback & Digital

This new edition is not a simple facelift, as I have drastically changed the flow, content, and goals for this edition, as follows.

First, I no longer present strategies which I believe are not optimal. In the previous edition, I delivered my recommendations, and then followed with alternative options for those who did not want to go the extreme route. With this book, I spend more time on the ideal solutions while trying to avoid compromises.

Second, I restructured chapters into sections, and isolated specific tasks for easier execution. In the previous edition, I presented huge chapters which covered a lot of ground. As one example, the mobile devices chapter was 77 pages and covered everything from selection and configuration of a mobile device all the way through DNS, VoIP options, and advanced applications. People were simply overwhelmed with the amount of information. In this book, I isolate each individual topic into its own "task". This allows readers to focus on one specific step, and may offer a feeling of accomplishment once the task is complete. In this example, the mobile devices section is now split into dozens of bite-size tasks which can each easily be completed in order.

Third, I offer a more chronological program. During a consult in late 2023, a client shared that she had read the previous edition twice, but was still very confused about the order of events ideal for her. Her voice was in my head while I wrote this updated work. In this edition, I have reorganized all tasks to flow in the most ideal order for most readers. This eliminates some of the confusion about finishing one task before starting another, or the need to wait for a service to be activated before proceeding with the next step. Every task in this guide is independent of the next, as long as they are followed in order.

Finally, all expired and outdated resources were replaced with new methods throughout every chapter. The outline is below.

Introduction
Section One: Linux Computers
Section Two: macOS Computers
Section Three: GrapheneOS Mobile Devices
Section Four: iOS Mobile Devices
Section Five: Mobile Device Strategies
Section Six: Secure Communications
Section Seven: Web Browsers
Section Eight: Passwords & 2FA
Section Nine: Secure Email, Calendars & Contacts
Section Ten: VoIP Telephone Numbers
Section Eleven: VPNs & DNS
Section Twelve: Firewalls & Wi-Fi
Section Thirteen: Self-Hosted Data
Section Fourteen: Virtual Machines (VMs)
Section Fifteen: Alias Names
Section Sixteen: Mailing Addresses
Section Seventeen: Private Payments
Section Eighteen: Estate Planning
Section Nineteen: Employment
Section Twenty: Private Lodging
Section Twenty-One: Private Homes
Section Twenty-Two: Private Vehicles
Section Twenty-Three: Privacy Lifestyle
Section Twenty-Four: Nomad Lifestyle
Section Twenty-Five: Data Requests
Section Twenty-Six: Data Freezes
Section Twenty-Seven: Disinformation
Section Twenty-Eight: Disaster Preparation
Section Twenty-Nine: Death Preparation
Section Thirty: My Successes & Failures
CONCLUSION

 

The 11th Edition of OSINT Techniques is still planned for early 2025.

 

~MB

Extreme Privacy 5th Edition Available Soon

Due to an incredibly efficient and talented team, we will be releasing the 5th Edition of Extreme Privacy sooner than expected. I do not know the exact date just yet, but we are wrapping up all final touches this week. Some details:

30 Sections | 228 Chronological Tasks | 340,000 Words | 590 Pages | Paperback & Digital

 

This new edition is not a simple facelift, as I have drastically changed the flow, content, and goals for this edition, as follows.

First, I no longer present strategies which I believe are not optimal. In the previous edition, I delivered my recommendations, and then followed with alternative options for those who did not want to go the extreme route. With this book, I spend more time on the ideal solutions while trying to avoid compromises.

Second, I restructured chapters into sections, and isolated specific tasks for easier execution. In the previous edition, I presented huge chapters which covered a lot of ground. As one example, the mobile devices chapter was 77 pages and covered everything from selection and configuration of a mobile device all the way through DNS, VoIP options, and advanced applications. People were simply overwhelmed with the amount of information. In this book, I isolate each individual topic into its own "task". This allows readers to focus on one specific step, and may offer a feeling of accomplishment once the task is complete. In this example, the mobile devices section is now split into dozens of bite-size tasks which can each easily be completed in order.

Third, I offer a more chronological program. During a consult in late 2024, a client shared that she had read the previous edition twice, but was still very confused about the order of events ideal for her. Her voice was in my head while I wrote this updated work. In this edition, I have reorganized all tasks to flow in the most ideal order for most readers. This eliminates some of the confusion about finishing one task before starting another, or the need to wait for a service to be activated before proceeding with the next step. Every task in this guide is independent of the next, as long as they are followed in order.

Finally, all expired and outdated resources were replaced with new methods throughout every chapter. The outline is below.

Introduction
Section One: Linux Computers
Section Two: macOS Computers
Section Three: GrapheneOS Mobile Devices
Section Four: iOS Mobile Devices
Section Five: Mobile Device Strategies
Section Six: Secure Communications
Section Seven: Web Browsers
Section Eight: Passwords & 2FA
Section Nine: Secure Email, Calendars & Contacts
Section Ten: VoIP Telephone Numbers
Section Eleven: VPNs & DNS
Section Twelve: Firewalls & Wi-Fi
Section Thirteen: Self-Hosted Data
Section Fourteen: Virtual Machines (VMs)
Section Fifteen: Alias Names
Section Sixteen: Mailing Addresses
Section Seventeen: Private Payments
Section Eighteen: Estate Planning
Section Nineteen: Employment
Section Twenty: Private Lodging
Section Twenty-One: Private Homes
Section Twenty-Two: Private Vehicles
Section Twenty-Three: Privacy Lifestyle
Section Twenty-Four: Nomad Lifestyle
Section Twenty-Five: Data Requests
Section Twenty-Six: Data Freezes
Section Twenty-Seven: Disinformation
Section Twenty-Eight: Disaster Preparation
Section Twenty-Nine: Death Preparation
Section Thirty: My Successes & Failures
CONCLUSION

 

The 11th Edition of OSINT Techniques is still planned for early 2025.

 

~MB