*Our world is more connected than ever before, and our data is all out there somewhere.*
So anon, while sailing the high seas of the internet, what made you drop your anchors here?
I'd assume you're here because you are a curious individual and want to know more about OSINT. What OSINT *really* is, what it's for, what type of people use it, and how to successfully utilize it, right?
Okay cool. So WTF is OSINT anyways? It's actually an acronym.
**O**pen **S**ource **INT**elligence = **OSINT**.
Open-source intelligence as described by its [Wikipedia article](https://en.wikipedia.org/wiki/Open-source_intelligence) ([WikiLess](https://wikiless.org/wiki/Open-source_intelligence)):
> **Open-source intelligence** (**OSINT**) is a multi-factor (qualitative, quantitative) methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an [intelligence](https://en.wikipedia.org/wiki/Intelligence_(information_gathering)) ([WikiLess](https://wikiless.org/wiki/Intelligence_assessment)) context. In the [intelligence community](https://en.wikipedia.org/wiki/Intelligence_agency) ([WikiLess](https://wikiless.org/wiki/Intelligence_agency)), the term "open" refers to [overt](https://en.wiktionary.org/wiki/overt#Adjective), publicly available sources (as opposed to covert or clandestine sources). OSINT under one name or another has been around for hundreds of years. With the advent of instant communications and rapid information transfer, a great deal of actionable and predictive intelligence can now be obtained from public, unclassified sources. It is not related to [open-source software](https://en.wikipedia.org/wiki/Open-source_software) ([WikiLess](https://wikiless.org/wiki/Open-source_software)) or [collective intelligence](https://en.wikipedia.org/wiki/Collective_intelligence) ([WikiLess](https://wikiless.org/wiki/Collective_intelligence)).
Basically, this is the practice of collecting publicly available, open-source information. Further reading material can be found at the bottom of this article.
Well, "open-source" in the context of OSINT means locating and collecting information from any publicly available source. Such as published works, publicly available archives, the internet, your local city hall, books, videos, movies, forums, social media, leaked data, hacked data, pictures, newspapers, reports and so on. Not to be confused with FOSS warez (That means **F**ree and **O**pen **S**ource **S**oftware, by the way).
These information gathering techniques have been used for over 2,000 years. Back in the day, this was used in written form. Art, sculptures, books, scrolls, cave paintings, carvings, and so on. In the more modern centuries, libraries, archives, newspapers, documents and images were used. After technology advanced a bit, recorded telegraphs, radio frequencies, television broadcasts, government archives, city hall archives, and things of that nature were also used. Developed in the late 20th century, humanity was gifted the [world wide web](https://en.wikipedia.org/wiki/World_Wide_Web) ([WikiLess](https://wikiless.org/wiki/World_Wide_Web?lang=en)), also known as the *internet*.
With the creation of search engines, online phone books, online newspapers, BBS boards, IRC channels, social media sites, searchable archives, the BitTorrent protocol, file sharing sites, decentralized networks, scene/warez groups, and all the other millions of different things available online, everything in the intelligence game changed permanently for everyone.
These OSINT operations, which are conducted by governments, private sector agencies, police and other law enforcement entities, journalists, investigators, [private military contractors (PMCs)](https://en.wikipedia.org/wiki/Private_military_company) ([WikiLess](https://wikiless.org/wiki/Private_military_company?lang=en)), state-sanctioned [advanced persistent threats (APTs)](https://en.wikipedia.org/wiki/Advanced_persistent_threat) ([WikiLess](https://wikiless.org/wiki/Advanced_persistent_threat?lang=en)), cyber-security specialists, whitehats, blackhats, script kiddies on Xbox Live and your average everyday low-tech users alike. For example, have you ever Googled yourself? Looked up someone that you know online? Searched for someone or something that you wanted to know more about? Did you find anything? I bet you probably did.
Gratz! You have already technically conducted an extremely basic OSINT investigation. Your trophy is in the mail!
Open-source information gathering gets way more complex than just simply looking things up on Google. Although using search engines is usually a good place to start your initial investigation.
Great, your target has a large online presence, therefor makes your job much easier. OSINT in general is a massive subject that is constantly evolving and new techniques are always being explored and new tricks being discovered. This is a huge subject, and here's why.
First of all, the term "***OSINT***" is essentially an "*umbrella*" term for open-source intelligence work. There are many different categories in the intelligence field plus a ton of different acronyms are used for different topics of research, which are explained below.
