Tutorial 1: What is OSINT? – Complete introduction to Open Source Intelligence

Learning objectives

By the end of this tutorial, you will understand:

  • The definition and scope of Open Source Intelligence (OSINT)
  • The evolution of OSINT from traditional to digital sources
  • Different types of OSINT sources and their applications
  • Who uses OSINT and for what purposes
  • The advantages and limitations of OSINT
  • A basic OSINT methodology
  • Common challenges in OSINT investigations

What is OSINT?

Open Source Intelligence (OSINT) is the collection and analysis of data gathered from open sources, meaning overt sources and publicly available information, to produce usable intelligence. OSINT is intelligence created by collecting, evaluating, and analyzing publicly available data to meet a specific intelligence need.

OSINT includes all information that is publicly available and legally accessible without special permissions, clearances, or breaking privacy or copyright laws. This includes both online and offline sources such as the internet, books, magazines, TV broadcasts, radio programs, and scholarly publications.

Some people confuse OSINT with hacking, but the main difference is that OSINT is not hacking. It is a legal, non-intrusive, and strategic way to gather information from public sources. OSINT practitioners work only with data that is already available in the public domain, making it a fully legal and ethical approach to collecting intelligence. In contrast, hackers try to breach protected systems to obtain information or carry out other harmful activities.

The intelligence cycle in OSINT

It is important to note that information alone doesn’t equal intelligence. Raw data must be processed, analyzed, and put into context to become useful intelligence. The OSINT process follows the traditional intelligence cycle:

  1. Planning and direction: Defining intelligence requirements and objectives
  2. Collection: Gathering relevant information from open sources
  3. Processing: Organizing and formatting collected data
  4. Analysis and production: Evaluating information credibility and producing intelligence
  5. Dissemination: Sharing intelligence with relevant stakeholders

The evolution of OSINT

OSINT has been around for a long time. Its roots trace back to military intelligence work during World War II and the Cold War. However, it has evolved a lot with the rise of the internet and web technologies.

Traditional OSINT (Pre-Internet Era)

Before the digital revolution, OSINT relied heavily on:

  • Paper newspapers and magazines
  • Academic journals and publications
  • Television and radio broadcasts
  • Government publications and reports
  • Public speeches and conferences
  • Library archives and public records

Modern digital OSINT

The internet age has exponentially expanded OSINT capabilities:

  • 1990s-2000s: Basic websites, forums, and early databases
  • 2000s-2010s: Social media explosion, search engine advancements
  • 2010s-Present: Big data analytics, artificial intelligence integration, data generated from various IoT devices
  • 2020s-Present: AI-powered analysis, automated collection tools, deep web accessibility

Today’s OSINT practitioners have access to many more information sources, but also face new challenges in managing information overload and ensuring data accuracy.

OSINT sources: A comprehensive overview

OSINT resources can be divided into several categories based on their nature, accessibility, and format:

Online/digital sources

1. Internet resources

  • Websites and blogs: Corporate websites, personal blogs, news sites
  • Search engines: Google, Bing, Yandex and specialized search engines such as files and FTP search engines
  • Social media platforms: Facebook, Twitter/X, LinkedIn, Instagram, TikTok contain a massive amount of public data
  • Forums and communities: Reddit, Discord, specialized forums contain meaningful discussions about everything you can imagine
  • Code repositories: GitHub, GitLab, SourceForge

2. Digital databases

  • Public records: Government databases such as vital records, court records, and business registrations
  • Academic databases: Research papers, patents, scholarly articles
  • News archives: Digital newspaper archives, news aggregators
  • Specialized databases: Industry-specific databases, professional directories

3. Multimedia content

  • Images and videos: Photo sharing platforms such as Flickr, video hosting sites like YouTube
  • Podcasts and audio: Streaming platforms, radio archives
  • Documents: PDF repositories, document sharing sites
  • Geospatial data: Satellite imagery, mapping services

Offline/traditional media sources

1. Print media

  • Newspapers and magazines
  • Books and publications
  • Academic journals
  • Government reports
  • Industry publications

2. Broadcast media

  • Television news and programs
  • Radio broadcasts
  • Podcasts (offline archives)
  • Documentary films

3. Physical sources

  • Public libraries and archives
  • Government offices and public buildings
  • Conference proceedings
  • Trade shows and exhibitions

Who uses OSINT? Key user groups and applications

OSINT is mainly used in national security, law enforcement, and business intelligence, but its uses go well beyond these traditional areas to reach areas as far as people’s personal lives.

