Professional Documents
Culture Documents
PDF Open Source Intelligence Techniques Resources For Searching and Analyzing Online Information 6Th Edition Michael Bazzell Ebook Full Chapter
PDF Open Source Intelligence Techniques Resources For Searching and Analyzing Online Information 6Th Edition Michael Bazzell Ebook Full Chapter
https://textbookfull.com/product/open-source-intelligence-
techniques-resources-for-searching-and-analyzing-online-
information-7th-edition-michael-bazzell/
https://textbookfull.com/product/open-source-intelligence-
techniques-resources-for-searching-and-analyzing-online-
information-7th-edition-michael-bazzell-2/
https://textbookfull.com/product/open-source-intelligence-
techniques-resources-for-searching-and-analyzing-online-
information-8e-8th-edition-michael-bazzell/
https://textbookfull.com/product/open-source-intelligence-
methods-and-tools-a-practical-guide-to-online-intelligence-1st-
edition-nihad-a-hassan/
Data simplification taming information with open source
tools First Edition (Online-Ausg.) Berman
https://textbookfull.com/product/data-simplification-taming-
information-with-open-source-tools-first-edition-online-ausg-
berman/
https://textbookfull.com/product/network-performance-and-
security-testing-and-analyzing-using-open-source-and-low-cost-
tools-1st-edition-chapman/
https://textbookfull.com/product/data-simplification-taming-
information-with-open-source-tools-1st-edition-berman/
https://textbookfull.com/product/how-open-source-ate-software-
understand-the-open-source-movement-and-so-much-more-gordon-haff/
https://textbookfull.com/product/how-open-source-ate-software-
understand-the-open-source-movement-and-so-much-more-gordon-
haff-2/
Open Source
INTELLIGENCE
Techniques
RESOURCES FOR SEARCHING AND
Analyzing Online Information
Sixth Edition
MICHAEL BAZZELL
Open Source
Intelligence Techniques
Resources for Searching and Analyzing
Online Information
Sixth Edition
Michael Bazzell
Open Source intelligence techniques:
Resources for searching and analyzing online information
Sixth Edition
All rights reserved. No part of this book may be reproduced in any form or by any electronic or
mechanical means including information storage and retrieval systems without permission in writing
from the author.
The information in this book is distributed on an “As Is” basis, without warranty. The author has
taken great care in preparation of this book, but assumes no responsibility for errors or omissions.
No liability is assumed for incidental or consequential damages in connection with or arising out of
the use of the information or programs contained herein.
Rather than use a trademark symbol with every occurrence of a trademarked name, this book uses
the names only in an editorial fashion and to the benefit of the trademark owner, with no intention
of infringement of the trademark.
Due to the use of quotation marks to identify specific text to be used as search queries and data
entry, the author has chosen to display the British rule of punctuation outside of quotes. This ensures
that the quoted content is accurate for replication. To maintain consistency, this format is continued
throughout the entire book.
ISBN-13: 978-1984201577
ISBN-10: 1984201573
Contents
About the Author................................................................................................................... I
Introduction........................................................................................................................... II
CHAPTER 1: Prepare Your Computer............................................................................... 1
Antivirus......................................................................................................................................................... 1
Malicious Software........................................................................ ...............................................................3
System Cleaner.......................................................................................................................... .................... 3
Firefox............................................................................................................................................................. 5
Firefox Settings............................................................................................................................................. 6
Firefox Add-Ons.......................................................................................................................................... 8
Script Blocking.............................................................................................................................................. 13
Firefox Profile........................................... t...................... 23
JavaScript Bookmarklets............................................................................................................................ 24
Chrome........................................................................................................................................................... 25
Chrome Extensions.....................................................................................................................................26
Tor Browser.................................................................................................................................................. 29
Virtual Private Network............................................................................................................................. 30
CHAPTER 2: Buscador Linux Virtual Machine .............................................................. 33
Virtual Machines.......................................................................................................................................... 34
VirtualBox...................................................................................................................................................... 35
Buscador Download....................................................................................................................................35
Buscador Installation.................................................................................................................................. 36
Snapshots........................................................................................................................................................ 37
Buscador Browsers......................................................................................................................................40
Buscador Video Utilities............................................................................................................................ 40
Buscador Applications................................................................................................................................ 43
Bootable USB Devices............................................................................................................................... 51
CHAPTER 3: Search Engines............................................................................................. 57
Google............................................................................................................................................................ 57
Google Operators........................................................................................................................................57
Google Search Tools....................................................................................................................... ........... 63
Google Custom Search Engines.............................................................................................................. 65
Alerts............................................................................................................................................................... 69
Bing................................................................................................................................................................. 70
Bing Operators............................................................................................................................................. 70
Images............................................................................................................................................................. 71
Archives..........................................................................................................................................................71
Translators..................................................................................................................................................... 76
Groups............................................................................................................................................................78
News................................................................................................................................................................ 79
Newspapers................................................................................................................................................... 79
Tor Search Engines.................................................................................................................................... 85
International Search Engines.................................................................................................................. 86
Yandex.......................................................................................................................................................... 87
Yandex Operators...................................................................................................................................... 88
Private Search Engines.............................................................................................................................. 89
FTP Search................................................................................................................................................... 89
IntelTechniques Search Engine Tool............................................................................... .................... 93
CHAPTER 4: Social Networks: Facebook........................................................................ 95
Account Creation....................................................................................................................................... 95
Facebook Search: Standard.......................................................................................................................97
Facebook Search: People........................................................................................................................... 98
Facebook Search: Posts.................................................................................. :........................................... 102
Facebook Search: User ID......................................................................................................................... 104
Facebook Search: Friends.......................................................................................................................... 108
Facebook Search: Common Results....................................................................................................... Ill
Facebook Search: ID Creation Date....................................................................................................... 114
Facebook Search: Businesses.................................................................................................................... 114
Facebook Search: Events........................................................................................................................... 116
Facebook Search: Live Video.................................................................................................................... 118
IntelTechniques Facebook Search Tool............................................................................................... 124
Facebook Search: Email............................................................................................................................. 127
Facebook Search: Telephone Number................................................................................................... 127
CHAPTER 5: Social Networks: Twitter............................................................................. 135
Twitter Search..........<.................................................................................................................................... 135
Twitter Search Operators.......................................................................................................................... 138
Deleted Twitter Posts................................................................................................................................. 141
Twitter Biographies.................................................................................................................................... 144
IntelTechniques Twitter Search Tool..................................................................................................... 145
TweetBeaver................................................................................................................................................. 147
Twitter Location Information.................................................................................................................. 150
Tweet Deck................................................................................................................................................... 156
Twitter Analytics..........................................................................................................................................157
CHAPTER 6: Social Networks: Others............................................................................. 165
Instagram....................................................................................................................................................... 165
Instagram Private Accounts......................................................................................................................167
IntelTechniques Instagram Search Tool............................................................................................... 169
Linkedln........................................................................................................................................................ 171
