OSINT? WTF??
What is open-source intelligence?
Last updated
What is open-source intelligence?
Last updated
"The internet is just one giant book that is written in real-time, about all of us.
- You just have to know how to read it".
So anon, while sailing the high seas of the internet, what made you drop your anchors here?
I'd assume you're here because you are a curious individual and want to know more about OSINT. What OSINT really is, what it's for, what type of people use it, and how to successfully utilize it, right?
Okay cool. So WTF is OSINT anyways? It's actually an acronym.
Open Source INTelligence = OSINT.
Open-source intelligence as described by its Wikipedia article (WikiLess):
Open-source intelligence (OSINT) is a multi-factor (qualitative, quantitative) methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence (WikiLess) context. In the intelligence community (WikiLess), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources). OSINT under one name or another has been around for hundreds of years. With the advent of instant communications and rapid information transfer, a great deal of actionable and predictive intelligence can now be obtained from public, unclassified sources. It is not related to open-source software (WikiLess) or collective intelligence (WikiLess).
Basically, this is the practice of collecting publicly available, open-source information. Further reading material can be found at the bottom of this article.
Open-source? WTF does that mean?? Isn't that a warez thing?
Well, "open-source" in the context of OSINT means locating and collecting information from any publicly available source. Such as published works, publicly available archives, the internet, your local city hall, books, videos, movies, forums, social media, leaked data, hacked data, pictures, newspapers, reports and so on. Not to be confused with FOSS warez (That means Free and Open Source Software, by the way).
These information gathering techniques have been used for over 2,000 years. Back in the day, this was used in written form. Art, sculptures, books, scrolls, cave paintings, carvings, and so on. In the more modern centuries, libraries, archives, newspapers, documents and images were used. After technology advanced a bit, recorded telegraphs, radio frequencies, television broadcasts, government archives, city hall archives, and things of that nature were also used. Developed in the late 20th century, humanity was gifted the world wide web (WikiLess), also known as the internet. With the creation of search engines, online phone books, online newspapers, BBS boards, IRC channels, social media sites, searchable archives, the BitTorrent protocol, file sharing sites, decentralized networks, scene/warez groups, and all the other millions of different things available online, everything in the intelligence game changed permanently for everyone.
These OSINT operations, which are conducted by governments, private sector agencies, police and other law enforcement entities, journalists, investigators, private military contractors (PMCs) (WikiLess), state-sanctioned advanced persistent threats (APTs) (WikiLess), cyber-security specialists, whitehats, blackhats, script kiddies on Xbox Live and your average everyday low-tech users alike. For example, have you ever Googled yourself? Looked up someone that you know online? Searched for someone or something that you wanted to know more about? Did you find anything? I bet you probably did.
Gratz! You have already technically conducted an extremely basic OSINT investigation. Your trophy is in the mail!
So, you're just a "professional Googler"?
Technically no, but also yes.
Open-source information gathering gets way more complex than just simply looking things up on Google. Although using search engines is usually a good place to start your initial investigation.
Yeah right. I searched someone on Google and found loads of info on the first page.. Get good skid.
Great, your target has a large online presence, therefor makes your job much easier. OSINT in general is a massive subject that is constantly evolving and new techniques are always being explored and new tricks being discovered. This is a huge subject, and here's why.
First of all, the term "OSINT" is essentially an "umbrella" term for open-source intelligence work. There are many different categories in the intelligence field plus a ton of different acronyms are used for different topics of research, which are explained below.
Here is a list and brief descriptions of the common acronyms that you will likely come across on your investigative journey into the exciting realm of open-source intelligence.
That is most of them. Read some more here.
Did you read those? Probably not, but that's okay. Just save them to your drive for future reference at least.
k cool.. So what is any of this crap good for anyways? Can I find out what my 9th grade girlfriend is up to now?
It's good for discovering information on just about anything. So yes, you could be a weirdo and creep your ex from the 9th grade if that's what you really want to do... However, doing that is certainly not recommended, extremely stalker-ish and certainly not what this blog is all about.