1. Government and national security

Governments and national security agencies use OSINT to identify threats, track adversaries, and support decision-making. Analysts gather publicly available data from news, social media, satellite imagery, and official records to monitor conflicts, spot disinformation, and evaluate geopolitical risks. OSINT helps in counterterrorism, cyber defense, border control, and crisis response by providing timely, reliable information without secret operations. It works alongside classified sources, delivering fast insights into new events and foreign activities.

2. Corporate and business intelligence

Corporations use OSINT to protect their assets, keep an eye on competitors, and make informed decisions. Publicly available data, such as financial filings, patents, regulatory reports, and social media, helps spot market trends, new technologies, and possible partners or acquisition targets. Security teams monitor data breaches, phishing domains, and leaked credentials to lower cyber risk.

Examples include:

  • Competitive analysis: Watching rival product launches through press releases and supplier disclosures.
  • Mergers and acquisitions: Evaluating a target’s reputation through customer reviews and legal filings.
  • Fraud detection: Spotting counterfeit goods by scanning online marketplaces.
  • Supply chain risk: Monitoring geopolitical events or labor disputes that could affect key vendors.

OSINT offers real-time intelligence without the need for costly proprietary sources, which supports smart investments and proactive risk management.

3. Cybersecurity and IT security

OSINT enhances cybersecurity by identifying threats and minimizing attack surfaces through publicly available data. Security teams monitor pastebin sites, forums, and dark web marketplaces for leaked credentials, exposed APIs, or stolen source code. Domain and DNS monitoring can detect phishing campaigns or malicious infrastructure before attacks escalate.

Examples include:

  • Threat intelligence: Recognizing malware indicators and attacker IPs shared in open feeds.
  • Vulnerability management: Keeping track of disclosures or exploit proofs-of-concept to prioritize patching.
  • Brand protection: Finding fake websites or social profiles that impersonate the company’s online assets.

By continuously gathering and examining open data, OSINT helps organizations detect breaches, respond quickly, and strengthen their defenses without depending only on internal logs or classified intelligence.

4. Journalism and media

In a journalistic setting, OSINT is utilized in various ways, such as:

Discovery and story ideas 

Journalists use OSINT to find leads and uncover stories that official channels do not present. 

  • Social media monitoring: Tracking trending hashtags, following important figures, and monitoring public sentiment can show emerging crises, protests, or scandals.
  • Data scraping: Analyzing large public datasets such as government spending, court records, and corporate registries can uncover patterns of corruption, inequality, or fraud.
  • Satellite imagery: Observing changes in landscapes over time can expose illegal deforestation, construction in disputed areas, or the growth of refugee camps.

Verification and fact-checking 

In today’s world of misinformation, checking user-generated content (UGC) is one of the most important uses of OSINT. 

  • Geolocation: Identifying the exact location of a video or photo to verify that it was taken where it claims to be. This process includes matching landmarks, shadows, plants, and architectural styles with tools like Google Earth, Google Street View, or satellite images.
  • Chronolocation: Confirming the time a photo or video was taken by looking at factors like weather reports for that day, the position of the sun and shadows (using tools like SunCalc), or metadata, if it is trustworthy.
  • Source verification: Checking the online history of the person who shared the content. Do they have a consistent record? Is their account genuine or likely a bot?
  • Reverse image/video search: Utilizing tools like Google Reverse Image Search, Yandex, or TinEye to see where else an image has appeared online, which helps to disprove old images being presented as new.

Investigation and evidence gathering 

OSINT provides the foundation for thorough investigative work. 

  • Conflict reporting: Reporters investigate wars and human rights violations from a distance. Bellingcat’s work on the downing of MH17 over Ukraine and the chemical attacks in Syria serves as key examples. Their findings rely almost entirely on OSINT, including social media videos, satellite images, and flight data.
  • Tracking people and networks: Investigators use corporate registries, legal documents, LinkedIn profiles, and social media connections to outline the networks of oligarchs, corrupt officials, or extremist groups.
  • Visual investigations: Major news organizations like The New York Times and the BBC have teams focused on visual investigations. They apply 3D modeling, missile trajectory analysis, and video synchronization to recreate events.

5. Legal and compliance

OSINT plays a vital role in Legal and Compliance for due diligence, evidence collection, and regulation monitoring. Lawyers use it to investigate parties in litigation, uncover hidden assets through public databases and social media, and assess jurors. For example, a lawyer might analyze geotagged photos to verify a witness’s location.

To ensure compliance, companies routinely review public sources to meet Anti-Money Laundering (AML) and Know Your Customer (KYC) standards. This includes monitoring news for negative information about clients, examining corporate registries for ultimate beneficial ownership, and checking sanctions lists to avoid dealings with banned entities. For instance, OSINT can reveal a client’s undisclosed political connections, which may necessitate additional due diligence. This approach transforms public data into valuable legal insights and enables proactive risk management.