IntelTechniques Linkedln Search Tool................................................................................................. 173
Contact Exploitation.................................................................................................................................. 175
Account Export Options........................................................................................................................... 178
CHAPTER 7: Online Communities............................................................................ 183
Reddit............................................................................................................................................................. 183
Deleted Content.......................................................................................................................................... 184
Reddit Alternatives......................................................................................................................................... 189
Dating Websites............................................................................................................................................. 191
Forums.............................................................................................................................................................. 194
Online Prostitution........................................................................................................................................ 196
Craigslist 198
eBay........ 200
Amazon.. 202
IntelTechniques Communities Search Tool........................................................................................ 204
CHAPTER 8: Email Addresses........................... 207
Email Verification..........................................................................................................................................207
Email Assumptions....................................................................................................................................... 208
Compromised Email Databases................................................................................................................ 211
Email Searching....................................... 212
IntelTechniques Email Search Tool......................................................................................................... 214
CHAPTER 9: User Names.................................................................................................... 217
User Name Search Engines........................................................................................................................ 217
IntelTechniques User Name Search Tool...............................................................................................221
User Name Assumptions............................................................................................................................. 221
CHAPTER 10: People Search Engines............................................................. 227
People Search Engines................................................................................................................................. 227
IntelTechniques Person Search Tool....................................................................................................... 233
People Search Combination........................................................................................................................234
Resumes............................................................................................................................................................ 236
Gift Registries................................................................................................................................................. 238
CHAPTER 11: Telephone Numbers.................................................................................... 243
Carrier Identification.................................................................................................................................... 243
Caller ID Databases.......................................................................................................................................244
Telephone Search Databases....................................................................................... 250
Search Engines............................................................................................................................................... 253
IntelTechniques Telephone Search Tool................................................................................................ 255
Voicemail Retrieval........................................................................................................................................258
Loyalty Cards.................................................................................................................................................. 259
CHAPTER 12: Online Maps....................................................................................... 261
Google Maps................................................................................................................................................... 261
Bing Maps.........................................................................................................................................................263
Additional Maps............................................................................................................................................. 263
Crowd-Sourced Street Views..................................................................................................................... 264
Historic Imagery............................................................................................................................................ 266
IntelTechniques Maps Search Tool.......................................................................................................... 267
Maps Manipulation....................................................................................................................................... 273
CHAPTER 13: Documents................................................................................................... 275
Google Searching.......................................................................................................................................... 275
Google Docs................................................................................................................................................... 276
Amazon Data............................................................................................................................................ 277
Presentation Repositories....................................................................................................................... 278
IntelTechniques Documents Search Tool............................................................................................ 279
Metadata........................................................................................................................................................ 281
Rental Vehicle Records.............................................................................................................................. 282
Paste Sites...................................................................................................................................................... 283
IntelTechniques Paste Sites Search TooL.............................................................................................. 283
CHAPTER 14: Photographs................................................................................................ 285
Reverse Image Searches......................................................................................................... 285
IntelTechniques Reverse Image Search Tool.......................................................... 289
Twitter Images.............................................................................................................................................. 291
Metadata............................................................................................................. 293
Image Manipulation.....................................................................................................................................297
Image Forensics........................................................................................................................................... 298
CHAPTER 15: Videos......................................................................................................... 303
YouTube......................................................................................................................................................... 303
YouTube Restrictions Bypass...................................................................................................................304
IntelTechniques YouTube Search Tool................................................................................................ 308
Reverse Video Searching.......................................................................................................... 308
IntelTechniques Reverse Video Search Tool....................................................................................... 312
Video Search Options................................................................................................................................ 313
Video Search Archives............................................................................................................................... 315
Video Closed Captions............................................................................................................................... 316
Live Video Streams..................................................................................................................................... 317
Periscope....................................................................................................................................................... 318
CHAPTER 16: Domain Names........................................................................................... 321
Domain Registration.................................................................................................................................. 321
Domain Search Tools................................................................................................................................. 322
Historical Registration Data......................................................................................................................323
Visual Depictions................................. 326
Website Monitoring........................................... 327
Domain Analytics........................................................................................................................................ 328
Robots.txt...................................................................................................................................................... 330
Search Engine Marketing Tools.............................................................................................................. 332
Shortened URLs.......................................................................................................................................... 336
IntelTechniques Domain Search Tool................................................................................................... 337
CHAPTER 17: IP Addresses............................................................................................... 339
IP Address Location................................................................................................................................... 339
IP Address Search.................................................................. 340
Wigle.............................................................................................................................................................. 342
Shodan........................................................................................................................................................... 343
IntelTechniques IP Address Search Tool............................................................................................. 345
IP Logging....................................................................................................................... 346
CHAPTER 18: Government Records 353
County General Records............................................................................................................................ 353
County Court Records................................................................................................................................ 353
State Business Records................................................................................................................................ 354
Date of Birth Records................................................................................................................................. 355
Social Security Records............................................................................................................................... 355
Vehicle Identification Number Search................................................................................................... 356
Vehicle Registration Search....................................................................................................................... 357
Campaign Contributions................................................ ............................................................................ 358
Criminal Information.................................................................................................................................. 358
Voter Registration Records....................................................................................................................... 361
Virtual Currency Records.......................................................................................................................... 362
CHAPTER 19: Software Applications................. ............................................................... 363
Video Utilities............................................................................................................................................... 364
