OSINT
OSINT
(OSINT)
Introduction to OSINT
What is Open Source Intelligence?
Commercial imagery
Financial and Industrial assessments
Databases, etc
Gray Literature:
Technical reports
Preprints
Patents
Working papers
Business documents
Unpublished works
Dissertations
Newsletters, etc.
Types of OSINT:
Active OSINT:
Direct contact with the target
More reliable results
Hihg risk of detection
Example: port scanning
Passive OSINT:
Contact based on third-party services
May include false positives and noise
Low risk of detection
Example: security Apls
Advantages:
Money-Saving
It’s Legal
Regularly Updated
National Security
Big Picture View
What is the value of OSINT?
OSINT has incredible value, both positive and negative to the originator or
dedicated recipient of the information:
Military, friendly
Business
and enemy
Law Government
Enforcement
Criminals
Spies
Rules for Using Open Source
Intelligence in Investigations
1. Have social media accounts
When using social media in your searches, most
networks will requre that you have an account in order
to search with any depth. Many investigators set up a
separate account to use for investigations to ensure
anonymity.
Some social media networks prohibit fake accounts so
read the rules before you sign up.
2. Learn how to use geolocation
Geolation can be a valuable addition to the OSINT
toolbox. IT uses clues in photor or videos to determine
the exact location where the photo or video was taken.
This is useful to corroborate claims by those using
these media as evidence and for finding a location if it
wasn’t supplied.
3. Check your facts
Double-check your results when researching anything
online. Anyone can put information and mis-
information on the web, so it’s important to know the
source and, when there is any doubt, to corroborate
anything you plan to present as fact.
4. Be anonymous
There are several ways to hide your identity when
searching online and sometimes it’s a good idea to do
so. Using Tor Browser is one reliable way to search
anonymously. There are also search engines that don’t
track users.
5. Don’t pretext
When using social media in your investigations, never
misrepresnt yourself in order to become Friends with
a subject. Not only does this violate the terms of most
socail media networks.
6. Check your bias
When conducting online research, it’s very easy to use
search terms.
7. Spend on OSINT tools
Some OSINT websites require you to join and pay a
monthly, annual or pre-use fee. While there many free
OSINT resources, it’s also a good idea to join some to
increase the depth of the searches you can perform
and to help you find information faster.
8. Stay current
The internet is constantly changing. An open source
resource that was there yesterday could be gonve
today and new, useful OSINT tools pop up every week.
Read blogs, follow OSINT experts on Twitter and stay
abreast of changes in the industry that can affect the
efficinecy and accuracy of your investigation.
9. Know that OSINT has limits
And, Finally, recognize that online research has its
limitations and that there’s some incorrect and
incomplete information on the internet.
Useful Browser Extensions:
OSINT Bookmark
Simple Link Extractions
HTTPS everywhere
No script
Privacy Badger
uBlock Origin
OSINT Tools:
Metadata search
Code search
People and identity investigation
Phone number research
Email search and verification
Linking social media accounts
Image analysis
Geospatial research and mapping, etc
OSINT Process