6. Academic and research institutions

Academic and research institutions use OSINT to improve studies, verify data, and track new trends. Researchers examine open datasets, government reports, and satellite images for projects in climate science, urban planning, and epidemiology. For example, climate scientists analyze publicly available satellite images to study deforestation. Public health teams monitor social media and news feeds to track disease outbreaks. Cybersecurity programs gather threat information from open repositories like VirusTotal or GitHub to teach real-world defense techniques. Social science departments review election results, census data, and online discussions to understand political behavior. By using freely accessible sources, universities gain timely insights without costly proprietary data, supporting both academic research and practical innovation.

OSINT advantages: Why organizations choose OSINT

1. Cost-effectiveness

OSINT provides excellent value by using free or low-cost public sources. Unlike traditional intelligence methods that need expensive surveillance gear, human resources, or classified information, OSINT mainly relies on internet resources, public databases, and open records that are mostly free. One analyst with basic tools can gather detailed intelligence that would normally take teams and large budgets. The scalability is impressive; expanding OSINT operations does not significantly raise costs. Organizations can achieve strong intelligence-gathering capabilities for the price of internet access, basic software, and analyst time, making it the most cost-effective intelligence discipline out there.

2. Legal and ethical compliance

OSINT works entirely within legal boundaries by only using publicly available information. This approach removes legal risks linked to unauthorized access, hacking, or surveillance. The benefit of compliance is important; organizations have no legal liability because all sources are openly accessible and do not violate privacy laws, terms of service, or require special permissions. The ethical foundation is also strong. OSINT respects individual privacy by using only information that people have chosen to share publicly. Intelligence gathered through OSINT can usually be used in legal proceedings, unlike evidence obtained through questionable methods. This compliance builds trust for organizations, legal teams, and stakeholders, making OSINT a safe and defensible method of intelligence that upholds professional and ethical standards.

3. Speed and accessibility

OSINT provides rapid and easy access to intelligence. Information is available immediately, without the need to wait for human sources, surveillance, or bureaucratic approval. Sources operate 24/7 worldwide, allowing real-time data collection across time zones without delays. Unlike traditional intelligence, which often requires physical presence or special access, OSINT sources can be reached from anywhere with an internet connection. Search engines, social media, and databases deliver results in seconds rather than days or weeks. This quick access is crucial for urgent investigations, verifying breaking news, or rapidly changing situations. The easy availability of information levels the playing field—small organizations can access the same sources as large agencies.

4. Comprehensive coverage

OSINT offers a wide range of information across many areas. It includes different types of sources, such as text, images, videos, audio, documents, and geospatial data. This variety helps create a detailed picture of intelligence. Historical archives hold decades of information, which supports trend analysis and background research that other methods can’t achieve. Geographic coverage reaches globally without physical limits, allowing access to information from any country or region instantly. Its multi-language abilities remove language barriers, enabling intelligence gathering across cultures and nations. The range of platforms, including social media, news sites, government databases, academic publications, and forums, ensures a broad gathering of perspectives. This large coverage allows analysts to cross-reference information, spot patterns, and develop complete intelligence products that traditional sources alone cannot provide.

5. Integration capabilities

OSINT works well with modern technology and workflows. You can easily gather information automatically using APIs, web scraping tools, and custom scripts. This allows for ongoing monitoring and collection without needing manual effort. OSINT data fits nicely with artificial intelligence (AI) and machine learning (ML) systems for pattern recognition, sentiment analysis, and prediction. The standardized digital formats make it easy to connect information from different sources, databases, and platforms. OSINT directly links to Security Information and Event Management (SIEM) systems, threat intelligence platforms, and business intelligence tools. This setup makes it possible to have real-time dashboards, automated alerts, and detailed reporting. Unlike traditional intelligence, which needs manual processing, OSINT data flows easily through organizational systems. It improves existing workflows without disruption, making it very valuable for modern, data-driven organizations.

OSINT methodology: Systematic approach to intelligence gathering

The OSINT framework is a methodology that integrates data, processes, methods, tools and techniques to help the security team identify information about an adversary or their actions quickly and accurately.

Phase 1: Requirements and planning

This foundational phase establishes clear intelligence objectives and operational parameters. Analysts define specific questions that need answering, identify stakeholders who require the intelligence, and determine the scope of investigation. Key activities include setting realistic timelines, allocating resources, and establishing success criteria. Requirements must be specific, measurable, and aligned with organizational needs. Planning involves risk assessment, legal considerations, and methodology selection. This phase prevents scope creep and ensures focused, efficient investigations. Without proper planning, OSINT efforts become unfocused and waste resources. Clear requirements guide all subsequent phases and determine investigation success.