Video Download.......................................................................................................................................... 367
Video Metadata.............................................................................................................................................. 369
Google Earth................................................................................................................................................. 370
Creepy.............................................................................................................................................................. 372
Exif Tool................................................................................................................................... ..................... 373
HTTrack........................................................................................................................................................... 374
4K Stogram...................................................................................................................................................... 374
CamStudio........................................................................................................................................................ 375
Lightshot Capture.......................................................................................................................................... 376
SmartDeblur..................................................................................................................................................... 377
FOCA................................................................................................................................................................ 378
ExtractFace...................................................................................................................................................... 380
SEO Spider...................................................................................................................................................... 381
Domain Hosting View................................................................................................................................. 381
IP Net Info....................................................................................................................................................... 382
CCleaner........................................................................................................................................................... 382
BleachBit........................................................................................................................................................... 382
VeraCrypt......................................................................................................................................................... 383
KeePassXC.......................................................................................................................................... 385
Recuva............................................................................................................................................................... 385
CHAPTER 20: Application Programming Interfaces (APIs)........................................... 387
Pipl..................................................................................................................................................................... 389
Full Contact..................................................................................................................................................... 392
Flickr................................................................................................................................................................. 396
Reverse Caller ID.......................................................................................................................................... 397
Service Objects...............................................................................................................................................398
TowerData...................................................................................................................................................... 399
Have I Been Pwned...................................................................................................................................... 401
Hacked-Emails............................................................................................................................................... 402
CHAPTER 21: Android Emulation...................................... 405
Genymotion........................................... 406
Genymotion Configuration.................................................................................................. 406
Google Apps Installation........................................................................................................................... 409
Android Apps............................................................................................................................................... 412
Contact Exploitation........................................................................................................... -..................... 415
Virtual Device Cloning......................................................................................................... 416
Virtual Device Export................................................................................................................................ 417
Additional Android Emulation Options............................................................................................... 418
CHAPTER 22: Recon-ng.................................................................................................... 419
Recon-ng Commands................................................................................................................................. 419
Recon-ng Workspaces.................................................................................... 421
Recon-ng Modules................................................................................................................ 422
Recon-ng Reports........................................................................................................................................ 424
CHAPTER 23: Radio Frequency Monitoring................................................ 431
Hardware....................................................................................................................................................... 431
Software to Find Radio.............................................................................................................................. 431
Public Frequencies.......................................................................................................................................432
Wireless Monitors........................................................................................................................................ 435
Wireless Microphones................................................................................................................. -............. 436
Online Databases......................................................................................................................................... 437
Online Streaming Frequencies................................................................................................................. 440
CHAPTER 24: OSINT Workflow Processes..................................................................... 443
Email Addresses..... <....................................................................................................................................445
User Names................................................................................................................................................... 446
Real Names................................................................................................................................................... 447
Telephone Numbers................................................................................................................................... 448
Domain Names............................................................................................................................................449
Locations....................................................................................................................................................... 450
CONCLUSION:.................................................................................................................. 457
INDEX: ................................................................................................................................ 458
About the Author
Michael bazzell
Michael Bazzell spent 18 years as a government computer crime investigator. During the majority
of that time, he was assigned to the FBI’s Cyber Crimes Task Force where he focused on open
source intelligence, cyber-crime cases, and personal data removal methods. As an active
investigator for multiple organizations, he has been involved in numerous high-tech criminal
investigations including online child solicitation, child abduction, kidnapping, cold-case
homicide, terrorist threats, and high-level computer intrusions. He has trained thousands of
individuals in the use of his investigative techniques and privacy control strategies.
Michael currendy works and resides in Washington, D.C. He also served as the technical advisor
for the first season of the television hacker drama Mr. Robot. His books Open Source
Intelligence Techniques and Hidingfrom the Internet have been best sellers in both the United
States and Europe. They are used by several government agencies as training manuals for
intelligence gathering and securing personal information.
INTRODUCTION
Sixth Edition
The previous (fifth) edition of this book was originally released in May of 2016.1 assumed that it
would be the final version, and stated in a few communication channels that it would be the last
book I would write on the topic. In that book, I focused more on global techniques instead of
specific resources in an attempt to get some extra mileage out of it Since the first edition was
released in 2012,1 had been pushing out an updated version every year. The fifth edition seemed
like the proper exit for the series. It was not because I was tired of online investigations. I may
be more passionate now about collecting online evidence than I ever was before. I simply wanted
to focus more energy toward other interests and opportunities, and I began spending a large
amount of my time researching advanced privacy techniques.
In that down-time, I co-wrote The Complete Privacy & Security Desk Reference, and started a
weekly podcast titled The Complete Privacy Security Podcast. I also launched a new company
dedicated to assisting other people in disappearing completely when bad situations arose.
Whether conducting online data-mining removals for privacy; facilitating property purchases
through the use of anonymous land trusts and LLCs for asset protection; or complete relocations
to safe houses in the middle of the night for protection, it was a fascinating two years of research
and execution.
In late 2017, I had the itch to begin writing about online research methods again. Earlier that
year, I co-created a Linux virtual machine targeted toward research professionals that included
numerous utilities never mentioned in my previous books. This pre-configured operating system
gained a lot of public interest and we continue to update it twice yearly. Over the past two years,
I updated my online research tools every month in order to continue to provide functional
resources. I kept a running log of all of the changes that might need more explanation. In eariy
2018,1 started documenting all of this, plus some of my favorite new Linux tools, in written form
with anticipation of creating a supplement to the fifth edition of this book. Within a couple of
weeks, I realized that the entire book should be re-written and released as a new edition. I have
always self-imposed a “rule” in reference to my book revisions. The potential release must include
at least 25% brand new material, 25% updated content, and 25% untouched stable and beneficial
techniques. I believe that this sixth edition meets this criteria.
Keeping a book up to date about ways to access information on the internet is a difficult task.
Websites are constandy changing or disappearing, and the techniques for collecting all possible
public information from them are affected. While the fifth edition of this book is still highly
applicable, a lot has changed over the past two years. Much of this book contains new techniques
that were previously not available. The Facebook Graph search options continue to grow
considerably. I have also created several new online search tools to help with the investigative
process. While Twitter and Instagram took away a few features, there is an abundance of new
techniques available to all of us. Finally, a surge of Python tools has bombarded us with new
capabilities never available before. It is a very exciting time for internet investigations.
The first chapter helps you properly configure your online investigation computer. It briefly
discusses proper security protocols and free software. Great emphasis is placed on proper use of
secure web browsers. A major change since the previous edition was the launch of Firefox version
57. In this update, all legacy add-ons were eliminated. If the add-ons were not upgraded to
Firefox’s new requirements, the tools no longer work. We lost some great resources, but this
chapter will outline some new benefits.
A brand-new chapter explains the importance of virtual machines and instructs you on making
your own or using a pre-configured option called Buscador. This virtual machine, co-created by
David Westcott and myself, takes away the technical difficulties of installing custom Python
applications, and leaves the user with a point-and-click environment ready for any type of
investigation. Users of any skill level can now take advantage of Linux-based applications once
restricted to those that understood programming and terminal prompts. With proper use of this
system, you will no longer need to worry about viruses or malware. Dozens of applications, all
included in Buscador, are explained in great detail in Chapter Two.