Here is a list and brief descriptions of the common acronyms that you will likely come across on your investigative journey into the exciting realm of open-source intelligence.
- [[PDF] DIA - Defense and Intelligence Abbreviations and Acronyms - November 1997](https://www.dia.mil/FOIA/FOIA-Electronic-Reading-Room/FOIA-Reading-Room-Other-Available-Records/FileId/39954/).
- [[PDF] Counter Intelligence Glossary - Terms and Definitions of Interest for CI Professionals - June 2014](https://fas.org/irp/eprint/ci-glossary.pdf).
Did you read those? Probably not, but that's okay. Just save them to your drive for future reference at least.
> k cool.. So what is any of this crap good for anyways? Can I find out what my 9th grade girlfriend is up to now?
It's good for discovering information on just about anything. So yes, you *could* be a weirdo and creep your ex from the 9th grade if that's what you really want to do... However, doing that is certainly not recommended, extremely stalker-ish and certainly not what this blog is all about.
Passive OSINT is the preferred way to collect information, this means you are not in any way interacting with your target(s) at all. Not messaging the target, not sending friend requests, not liking posts, not following their accounts, and so on. Instead, you are collecting information without ever making the target aware of it. An investigator would remain distant from the target, therefor having a much lower risk of getting burned. Here are some examples of what a passive approach would include.
- Looking up historical WHOIS and DNS records for a target domain.
**Approach: Offensive Collection**
Offensive OSINT (Also known as "*Active OSINT*") is not usually recommended, as it brings heat towards you because you are making contact with the target in some way. You may risk spooking your target into hiding or having them start removing their online presence. However, sometimes it may be necessary for an investigator to interact with their target in some way, just be sure if you are going to do this. You do it properly by using sock-puppet accounts, VPNs, disposable VMs, etc. Here are some examples of what an offensive approach would include.
- Sending your target a friend request or follow request from a sock-puppet account.
- Sending your target a private message of any kind.
There are usually considered to be five phases for conducting a successful OSINT investigation. Take a look at this flow chart for a quick understanding of what the hell I'm talking about.
A basic diagram that shows the five phases of OSINT.
Some professionals have more than 5 phases if a certain investigation requires it. Such as conducting active surveillance and reconnaissance on a physical target or area.
Here is a list of the five phases along with brief descriptions of what they are.
- [[PDF] The RIS Open Source Intelligence Cycle - Arno Reuser - 2017](https://arnoreuser.com/wp-content/uploads/2018/12/201712-The-RIS-OSINT-Intelligence-Cycle.pdf).
This is a list of open-source related books, manuals, articles and research papers that you should read, or at the very least download and/or purchase for future reference.
- [[PDF] Joint Military Intelligence Training Center - Open Source Intelligence Professional Handbook - October 1996](http://www.oss.net/dynamaster/file_archive/080807/a3127ddeaa9a083affdddce6766401fc/Open%20Source%20Intelligence_Professional%20Handbook.pdf).
- [[PDF] US Department of Justice - Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources - 2020](https://www.justice.gov/criminal-ccips/page/file/1252341/download).
- [[PDF] Open Source Intelligence Investigation: From Strategy to Implementation - Akhgar, B. - 2016](http://bib.opensourceintelligence.biz/STORAGE/2016.%20Open%20source%20intelligence%20investigation.pdf).
- [[PDF] Sailing the Sea of OSINT in the Information Age - Mercado, S.C. - 2004](http://bib.opensourceintelligence.biz/STORAGE/2004.%20Sailing%20the%20sea%20of%20OSINT.pdf).
- [[PDF] NATO - Open Source Intelligence Handbook - November 2001](http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSINT%20Handbook%20v1.2%20-%20Jan%202002.pdf).
You probably don't need to read all of those, but you should! If you actually did download and read all of the above books and are hungry for more. Then check out these two awesome and very well put together lists of open-source intelligence related books and papers.
Anyways, if you have an interest for investigative intelligence work, then this is the blog for you. Go ahead and bookmark this site, I'll wait.
Honing in and improving your OSINT skill set will help you in many different aspects of life. Using some 1337 techniques, which I will be showing you in my future posts. We can easily search through a massive pile of available data to find the details and specifics of an individual, group, place, country, company, network, vehicle, boat, aircraft and basically anything else you can imagine.
A lot of this information is something that most of the low-techs and NPC's don't even realize is publicly available, but is.