{"id":368,"date":"2026-03-11T18:07:52","date_gmt":"2026-03-11T18:07:52","guid":{"rendered":"https:\/\/quantusintel.group\/osint\/blog\/2026\/03\/11\/osint-related-articles-20260311\/"},"modified":"2026-03-11T18:07:52","modified_gmt":"2026-03-11T18:07:52","slug":"osint-related-articles-20260311","status":"publish","type":"post","link":"https:\/\/quantusintel.group\/osint\/blog\/2026\/03\/11\/osint-related-articles-20260311\/","title":{"rendered":"OSINT-Related Articles, 20260311"},"content":{"rendered":"<p><strong>Videos\/Webinars\/Podcasts\/Conferences\/Training:<\/strong><br \/>How I Geolocated Taliban Special Forces in the Afghan Desert: Let\u2019s Geolocate #8<br \/>Ben Strick | March 9, 2026<br \/><a href=\"https:\/\/www.youtube.com\/watch?v=7t9gXDuWyKg\">https:\/\/www.youtube.com\/watch?v=7t9gXDuWyKg<\/a><\/p>\n<p>Investigating Fraud Without Leaving a Digital Trace | Intel Drop<br \/>Authentic8 | March 10, 2026<br \/><a href=\"https:\/\/www.youtube.com\/watch?v=-j-1Uck5pTU\">https:\/\/www.youtube.com\/watch?v=-j-1Uck5pTU<\/a><\/p>\n<p><strong>Articles\/Blogs (Corporate or Personal):<\/strong><br \/>What is Managed Attribution, and How Does it Improve Online Investigation?<br \/>Shannon Ragan | March 6, 2026<br \/><a href=\"https:\/\/www.authentic8.com\/blog\/what-is-managed-attribution\">https:\/\/www.authentic8.com\/blog\/what-is-managed-attribution<\/a><\/p>\n<p>Why Passive Threat Intelligence Isn\u2019t Enough in 2026<br \/>AJ Nash | March 2, 2026<br \/><a href=\"https:\/\/www.authentic8.com\/blog\/why-passive-threat-intelligence-isnt-enough-in-2026\">https:\/\/www.authentic8.com\/blog\/why-passive-threat-intelligence-isnt-enough-in-2026<\/a><\/p>\n<p>OSINT and Onion Browsers: Dark Web OSINT with Tor Browser and More<br \/>OSINT Industries | February 24, 2026<br \/><a href=\"https:\/\/www.osint.industries\/post\/osint-and-onion-browsers-dark-web-osint-with-tor-browser-and-more\">https:\/\/www.osint.industries\/post\/osint-and-onion-browsers-dark-web-osint-with-tor-browser-and-more<\/a><\/p>\n<p>Competitive Intelligence: How to Find Insights on Social &amp; Beyond<br \/>Michelle Martin | March 9, 2026<br \/><a href=\"https:\/\/blog.hootsuite.com\/competitive-intelligence\/\">https:\/\/blog.hootsuite.com\/competitive-intelligence\/<\/a><\/p>\n<p>Freeports: Inside the World\u2019s Most Secretive Financial Infrastructure<br \/>Rae Baker | March 9, 2026<br \/><a href=\"https:\/\/www.raebaker.net\/blog\/freeports\">https:\/\/www.raebaker.net\/blog\/freeports<\/a><\/p>\n<p>Infamy Complex: OSINT Fugitive Intelligence Catches Criminals Who Can\u2019t Log Off<br \/>OSINT Industries | March 5, 2026<br \/><a href=\"https:\/\/www.osint.industries\/project\/infamy-complex-osint-fugitive-intelligence-catches-criminals-who-cant-log-off\">https:\/\/www.osint.industries\/project\/infamy-complex-osint-fugitive-intelligence-catches-criminals-who-cant-log-off<\/a><\/p>\n<p>Global Terrorism Financing Report (February 2026)<br \/>Emelia Connolly | March 10, 2026<br \/><a href=\"https:\/\/newsletter.insightthreatintel.com\/p\/global-terrorism-financing-report-85f\">https:\/\/newsletter.insightthreatintel.com\/p\/global-terrorism-financing-report-85f<\/a><\/p>\n<p>OSINT Profiles: Analyzing the Small vs. Large Footprint<br \/>Dennis Keefe | March 10, 2026<br \/><a href=\"https:\/\/denniskeefe.me\/small-vs-large-footprint-osint\/\">https:\/\/denniskeefe.me\/small-vs-large-footprint-osint\/<\/a><\/p>\n<p>How the Experts Figure Out What\u2019s Real in the Age of Deepfakes<br \/>Jess Weatherbed | March 3, 2026<br \/><a href=\"https:\/\/www.theverge.com\/tech\/888303\/photo-video-fake-news-verification-nyt-bellingway\">https:\/\/www.theverge.com\/tech\/888303\/photo-video-fake-news-verification-nyt-bellingway<\/a><\/p>\n<p>Some Tools for Beginners<br \/>gailuuu | March 7, 2026<br \/><a href=\"https:\/\/www.reddit.com\/r\/GreatOSINT\/comments\/1rnykwo\/i_would_like_to_share_a_couple_of_tools_for\/\">https:\/\/www.reddit.com\/r\/GreatOSINT\/comments\/1rnykwo\/i_would_like_to_share_a_couple_of_tools_for\/<\/a><\/p>\n<p>We Need More Qualified, Ethical Digital Investigators<br \/>CaPutosta Calabra | March 9, 2026<br \/><a href=\"https:\/\/www.linkedin.com\/pulse\/we-need-more-qualified-ethical-digital-investigators-calabra-e7urf\">https:\/\/www.linkedin.com\/pulse\/we-need-more-qualified-ethical-digital-investigators-calabra-e7urf<\/a><\/p>\n<p>How Journalists Investigate Chinese Companies with OSINT<br \/>Project OSINT | March 10, 2026<br \/><a href=\"https:\/\/projectosint.substack.com\/p\/how-journalists-investigate-chinese\">https:\/\/projectosint.substack.com\/p\/how-journalists-investigate-chinese<\/a><\/p>\n<p><strong>Books\/Resources:<\/strong><br \/>How to Run Your Own Local LLM\u200a\u2014\u200a2026 Edition\u200a\u2014\u200aVersion 1<br \/>Thomas Cherickal | March 8, 2026<br \/><a href=\"https:\/\/hackernoon.com\/how-to-run-your-own-local-llm-2026-edition-version-1\">https:\/\/hackernoon.com\/how-to-run-your-own-local-llm-2026-edition-version-1<\/a><\/p>\n<p>OSINT Newsletters<br \/><a href=\"https:\/\/github.com\/ubikron\/OSINT-newsletters\">https:\/\/github.com\/ubikron\/OSINT-newsletters<\/a><\/p>\n<p>GhostPath<br \/><em>A powerful modular reconnaissance toolkit built for hackers, OSINT professionals &amp; bug bounty hunters\u200a\u2014\u200apassive + active recon in a sleek CLI shell<\/em><br \/><a href=\"https:\/\/github.com\/atharvbyadav\/GhostPath\">https:\/\/github.com\/atharvbyadav\/GhostPath<\/a><\/p>\n<p>WorldWideView<br \/><em>A modular, real-time geospatial intelligence engine built on top of a CesiumJS 3D globe. It is designed to ingest live data streams, transform them through a generalized plugin system, and render them as high-performance visual layers. As a real-time situational awareness platform, it turns raw geospatial signals\u200a\u2014\u200asuch as aircraft positions, maritime AIS, or satellite orbits\u200a\u2014\u200ainto interactive, cinematic layers on a high-fidelity 3D globe.<\/em><br \/><a href=\"https:\/\/github.com\/silvertakana\/worldwideview\">https:\/\/github.com\/silvertakana\/worldwideview<\/a><br \/><em>also:<\/em> <a href=\"https:\/\/worldwideview.dev\/\">https:\/\/worldwideview.dev\/<\/a><\/p>\n<p><img data-opt-id=574357117  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/medium.com\/_\/stat?event=post.clientViewed&amp;referrerSource=full_rss&amp;postId=ba0553f51fd0\" width=\"1\" height=\"1\" alt=\"\" \/><\/p>\n<hr \/>\n<p><a href=\"https:\/\/osintteam.blog\/osint-related-articles-20260311-ba0553f51fd0\">OSINT-Related Articles, 20260311<\/a> was originally published in <a href=\"https:\/\/osintteam.blog\/\">OSINT Team<\/a> on Medium, where people are continuing the conversation by highlighting and responding to this story.<\/p>","protected":false},"excerpt":{"rendered":"<p>Videos\/Webinars\/Podcasts\/Conferences\/Training:How I Geolocated Taliban Special Forces in the Afghan Desert: Let\u2019s Geolocate #8Ben Strick | March 9, 2026https:\/\/www.youtube.com\/watch?v=7t9gXDuWyKg Investigating Fraud Without Leaving a Digital Trace | Intel DropAuthentic8 | March 10, 2026https:\/\/www.youtube.com\/watch?v=-j-1Uck5pTU Articles\/Blogs (Corporate or Personal):What is Managed Attribution, and How Does it Improve Online Investigation?Shannon Ragan | March 6, 2026https:\/\/www.authentic8.com\/blog\/what-is-managed-attribution Why Passive Threat Intelligence &#8230; <a title=\"OSINT-Related Articles, 20260311\" class=\"read-more\" href=\"https:\/\/quantusintel.group\/osint\/blog\/2026\/03\/11\/osint-related-articles-20260311\/\" aria-label=\"Read more about OSINT-Related Articles, 20260311\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-368","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/posts\/368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/comments?post=368"}],"version-history":[{"count":0,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/posts\/368\/revisions"}],"wp:attachment":[{"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/media?parent=368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/categories?post=368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/tags?post=368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}