The remaining chapters are structured a bit differently from previous editions. Instead of trying
to combine related topics into a single chapter, such as “Telephone Numbers & Addresses” or
“Domains & IP Addresses”, each category now has its own chapter. This allowed me to really
delve into each topic and isolate the various techniques.
Fortunately, knowing methods for accessing data on one website often carries over nicely to
other websites. This entire sixth edition was accurate as of February 2018. If, or more likely when,
you find techniques that no longer work, use the overall lessons from the entire book to push
through the changes and locate your content. Once you develop an understanding of the data,
you will be ready to adapt with it. As always, I will publish updates to my online blog and free
newsletter.
I will also post new video tutorials for the members of my online training program. You can
access all of this, including my current investigation tools and links, on my website located at
IntelTechniques.com. More importantly, please consider joining my free online forum at that
address. This is where you will hear about all of the amazing OSINT techniques and methods
that are being discovered every day from some of the brightest minds in online research. There
are currently over 4,000 registered users, some of whom are active daily.
Ill
Open Source Intelligence (OSINT)
Open Source Intelligence, often referred to as OSINT, can mean many things to many people.
Officially, it is defined as any intelligence produced from publicly available information that is
collected, exploited, and disseminated in a timely manner to an appropriate audience for the
purpose of addressing a specific intelligence requirement For the CIA, it may mean information
obtained from foreign news broadcasts. For an attorney, it may mean data obtained from official
government documents that are available to the public. For most people, it is publicly available
content obtained from the internet.
Locating this free online information is not the final step of OSINT analysis. Appropriate
collection methods will be detailed and referenced. Whether the data you obtain is for an
investigation, a background check, or identifying problem employees, you must document all of
your findings. You cannot rely on the information being available online forever. A website may
shut down or the data may be removed. You must preserve anything of interest when you find
it. The free software solutions presented here will help you with that.
OSINT search techniques do not apply only to websites. There are many free programs that
automate the search and collection of data. These programs, as well as appEcation programming
interfaces, will be explained to assist the advanced investigator of open source intelligence.
In summary, this book is to serve as a reference guide to assist you with conducting more accurate
and efficient searches of open source intelligence.
Many readers are in some form of law enforcement. Police officers can use these techniques to
help locate missing children or investigate human trafficking. Intelligence analysts can apply these
methods to a large part of their daily work as they tackle social media posts. Detectives can use
the search techniques to re-investigate cases that have gone unsolved.
I now offer my online and Eve OSINT training to the private sector, especially global security
divisions of large corporations. This book can help these teams locate more concise and
appropriate information relative to their companies. These methods have been proven successful
for employees that monitor any type of threat to their company, from physical violence to
counterfeit products. I encourage the use of these techniques to institutions that are responsible
for finding and eliminating “bad apples”. This may be the human resources department, appEcant
processing employees, or “head hunters” looking for the best people. The information about a
subject found online can provide more intelEgence than any interview or reference check.
Parents and teachers are encouraged to use this book as a guide to locating social media content
posted by children. In many households, the children know more about the internet than the
adults. The children use this to their advantage and often hide content online. They know that it
will not be located by their parents and teachers, and often post inappropriate content. This book
can empower the adults and assist with identifying important personal information.
A large portion of my intended audience is private investigators. They can use this book to find
information without possessing a deep understanding of computers or the internet. ExpEcit
descriptions and occasional screen captures wiU ensure that the techniques can be recreated on
any computer. Several universities have adopted this book as required reading, and I am honored
to play a small role in some amazing courses related to network security.
I realize that people who use these techniques for devious purposes will read this book as weU.
Colleagues have expressed their concern about this possibibty. My decision to document these
techniques came down to two thoughts. First, anyone that reaUy wants to use this information in
maEcious ways will do so without this book. There is nothing in here that could not be dupEcated
with some serious searching and time. The second thought is that getting this information out to
those that will use it appropriately is worth the risk of a few people using it for the wrong reasons.
Please act responsibly with this information.
Custom Search Tool
Throughout this book, I reference several custom search tools that I created to assist with
automated queries. I have made available a single repository of every resource discussed in this
guide, including the multiple custom search tools. This is presented in an easy to use format with
search topics on the left and dedicated query tools within the main area. It can be found at the
“Tools” tab of my website IntelTechniques.com. This complete archive may be useful as you
complete the tutorials within this book. The image below displays the current state of the tool
using the custom Facebook search options.
Online Training Live Training Services Toots Forum Blog Podcast Books Bto Contact
INSTAGRAM
GO (Populate All)
USER NAME
GO (Places Visited)
REAL NAME GO (Recent Races Visited)
GO (Places Checked In)
EMAIL ADDRESS GO (Places Liked)
GO (Pages Liked)
TELEPHONE NUMBER
GO (Photos By User)
GO (Photos Liked)
DOMAIN NAME
GO (Photos Of 'Tagged)
GO (Photos Comments)
IP ADDRESS
GO (Photos Interacted)
Finally, a parting thought before you begin your journey through OSINT analysis and collection.
This book was written as a reference guide. It does not need to be read straight-through. I
encourage you to skip around when needed or if you feel overwhelmed. The second chapter
about Linux may make you want to abandon the teachings before ever utilising an online resource
or website. When you encounter material that seems too technical or not applicable, please move
on to the next topic. The book is suitable for all skill levels, and there is something here for
everyone. You can always return to advanced topics later.
Chapter One
Prepare your computer
The first four editions of this book began with search engine techniques. Right away, I offered
my methods for collecting online information from various popular and lesser known search
websites. This may have been due to my own impatience and desire to “jump in” and start finding
information. This edition will begin much differendy. Before you attempt any of the search
methods within this book, I believe you should prepare your computing environment.
I was motivated to begin with this topic after teaching a multiple-day OSJNT class. On day two,
several attendees brought laptop computers in order to attempt the techniques I was teaching
during the course. During a break, I observed police officers searching Facebook on patrol
vehicle laptops; private investigators using Windows XP while browsing suspects’ blogs; and
global security professionals looking at hacker websites without possessing any antivirus software
or script blockers.
I have also been guilty of all of this. Early in my career of researching OSINT, I did not pay any
attention to computer security or proper browsing habits. While I was aware of malicious
software, I knew I could re-install Windows if something really bad happened. This was reactive
thinking. I believe that we must all proactively attack vulnerabilities in our privacy and security
while conducting online research. This chapter is not meant to be a complete guide to computer
security or a manual for total privacy. Instead, I hope to quickly and efficiently propose the most
beneficial strategies that will protect you from the majority of attacks. Applying the changes
mentioned in this chapter will provide a valuable layer of security to your online investigations
and overall computing habits. In the next chapter, I present my solutions for guaranteed
protection during online investigations.
