User
Write something
Epstein Scoop: Don’t Move the Body
📚 The Epstein Library Search That Started With a Broken Link Alert Working in Anti Money Laundering, I run continuous screening on Politically Exposed Persons (PEPs) under EU Anti-Money Laundering rules. My system monitors links automatically. 📩 How It Actually Started I got an alert by email: “Link broken - UN OCHA leadership page.” Not unusual. Websites change. But when I clicked through… “Access denied.” Wait. Not a 404. Not “page moved.” Access denied on what used to be a public UN leadership page? That’s the kind of thing that makes an OSINT Detective curious. 😣 It’s also decidedly inconvenient because AML analysts have to check whether the UBO or client is a PEP, and now access is denied on the leadership page, analysts can’t do their job without using extra OSINT tools. Which is weird, since it’s a publicly exposed person holding a position at the UN. 🐇 Down The Rabbit Hole: Pulled up the Wayback Machine. Sure enough - the page was public for years. Leadership bios, photos, organizational charts. Then suddenly - locked. So I did what you do when something feels off: searched the DOJ’s Epstein Library. “OCHA” - multiple hits. “Martin Griffiths” (former Under-Secretary-General) - hits there too. ✅ Reality Check: The mentions are completely routine. Humanitarian coordination documents. Normal UN references. Nothing illegal. Nothing even interesting, honestly. 🎭 But Here’s The Irony: Without that broken link alert? I never would have looked. The OCHA page would’ve been just another line item in continuous monitoring. Green checkmark. Move on. The restriction itself triggered the investigation. 🔨What My Tools Found: ✓ Automated link checker - flagged the broken/restricted URL ✓ Continuous screening alerts - notified me of the change✓ Wayback Machine - showed the history ✓ Curiosity - led me to the Epstein Library 🧠 The Lesson: When you restrict previously public information in 2026, you’re not hiding it. You’re highlighting it. Automated compliance systems notice when things change. They send alerts. Those alerts make people investigate.
Epstein Scoop: Don’t Move the Body
🔐 Shop with Caution: Watch Out for AI Extensions
Claude, published by Anthropic, has a solid sidebar extension and an agent that can execute tasks for you. Clear publisher. Clear branding. Legit. But when you search for ChatGPT or Gemini, the store is full of copycats and pretenders using similar names and icons. Why this is dangerous AI sidebars often get permission to: - Read and change data on all websites - Click, type, and submit forms on your behalf In the wrong hands, that means: - Account changes you didn’t approve - Transactions you didn’t initiate - Accounts literally being emptied. This goes for every extention, but with AI extentions that are designed to read, write and act on your your behalve it's even more dangerous and likely to be exploited. What to check (every time) - Publisher name - Publisher email & domain (must match the real company) - Permissions (global access ≠ casual) The Chrome Web Store is not a trust guarantee. If the publisher doesn’t clearly match the brand, don’t install it!
🔐 Shop with Caution: Watch Out for AI Extensions
📱 OSINT ProTip: Your Cell Phone Provider Will Snitch on You Before Anyone Else Does
Last week Candace Owens discussed the reported Charlie Kirk assassination incident and highlighted one important digital-forensics detail: On September 10, the day of the reported event at Utah Valley University, ➡️ 12 personal cell phones registered in Israel were allegedly detected onsite. ➡️ These were real Israeli accounts, not VPN traffic. ➡️ And the presence of these devices reportedly alerted NSA officials, Kash Patel, and people inside the current administration. Whether this claim is fact or theory, the lesson for every investigator is the same: 📡 Your SIM card is a tracking beacon. Your phone’s origin will expose you before anything else.** Your SIM tells a story: - The country where it was issued - The network it belongs to - The registration metadata tied to it - The IMEI behavior patterns If you stand in a crowd of 2,000 domestic devices while carrying a foreign SIM, you stick out like a flare gun in network telemetry. That’s why governments and investigators routinely analyze: ✔️ MCC/MNC (country & carrier) ✔️ Roaming events ✔️ Tower handshakes ✔️ Device-SIM mismatches ✔️ Local vs foreign subscriber profiles 🛰️ Pro Tip: Use a local E-SIM to blend in when traveling If you care about operational privacy—whether you’re: - An OSINT researcher - A journalist - A private investigator - A risk-exposed professional - A corporate compliance analyst working abroad your phone should not betray your location or origin. 🔥 Tools like Revolut E-SIMs let you download a local profile instantly, choosing the country you’re in so you don’t stand out in cell-network metadata. Just download the app so you can set up an account to use when you go abroad. Advantages: - You appear as a local device, not a foreign visitor - No physical SIM swap required - Fast activation from your phone - Reduces metadata anomalies that draw attention - Helps avoid “Why is this device from X country here today?” problems - No need to use public WiFi. Please don’t ever.
💡Google Advanced Search: Search like a PRO
You don’t need to be a hacker or use “Google dorks” to search like a pro. Google actually has built-in Advanced Search pages that let you filter results cleanly, legally, and effectively. Use these when you want precision without technical tricks 👇 Websites & files 📁 https://www.google.com/advanced_search Filter by exact words, language, region, last update, domain, and file type (PDF, DOCX, XLS). Images 🎇 https://www.google.com/advanced_image_search Search by size, color, usage rights, image type, or region. Videos 🎞️ https://www.google.com/advanced_video_search Narrow results by duration, quality, date, and source. Books 📚 https://www.google.com/advanced_book_search Search inside books by title, author, publisher, ISBN, or publication date. Why this matters - Cleaner results - Less noise - No special syntax to remember - Fully legitimate and accessible to everyone No dorking necessary. Just smarter searching. - Websites and files: google.com/advanced_search - Images: google.com/advanced_image_search - Videos: google.com/advanced_video_search - Books: google.com/advanced_book_search
💡Google Advanced Search: Search like a PRO
🔐 PRO TIP: Passwords & Multi-Factor Authentication (MFA) Are Non-Negotiable
Scams are rising fast. Not just more scams. Smarter, AI-powered, and massively scaled scams. Add to that how accessible hardware has become: - Tools like Flipper Zero, Kode Dot, and Raspberry Pi - Cheap, portable, and increasingly powerful - Capable of probing Wi-Fi networks, IoT devices, and weak security setups If your password is easy to guess, reused, or already leaked, you’re an easy target. 👉 2026 is not a good year to have a bad password. What you should do starting NOW, if you haven’t already: - Use long, unique passwords (minimum 14–16 characters) - Never reuse passwords across services - Enable Multi-Factor Authentication (MFA) everywhere it’s available - Prefer app-based MFA or hardware keys over SMS Useful tools - 🔎 Password strength checker:https://2ip.io/passcheck/(Test strength — never reuse real passwords you still rely on) - 🔐 Password generator:https://us.norton.com/feature/password-generator(Generate strong, random passwords instantly) Strong OPSEC starts with strong credentials. Good luck with the OPSEC 101 course! and stay safe. 🛡️
🔐 PRO TIP: Passwords & Multi-Factor Authentication (MFA) Are Non-Negotiable
1-9 of 9
powered by
OSINT Detective Skool
skool.com/huisvestnl-3698
Get started in OSINT and learn how to find out about anything and anyone online, professionally.
Build your own community
Bring people together around your passion and get paid.
Powered by