No wonder she dumped you lmao.
There are generally considered to be two different ways how information can be collected using OSINT.
Passive collection and Offensive collection.
Approach: Passive Collection Passive OSINT is the preferred way to collect information, this means you are not in any way interacting with your target(s) at all. Not messaging the target, not sending friend requests, not liking posts, not following their accounts, and so on. Instead, you are collecting information without ever making the target aware of it. An investigator would remain distant from the target, therefor having a much lower risk of getting burned. Here are some examples of what a passive approach would include.
Searching a target's username online to locate other accounts.
Looking up a target's email addresses in data breaches and leaks.
Saving posts, images and videos from a target social media accounts (Assuming they are public accounts).
Looking up historical WHOIS and DNS records for a target domain.
Approach: Offensive Collection Offensive OSINT (Also known as "Active OSINT") is not usually recommended, as it brings heat towards you because you are making contact with the target in some way. You may risk spooking your target into hiding or having them start removing their online presence. However, sometimes it may be necessary for an investigator to interact with their target in some way, just be sure if you are going to do this. You do it properly by using sock-puppet accounts, VPNs, disposable VMs, etc. Here are some examples of what an offensive approach would include.
Sending your target a friend request or follow request from a sock-puppet account.
Sending your target a private message of any kind.
Liking, commenting or sharing a target's posts.
Scanning a target website or device.
There are usually considered to be five phases for conducting a successful OSINT investigation. Take a look at this flow chart for a quick understanding of what the hell I'm talking about.
Some professionals have more than 5 phases if a certain investigation requires it. Such as conducting active surveillance and reconnaissance on a physical target or area.
Here is a list of the five phases along with brief descriptions of what they are.
Here are some additional white-papers about the OSINT processes and various OSINT cycles. Certainly worth reading.
This is a list of open-source related books, manuals, articles and research papers that you should read, or at the very least download and/or purchase for future reference.
OSINT Techniques: Resources for Uncovering Online Information 10th Edition - Michael Bazzell - 2023.
If you are only going to read one book here, then it should be this one^.
You probably don't need to read all of those, but you should! If you actually did download and read all of the above books and are hungry for more. Then check out these two awesome and very well put together lists of open-source intelligence related books and papers.
Anyway, if you have an interest for investigative intelligence work, then this is the blog for you. Go ahead and bookmark this site, I'll wait.
Honing in and improving your OSINT skill set will help you in many different aspects of life. Using some 1337 techniques, which I will be showing you in my future posts. We can easily search through a massive pile of available data to find the details and specifics of an individual, group, place, country, company, network, vehicle, boat, aircraft and basically anything else you can imagine.
A lot of this information is something that most of the low-techs and NPC's don't even realize is publicly available, but is.
Allow me to show you.
19,724 characters in 2,242 words.
Acronym | Meaning |
---|---|
Phase | Description |
---|---|
OSINT
Open-Source Intelligence
SOCMINT
Social Media Intelligence
GEOINT
Geospatial Intelligence
IMINT
Imagery Intelligence
ORBINT
Orbital Intelligence
VATINT
Vehicle and Transportation Intelligence
SIGINT
Signals Intelligence
TECHINT
Technical Intelligence
FININT
Financial Intelligence
AML
Anti Money Laundering
TRADINT
Trade Intelligence
CORPINT
Corporate Intelligence
HUMINT
Human Intelligence
SE
Social Engineering
MASINT
Measurement and Signature Intelligence
DNINT
Digital Network Intelligence
PERSINT
Personality Intelligence
RUMINT
Rumor Intelligence
OPSEC
Operation Security
TSCM
Technical Surveillance Counter-Measures
CI
Counter-Intelligence/Confidential Informant
POI
Person of Interest
Source Identification
Identify and locate potential information sources.
Intelligence Collection
Harvesting information from located and newly discovered sources.
Data Processing
Process discovered information into a readable, organized and actionable case file.
Analysis
Analyze discovered information to uncover patterns and new potential leads.
Reporting
Prepare your discoveries for presentation and present it to your superiors, clients or lawyers.