The most basic place to start is your antivirus. It is likely that most readers already have an
antivirus solution and are insulted at the mention of it in a book like this. I will keep my thoughts
very brief. If you are using Microsoft Windows, you absolutely need antivirus software. If you
are using an Apple computer, you might not Antivirus applications only protect against known
variants of viruses. They do not stop everything. A new virus can often bypass the best software
detection solutions. A better defense is applying better browsing habits instead of relying on an
application.
There are a dozen popular antivirus companies that will provide a free solution. For most
Windows users, I simply recommend to use Microsoft’s products. Users of Windows 7 should
use Microsoft Security Essentials while Windows 8 and 10 users should use the default Windows
Defender included with their installation. Privacy enthusiasts will disagree with this advice, and I
understand their stance. Microsoft products tend to collect your computer usage history and
analyze the data. Unfortunately, their core operating systems also do this, and it is difficult to
disable long term. Therefore, I believe that Windows users are already disclosing sensitive
information to Microsoft Using their antivirus solutions will not likely enhance the data being
collected.
Mac users do not have any built-in antivirus protection, and most do not need any. The software
architecture of Mac computers is much more secure, and viruses are rare (but they do still occur).
I no longer recommend the free commercial products such as Avast, Kaspersky, and others. They
tend to be more of an annoyance than helpful, and their business practices can be questionable.
However, I do believe that it is irresponsible to have absolutely no protection whatsoever. When
I conduct investigations from a Mac computer, I possess an open-source antivirus solution called
ClamAV.
ClamAV (not to be confused with the unnecessary paid option of ClamXAV), is a community-
driven antivirus database, which is freely available to anyone. It usually does not score very high
on “Top 10 Antivirus” websites, which are usually paid advertisements. However, it is completely
free, does not run on your system non-stop, only executes when you desire, and can be completely
removed easily. Unfortunately, there is no easy software installation process, and no point-and-
click application. You will need to manually update the database through a Terminal command,
then scan your system from the same prompt. ClamAV does not remove any viruses, it only
discloses the presence and location of suspicious files. In my use, ClamAV has never found a
virus that impacted a Mac computer. Instead, it has identified numerous malicious files that target
Windows machines, but were present on my system (mostly as email attachments). This
notification allowed me to manually remove those files, which could prevent future infection of
my Windows virtual machines. If you have concerns about having a “naked” Mac with no
antivirus, the following instructions will configure your Mac to be better protected.
First, you must install a package manager called Brew. This program is very beneficial when there
is a need to install programs that would usually already be present on a Linux computer. It also
happens to have a pre-configured version of ClamAV ready to go. The easiest way to install Brew
is to visit the website brew.sh and copy and paste the following command into the Terminal
application (Applications > Utilities > Terminal).
After Brew is installed, type the following commands, hitting “Return” after each line, into the
same Terminal application used previously.
ffeshclam -v
clamscan -r -i /
The first option will download all virus definition updates, and should be executed before each
scan. The second option conducts a scan of the entire computer, and will only prompt you with
details of found viruses. While it may appear to be dormant, it is working, and will notify you
upon completion. All of these commands must be exact. In order to assist with this, I have
created a web page with all of these commands at IntelTechniques.com/clamav. On a final note
about ClamAV, you may occasionally receive a false-positive report of a virus. Do not panic.
Research the file on the internet and identify the issues. If you receive reports of malicious files
within email, simply delete those messages. The use of ClamAV on Mac computers is more about
preventing the spread of bad files to Windows users instead of protecting your own machine.
Whether on Windows or Mac computers, protection from malicious software, otherwise known
as malware, is vital. Again, there are numerous free options from which to choose. I recommend
Malware Bytes for both Windows and Apple users. It is completely free and thorough. I suggest
executing, updating, and scanning at least once a week on every device that you use.
Your computer should also be cleaned weekly. As you browse the internet and use applications,
unnecessary files accumulate and slow the operating system. I recommend CCleaner for all
Windows and Apple users. It is free and easy to use. It provides a simple interface and is used to
clean potentially unwanted files and invalid Windows Registry entries from your computer. The
following steps will download and install the free version of the application.
• Navigate to http://www.piriform.com/ccleaner/download.
• In the “Free” column, click on “download”.
• Execute the program and accept the default installation settings.
After the installation completes, launch the program. You have several options under the Cleaner
tab that will allow you to choose the data to eliminate. The default options are safe, but I like to
enable additional selections. Clicking on the “Analyze” button will allow the program to identify
files to delete without committing to the removal. This will allow you to view the files before
clicking ‘Kun Cleaner” to remove them. If you are running this program on a computer with
heavy internet usage, you may be surprised at the amount of unnecessary files present The first
time you use this program, the removal process can take several minutes and possibly an hour. If
you run the program weekly, it will finish the process much quicker.
The Registry tab of CCleaner will eliminate unnecessary and missing registry entries. This can
help your computer operate more efficiently. The default options on this menu are most
appropriate. Click on “Scan for Issues” and allow it to identify any problems. This process should
go quickly. When complete, click on “Fix Selected Issues” to complete the process.
The Tools tab provides an easy way to disable specific programs from launching when your
computer starts. These programs can slow your computer down when they are running
unnecessarily. These can be found by clicking the “Startup” button in the left column. I once
selected the Adobe and Java programs and applied the “Disable” button. They were then marked
as “No” and would not launch the next time my computer started. If I wanted to reverse this, I
could select the entries again and choose “Enable”.
Proper antivirus, malware protection, and cleaning solutions will gready enhance your overall
computing experience. It will help your computer to run smoothly and may prevent malicious
files from infecting your operating system. It will help protect the integrity of any online
investigations. I refer to these steps as the “staples”. They are the minimum requirements before
proceeding and apply to any computer user.
Those that want to conduct advanced searches on the internet must progress to another level.
You must upgrade your web browser and stop relying on Microsoft’s Internet Explorer or Edge
browsers. I believe that you should only use one of two web browsers: Firefox or Chrome. Many
of the techniques in this book, especially in the Application Programming Interfaces (APIs)
chapter, will fail when used in conjunction with Microsoft’s browsers. They require a more
sophisticated solution with proper add-ons. I will focus on Firefox first, as it is my preferred
browser for every investigation.
Many readers find that security restrictions on their computers prohibit them from installing any
software, including web browsers. While I have found that downloading portable versions of
Firefox and Chrome eliminate this restriction, my experience is that this action will upset the
computer support personnel that originally enabled the rules. Please research your organization’s
computer use policies before placing any software on company owned machines.
