Automatically Finding Weapons in Social Media Images Part 2

In the first part of this series we examined how to write some code that can slice and dice an image and then submit it to Imagga. By examining the tags that come back we can make a fairly accurate guess as to whether there is a weapon present in the picture. Now we get […]

Automatically Finding Weapons in Social Media Images Part 1

As part of my previous post on gangs in Detroit, one thing had struck me: there are an awful lot of guns being waved around on social media. Shocker, I know. More importantly I began to wonder if there wasn’t a way to automatically identify when a social media post has guns or other weapons […]

Automatically Reverse Image Search YouTube Videos

Eliot Higgins had an excellent post where he shows how to grab preview images from YouTube videos and use them for verification, or potentially to find additional sites where that video might be shown or linked to. This technique is called reverse image searching which I have covered here on this blog as well. This OSINT […]

Wixful Thinking: Mining Hidden Wix Web Pages

Wix is a popular free website hosting platform, that has 73 million users across 180 countries (stats from Wix themselves). Recently while working on an investigation, I was spending time hunting around a website that is hosted on Wix and I discovered an interesting anomaly. Wix has a WYSIWYG editor that allows you to build your […]

Follow the Money with Python

Lots of OSINT investigations involve looking at companies, their structure, and of course their directors. Just yesterday, CBC News here in Canada did a story about a wealthy family allegedly using tax havens as a means to avoid paying taxes. As part of the news story the reporters at CBC posted some court documents and […]

Automatically Discover Website Connections Through Tracking Codes

Fellow Bellingcat contributor Lawrence Alexander did some really interesting OSINT work on analyzing the hidden links between websites using tracking and analytics codes. In his how-to titled “Unveiling Hidden Connections With Google Analytics IDs” he shows how you can begin to see how websites are connected to one another using only the shared tracking code […]

Using Python to Mine Common Crawl

One of my Automating OSINT students Michael Rossi (@RossiMI01) pinged me with an interesting challenge. He had mentioned that the Common Crawl project is an excellent source of OSINT, as you can begin to explore any page snapshots they have stored for a target domain. Michael wanted to take this a step further and mine out […]

Gaming Meets OSINT: Using Python to Help Solve Her Story

There is a very cool game called Her Story. The premise is that you are a cop sitting in front of a 1990s-era computer system that enables you to punch keywords in to view videos about a murder case. When you punch in a keyword, there are only 5 videos that can be shown, so […]

Mapping Where Sex Offenders Can Live

This has been adapted from a unit in my OSINT course. Head to Wikimapia and the Google API Console to get the prerequisite keys that you need to run the code from this post. You can download the source for this post here. Recently I was listening to an episode of the Freakonomics podcast titled, “Making […]

Analyze Bin Ladin’s Bookshelf in a Snap with Python Part 2: Concepts and Categories

After running the first part of this series I had a question come in from Charles Cameron (@hipbonegamer) a well known author and terrorism researcher: Charles Cameron (hipbone) – May 26th, 2015 So — did you draw any conclusions from the use of this technique on the trove of OBL documents? What was your analysis […]