Are you new to OSINT? You may have questions. How can you start? What are the best resources in the OSINT community? This page will provide you with some resources that will give you an understanding of how OSINT can be utilized.
OSINT Related Articles: An Introduction to Open Source Intelligence (OSINT) Gathering https://www.secjuice.com/introduction-to-open-source-intelligence-osint What is OSINT? How can I make use of it? https://securitytrails.com/blog/what-is-osint-how-can-i-make-use-of-it OSINT is a State of Mind https://medium.com/secjuice/osint-as-a-mindset-7d42ad72113d How to get started in Online investigations with Open Source Information https://firstdraftnews.org/how-to-get-started-in-online-investigations-with-open-source-intelligence-osint How to find Information on Anyone https://medium.com/@Peter_UXer/osint-how-to-find-information-on-anyone-5029a3c7fd56 2019 OSINT Guide https://www.randhome.io/blog/2019/01/05/2019-osint-guide How to get started with open-source investigations, from the BBC team behind Cameroon: Anatomy of a Killing https://www.journalism.co.uk/video/how-to-get-started-with-open-source-investigations-from-the-bbc-team-behind-cameroon-anatomy-of-a-killing/s400/a728268 Open-Source Intelligence (OSINT) Reconnaissance https://medium.com/@z3roTrust/open-source-intelligence-osint-reconnaissance-75edd7f7dada Google Hacking Techniques https://securitytrails.com/blog/google-hacking-techniques OSINT Frameworks: technisette.com osintcurio.us osintframework.com osintframework.de https://github.com/jivoi/awesome-osint Https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA Try this Exercise: Test out your OSINT skills by searching your own digital footprint. Use Google and Bing to search your information. The starting points for your search would be your name, usernames, businesses, phone numbers, and email addresses. That's all for now - thanks for reading! OSINT Techniques This post will focus on the following areas: Relevant Software Applications, Operating System Settings, Devices, Browsing Habits, and Online Accounts.
Relevant Software Applications
Operating System Settings
Devices
Browsing Habits
Online Accounts
Today we outlined only some considerations when attempting to protect yourself online. Of course, there are numerous other precautions you can take to protect your security online depending on specific threats. Due to the ever-evolving digital age, we must take it upon ourselves to keep up with new security features. Thanks for reading! OSINT Techniques
Open source is defined as publicly available information, i.e. information that any member of the public can lawfully obtain. In order to conduct research on individuals or businesses, OSINT is used by various organizations such as law enforcement, investigative journalists, and law firms. Information to start your research can include a name, email address, phone number, home address, website, business name, etc You can harness the power of the tools available to you by determining where to look for information among both the Surface and Deep Web. The Surface web is what you find when you search using traditional search engines like Google and Bing. The Deep web is a place on the internet where traditional search engines typically do not have access; keep in mind that a vast majority of material on the internet is held within the Deep web. Some starting points if you have a name, phone number or email address are:
Always remember to protect your privacy when conducting your open source research. There is more than one way to protect your identity online. For example, you can anonymize your identity by:
Another factor to consider when researching online is critical thinking which is paramount to conducting open source research. Remember it’s not Open Source Intelligence (OSINT) if you just find someone’s Facebook or other social media account, ask yourself what value does it add to the investigation? What would be relevant to the investigation? Ask yourself the who, what, where, when, and how questions. Create the necessary linkages and associations between entities of importance; this is where you give meaning to raw information you originally collected. Analyze open source information you locate, and turn it into intelligence. OSINT is not collected, it is produced, and remember that intelligence is the outcome of information being evaluated and analyzed. One of the ways to learn more about OSINT is to immerse yourself in current content in the field; read and explore OSINT related books and blogs.
Until next time, thank you for reading! OSINT Techniques |
|