Those in law enforcement should be more cautious than others. Not only could installing
unauthorized software on a government computer violate internal policies, but it could also
jeopardize your case in court If a defense attorney can prove that you violated your own rules
and regulations, regardless of how minor or inconsequential, it leaves an opening to request a
judge to dismiss your entire findings. Please make sure that you always have the proper
authorization to conduct any techniques mentioned in this book.
Firefox (mozilla.org)
The most vital application in this chapter is the Firefox web browser. Most of the search methods
that you will learn throughout this book must be conducted within a web browser. Most people
setde for Internet Explorer or Edge, which is included with Windows. I do not recommend using
those browsers for OSINT analysis. The Firefox browser has enhanced security and a feature
called “add-ons” or “extensions”. These are small applications that work within the browser that
perform a specific function. They will make searching and documentation much easier. I also use,
and encourage others to use, the Chrome web browser when necessary. However, many of the
extensions that I need are only compatible with Firefox. The following instructions apply to any
versions of Firefox, including Windows, Mac, and Linux.
Downloading and installing Firefox is no, different than any other application. Detailed directions
are readily available on their website. The browser will not look much different from the browser
you were previously using. When installing and executing, choose not to import any settings from
other browsers. This will keep your browser clean from unwanted data. The next step is to ensure
your browser is up-to-date. You can check your version of Firefox by clicking on the Menu
button in the upper right (three horizontal lines), then the Help button (?), and finally the option
labeled About Firefox. This will open a new window that will display the version of Firefox you
are running, or a warning that the version you have is out-of-date.
In November 2017, Firefox released version 57 of their browser. These updates usually go
unnoticed by most users, as the changes are minimal. However, this was not the case with 57.
This completely new version of Firefox included major speed improvements, a cosmetic face
lift, and most importandy the elimination of legacy extensions (also called add-ons). In the
previous edition of this book, I spoke of various Firefox add-ons that would enhance your
collection of online information. The majority of these extensions were disabled with this new
release. Some developers updated their software to make these options work with the newest
version of Firefox while others decided to abandon their projects. At the time of this writing,
Firefox is offering an Extended Support Release (ESR) that will safely allow the execution of an
older browser which allows legacy extensions. However, this is a temporary solution, and may
not be an option by the time that you read this. Therefore, I will only focus on long-term options
that should be valid throughout the life cycle of this book.
Before identifying Firefox resources that will aid in our OSINT research, we must first secure
our browser to the best of our ability. While the default Firefox installation is much more secure
than other browsers, we should still consider some modifications. I personally use Firefox for all
of my OSINT investigations, and as my personal web browser. I no longer possess multiple
browsers for various tasks. I believe that Firefox is the most robust, secure, and appropriate
option for almost any scenario. However, I recommend changing the following settings from the
Options (Windows) or Preferences (Apple) menu within Firefox.
General: When Firefox Starts: I choose “Show a blank page’* at this prompt This will make
your browser open faster, and eliminate the unnecessary loading of a default web page.
Privacy & Security: Browser Privacy: Deselect the “Remember passwords for sites” and “Use
a master password” options. When browsers store a password, they usually do not do so in a
secure manner.
Privacy & Security: History: Under the “Firefox will:” option, select “Use custom settings for
history” from the pull-down menu. This will allow you to choose everything that is stored or
forgotten when you close your browser. Next, uncheck “Remember my browsing and download
history” and “Remember search and form history”. This will prevent Firefox from remembering
any history after your browsing session has closed. Next, check the box that says “Accept cookies
from sites”. This will allow cookies from the sites you visit. Without cookies, it is very difficult
to use social networks, online streaming services, or some search engines. Next, under the
“Accept cookies from third party sites” drop-down, select “Never”. Under “Keep until”, which
refers to how long cookies are retained, select “I close Firefox”. This option will ensure they are
not saved after your browsing session has ended. Finally, check the box that says “Clear history
when Firefox closes”.
Privacy & Security: Firefox Data Collection and Use: Uncheck both of these options This
prevents Firefox from sending data about your session to their servers.
about:config Settings
Firefox allows users to modify many configuration settings, and some of these deal with privacy
and security concerns. Though some of these changes can be made in the preferences menu of
Firefox's preferences, changes made through about: config tend to be more durable and granular.
To access the list of configuration settings, open Firefox and type "aboufcconfig" into the URL
bar. You will receive a warning about making changes within this area, but the modifications we
make will be safe. Choose to accept the risks.
Some of these about:config settings may already be on the "correct" setting, but most probably
will not. To change most of these settings you can simply double-click the setting to toggle it
between "True" and "False". Some may require additional input, such as a number. Because the
list of about:config settings contains hundreds of entries, you will probably wish to search for all
of these through the search bar in the about:config interface.
WebRTC (Web Real-Time Communications): The next few settings in about:config deal with
the WebRTC vulnerability that can allow your IP address to be leaked, even if using a VPN.
media.peerconnection.enabled: FALSE
media.peerconnection.tum.disable: TRUE
media.peerconnection.use_document_iceservers: FALSE
media.peerconnection.video.enabled: FALSE
It is not vital that all of these security settings be applied to your systems. Firefox natively respects
your privacy and security more than other browsers. These recommendations are for those that
truly want to tweak additional settings that may provide a layer of protection, even if minimal.
Next, I will discuss the biggest benefit of Firefox, which is the abundance of helpful browser
extensions called add-ons.
Firefox Add-ons (Extensions)
There are thousands of extensions available for Firefox. Some are helpful, some are worthless,
and some are just fun. This chapter will discuss thirteen of them. The Firefox add-ons, sometimes
called extensions, detailed here will include a website for each option. You can either visit the
website and download the add-on or search for it from within Firefox. The former is usually the
best way. While Firefox is open, click on the menu in the upper right and then “Add-ons”. This
will present a page with a search field in the upper right comer. Enter the name of the extension
and install from there. The following are my recommendations, in order of importance.
The following pages will provide explicit instructions for installing and configuring each of these
add-ons. Alternatively, I have configured each of these into a new Firefox browser and exported
the settings. If desired, import these configurations into your own Firefox browser for a turn-key
solution. This technique will be explained at the end of this section, but I encourage you to
consider customizing your own version of Firefox. If you plan to use the Buscador Virtual
Machine explained in the next chapter, all of these configurations have already been conducted
and are the default option upon boot.
Video Download Helper (downloadhelper.net)
This extension will assist with downloading media that is located during your search. It works
well with videos such as those found on YouTube. When this extension is enabled, an icon will
appear within your browser that looks like three grey circles. Any time you open a website that
includes media content, such as a video, these circles will turn to full color. This is an indication
that the media on the page can be extracted. While this add-on will work immediately after
installation, I have found specific configuration changes to be helpful to OSINT investigators.
• Click on the icon placed in your menu bar and select the icon for “Settings”
• Click the Behavior tab and change the Max concurrent downloads to 20
• Change the Max Variants to 99
• Select the Hide ADP Variants option
When downloading videos, especially from YouTube, the ADP format requires secondary
conversion software to be installed. I do not like this option as it introduces unnecessary software
to my machine. Furthermore, I never want to convert video evidence. I simply want to extract
the options available directly from the source. Therefore, eliminating the ADP options from our
view as explained above reduces the chance of downloading undesired content. In Figure 1.01
(left), the ADP options are present and would not be ideal download choices. In the example on
the right, I have eliminated these choices and I am presented with more appropriate options.
You can now extract embedded media files from websites by clicking the icon and selecting the
appropriate file. If your desired media is going to be used in court, I recommend downloading
all sizes available. If you only want a personal archive, the largest size should be downloaded.
You will now have a pure digital extraction of the target video. This is better than a screen capture
or recording of the video because there is no loss of data or analog conversion. If downloading
a large number of videos, consider the custom script that will be explained in the next chapter.
o
O '78x144 - la* - 3GPP
Figure 1.03: Files extracted from Twitter with Bulk Media Downloader.
Documenting and archiving your progress with an OSINT investigation is as important as the
intelligence discovered. The general rule is that if you do not have proof of your findings, then
they never existed. FireShot provides you with an easy solution to capturing all of your results.
When enabled, this extension is a button in the upper right portion of your browser. It appears
as a blue square containing the letter “S”. Clicking the icon presents a menu with options. The
best option is to select “Capture entire page” and then “Save to PDF”. This will then create a
PDF document of the entire page exactly as it appears in your browser and save it to anywhere
you choose. The file can later be archived to a removable storage device. The title of the
document will match the title of the web page and it will include the URL of the selected page.
This method is preferred over a standard screen capture for several reasons. A typical screen
capture only captures the visible area and not the entire page. You must then open a program
into which you “paste” the data and then save the file. The FireShot extension automates this
and saves it in a format that is difficult to edit This can be beneficial during testimony.
By accessing the “Options” area of the menu, you can assign customized naming features. Click
“Show filename template settings” in the options page and change the default value to the
following.
%n-%u-%t-%y-%m-%d-%H-%M-%S
Be sure to “Apply” and then “Save”. This setting will change the default name of each page
capture. Each file will be named a numerical value, followed by the website URL, followed by
title, and followed by the date and time of capture. Changing the %n value to 0 and the Pad
option to 3 will ensure that your captures always start with a numerical value of 0 and ascend
chronologically. This can help determine the order of the evidence that you retrieved. Figure 1.04
displays a typical series of results. Notice that you can quickly see the order captured (first three
digits), target website, description, and date & time.
• Click on the Nimbus icon and choose the “gear” icon in the lower-right
• Check the Enable Quick Capture option and select the Entire Page option in the first
row and Download option in the second row.
After these changes, clicking the Nimbus icon in the menu bar will no longer present a menu
with options. Instead, it will automatically select the entire page, apply the proper file naming,
and download the capture as a maximum quality PNG file to your Desktop. While a PDF file
created with FireShot is the preferred file format, a PNG file has other advantages. The PNG file
is more universal and does not require PDF viewing software such as Acrobat Reader. However,
PNG files are easy to edit, and establishing the integrity of the file may be difficult I believe that
Nimbus should be used as a supplement to FireShot.
One common failure of both FireShot and Nimbus is the capture of extremely large Facebook
and Twitter pages. While this is rare on computers that have ample resources such as processing
power and RAM, it can be quite common on older machines with low specifications. Surprisingly,
I have found FireShot to work better on large Twitter profiles and Nimbus to be best for large
Facebook pages. I have no logic to offer for this discovery. Again, having both at our disposal
will make us better prepared for online evidence collection.
uBlock Origin
In the previous edition of this book, I recommended NoScript as my choice of script blocker. I
no longer use NoScript at all. During the transition to Firefox 57, NoScript changed drastically.
It became much more convenient to use, at a cost of functionality. We were no longer given
granular control of the data that is passed through our browser, and lost several features required
for private and secure browsing. I also previously recommended Adblock Plus and Disconnect
as privacy add-ons that would help stop unwanted ads, tracking, and analytics. These are no
longer present on my systems. I now only use uBlock Origin, as it replaces all three of the
previous options. This section may seem a bit overwhelming, but experimenting with the
advanced settings should help you understand the functionality. Let’s start with the basics.
Install uBlock Origin from the Firefox add-ons page or direcdy by navigating to the application’s
website at https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/. You are now
protected on a basic level. By default, most known invasive advertisements, tracking code, and
malicious content is blocked. This step alone would provide much needed protection from the
internet. However, we can take it a step further.
Click on the uBlock Origin icon in the menu and select the Dashboard icon to the right This will
open a new tab with the program’s configuration page. On the Settings tab, click the option of
“I am an advanced user”. This will present an expanded menu from the uBlock Origin icon from
now forward. Click on the 3ld-Party Filter tab and consider enabling additional data sets that will
protect your computer. I select all options within the Ads, Privacy, Malware Domains, and
Annoyances categories. After you have made your selection, click the Update Now button at the
top of the page. This will refresh all of the data and apply your new settings. You now have
extended protection that will be applied to all visited websites without any interaction from you.
When you encounter a web page with a lot of advertisements, such as a news media website, it
should load much faster. It will block many of the pop-ups and auto-play media that can be quite
annoying when conducting research. This protection will suffice for most users, but dedicated
OSINT analysts may choose to take a more advanced approach.
After you have enabled the Advanced settings as explained above, clicking on the uBlock Origin
icon should now present an expanded menu that will change as you visit different sites. In order
to explain the function of this menu, I will conduct a demonstration using the website cnn.com.
Figure 1.05 displays the default view. While this book is printed in black and white, your view
will be in color, and likely all options will appear grey. Scrolling down this list of scripts that have
either been loaded or blocked, you can see several questionable scripts such as Facebook,
Sharethrough, and Turner. These scripts allow tracking across multiple websites and are the
technology responsible for monitoring your interests, web history, and shopping habits.
This menu is split into three columns. The first simply identifies the type of code or domain name
of the script The second column is global settings. Anything changed here will apply to all
website visits. The third column contains settings for the current website. A single plus sign (+)
Another random document with
no related content on Scribd:
“You have certainly been misinformed,” said she; “you are
welcome to search the house, but be assured you will find no such
men here.”
“Come, come, my little fair un, that is all in my eye and Betty
Martin. Here they are, this is certain, and we are determined to make
our quarters good till we find them out;” and away they went to
search the other apartments of the house.
Meanwhile our charming little protectress, alarmed at the
threatened siege, and fearing that we would be starved into a
surrender, took the opportunity, while the gang were rummaging the
parlour and some other bedrooms, to supply our garrison with
provisions. A basket with boiled ham, a couple of capons, a
household loaf of ample dimensions, half-a-dozen of brown stout,
the family bottle of excellent stingo, and a can of water, were
expeditiously handed up the vent. This supply set our minds quite at
ease, as we knew it would enable us to stand a week’s close siege. Our
patience, however, was not put to this trial, for the gang, after a two
hours’ vigilant search, abandoned their pursuit in despair, and
departed.
We could not, of course, think of venturing up to Bristol to look
after our wages, so we employed our landlord to perform this duty.
After a good many vexatious delays, we succeeded in getting our
money, paid off all scores, and began to think how we were to
dispose of ourselves. My companion Lindsay was so deeply smitten
with the charms of one of the youthful sirens, that he found it
impossible to depart; and I had to concert all my future projects
alone, and leave him bound in Cupid’s silken chain.
My blue jacket and fringed dimity trousers, my check shirt and
scarlet vest, were at once discarded, and their places supplied by
articles of a more landward appearance. I knew that it would be
impossible to travel the country safely in seaman’s dress, so I
determined to try my fortune as a beau. The body of Bill Bobstay
incased in a ruffled shirt, silk vest, white stockings, breeches
buttoned at the knees, and a swallow-tailed coat, presented such a
curious spectacle, that he himself could scarcely help laughing at it,
and it seemed to produce the same effects on the landlord’s
daughter, as she with a witching smile chucked up my chin, until she
arranged the bights and ends of my white neckcloth, according to the
most approved form. She took as long to perform this little office as I
could have rigged in toto, and seamen are never backward in acts of
courtesy, when the ladies are concerned. Her ruby lips were all the
while within marlingspike’s length of my own, and how could I avoid
saluting them?
Thus equipped, I set out on foot for Bath, but as I had no business
to perform in that city of invalided nabobs, I immediately took coach
for London, and after travelling all night, I, on awaking from a short
nap, found myself rattling over the stones at Hyde Park corner.
My object was to procure a passage to the northward, in one of the
Leith or Berwick smacks, and I expected in eight or ten days, after an
absence of as many years, to set foot once more on my native soil. As
soon therefore as the coach stopped in Piccadilly, I alighted, and
knowing the bearing by compass of London Bridge, I, without
waiting to breakfast, winded my way through the Haymarket, past
Charing Cross, along the Strand, Fleet Street, and Ludgate Hill, till I
arrived at St Paul’s. From this point I took a fresh departure, and
holding as nearly as cross streets would admit, a south-easterly
course, gained Thames Street, and soon found myself in the vicinity
of the Tower.
Smartly as I had moved my body along, my imagination, as is
usual with me, had got a long way a-head. It had obtained a passage,
secured a fair wind, landed me on the pier of Leith, and was
arranging my introductory visit to my friends, so as to produce the
greatest sum of agreeable surprise. But there is much, says the old
proverb, between the cup and the lip. In the midst of this agreeable
reverie, as I was crossing Tower Hill, I found myself tapped on the
shoulder, and on looking round, was accosted by a man in seaman’s
dress in the words, “What ship?” I assumed an air of gravity and
surprise, and told him I apprehended he was under some mistake, as
my business did not lie among shipping. But the fellow was too well
acquainted with his business to be thus easily put off. He gave a
whistle, the sound of which still vibrates in my ear, and in a moment
I was surrounded by half-a-dozen ruffians, whom I immediately
suspected, and soon found out to be the press-gang. They dragged
me hurriedly through several lanes and alleys, amid the mingled
sympathy and execrations of a numerous crowd, which had collected
to witness my fate, and soon landed me in the rendezvous. I was
immediately ushered into the presence of the lieutenant of the gang,
who questioned me as to my name, country, profession, and what
business had led me to Tower Hill. Totally unexpecting any such
interruption, I had not thought of concocting any plausible story, and
my answers were evasive and contradictory. I did not acknowledge
having been at sea; but my hands were examined, found hard with
work, and discoloured with tar. This circumstance condemned me,
and I was remanded for further examination.
Some of the gang then offered me spirits, affected to pity me, and
pretended to comfort me under my misfortune, but like the
comforters of Job, miserable comforters were they all. The very
scoundrel who first seized me put on a sympathising look, and
observed what a pity it was to be disappointed when so near the
object of my wishes. Such sympathy from such a source was truly
provoking; but having no way of showing my resentment, I was
constrained to smother it.
In a short time I was reconducted into the presence of the
lieutenant, who told me, as I was already in his hands, and would
assuredly be kept, I might as well make a frank confession of my
circumstances. It would save time, and insure me better treatment.
What could I do? I might indeed have continued silent and sullen,
but of what service could this prove? It might, or might not, have
procured me worse treatment, but one thing I knew well, it would
not restore me to liberty. I therefore acknowledged that I had been a
voyage to the West Indies, and had come home carpenter of a ship.
His eye brightened at this intelligence.
“I am glad of this, my lad. We are very much in want of carpenters.
Step along with these lads, and they will give you a passage aboard.”
The same fellows who had first seized me led me along the way we
came, handed me into a pinnace lying at Tower Wharf, and before
mid-day I was safely handed on board the Enterprize.
What crosses and vexations, and reverses and disappointments,
are we mortals destined to meet with in life’s tempestuous voyage! At
eight in the morning I entered London a free agent, elated with joy,
and buoyed up with hope. At noon I entered a prison ship, a
miserable slave, oppressed with sorrow, and ready to despair.
Despair, did I say? No. I will have nothing to do with that disturber
of human peace. When misfortune befalls us, we are not to sit down
in despondency and sigh. Up and be doing, is the wise man’s maxim,
and it was the maxim I was resolved to observe. What befell me on
my arrival on board the Enterprize, what reception I met with, and
what mirth I excited as I was lowered into the press-room, with my
short breeches and swallow-tailed coat—what measures I exerted to
regain my liberty, and what success attended these measures—the
space at my disposal prevents me setting forth.—Paisley Magazine.
THE LAIRD OF COOL’S GHOST.