Phase 2: Source Identification and selection

This phase involves mapping and prioritizing relevant information sources based on intelligence requirements. Analysts identify potential sources across various categories – social media, government databases, websites, web archives, and specialized platforms. Sources are evaluated for relevance, reliability, accessibility, and timeliness. Prioritization considers source credibility, information quality, and collection feasibility. Tool selection occurs here, choosing appropriate collection methods and technologies. This systematic approach ensures comprehensive coverage while avoiding information overload. Source documentation creates a searchable repository for future investigations. Proper source selection directly impacts intelligence quality and investigation efficiency, making this phase critical for successful outcomes.

Phase 3: Collection

The collection phase involves gathering information systematically according to planned strategies. Analysts carry out search protocols, document all sources and methods, and keep detailed collection logs. Key principles include a systematic approach, preservation of evidence, and quality control throughout the process. The collection must be thorough but focused, avoiding scope drift while ensuring complete coverage. All collected information needs proper attribution and timestamping for verification. This phase requires patience, attention to detail, and compliance with legal and ethical guidelines. Good documentation allows for reproducibility and supports later analysis phases. The quality of the collection directly affects the reliability and usefulness of the final intelligence products.

Phase 4: Processing and analysis

Raw information becomes useful intelligence through validation, correlation, and pattern recognition. Analysts check the credibility of sources, compare information from different sources, and look for connections or trends. This step includes separating facts from opinions, assessing the reliability of information, and identifying any gaps. Critical thinking is key for evaluating conflicting information and making sound conclusions. This is where we build timelines, map relationships, and test hypotheses. The aim is to turn data into insights that address the initial intelligence needs. The quality of analysis affects the value of intelligence and has a direct impact on how well decisions are made for stakeholders.

Phase 5: Production and dissemination

The final phase turns analyzed information into useful intelligence products for stakeholders. These products can include detailed reports, executive briefings, visual presentations, or real-time alerts based on needs. Effective communication involves using the right formats, visualization methods, and security classifications. Distribution guarantees timely delivery to relevant decision-makers through secure channels. Collecting feedback helps improve future investigations and confirms the usefulness of the intelligence. This phase also includes archiving for future reference and documenting lessons learned. The success of all OSINT operations relies on clearly communicating findings to support informed decision-making. Poor distribution undermines all prior efforts, no matter how good the analysis is.

OSINT challenges: Limitations and obstacles

Despite its many advantages, OSINT faces several significant challenges that practitioners must understand and address:

  • Information overload: The sheer volume of public data can overwhelm the OSINT analysts, making it difficult to filter relevant signals. For example, during a fast-moving crisis, millions of social media posts may bury critical updates.
  • Data accuracy and verification: Public sources often contain false or misleading information. Disinformation campaigns or outdated records can skew analysis—such as fake reports circulating during elections.
  • Legal and ethical constraints: Privacy laws (e.g., GDPR) and platform terms of service restrict data collection and use. Violating these can expose organizations to legal action.
  • Attribution difficulties: Identifying the trustworthy source of online content is challenging. Threat actors frequently mask identities using VPNs, proxy servers, or stolen accounts.
  • Language and cultural barriers: Valuable intelligence may appear in foreign languages or cultural contexts unfamiliar to analysts. For instance, regional slang on local forums can obscure key insights.
  • Data volatility: Online information can be deleted or altered quickly, making timely capture critical. A malicious tweet or leaked document may disappear before verification.
  • Technical complexity: Advanced scraping, geolocation, and data-mining skills are often required. Smaller organizations may lack the expertise or tools to handle large-scale OSINT operations.
  • Counter-OSINT measures: Adversaries deliberately plant false data or use encryption and closed networks to mislead investigators, as seen in some cybercrime groups.

Addressing these challenges requires rigorous validation, specialized tools, multilingual capabilities, and strong legal compliance frameworks to ensure OSINT remains actionable and trustworthy.

Best practices for OSINT success

Develop a systematic approach

Successful OSINT investigations need a disciplined and methodical process instead of random information gathering. A systematic approach starts with creating standardized workflows that ensure consistency for both investigations and analysts. Develop detailed investigation templates that outline step-by-step procedures, required documents, and quality checkpoints.

Keep thorough investigation logs that record all sources consulted, search terms used, and findings discovered. This documentation is crucial for reproducibility and audit trails. Create repeatable processes that can fit different types of investigations, which helps with knowledge transfer and training standardization. Use structured data collection methods, consistent naming conventions, and organized file management systems. This systematic base helps prevent missed chances, cuts down on errors, and supports scalable OSINT operations that maintain quality, no matter the complexity or the analyst’s experience level.

Verify everything

Information verification is essential for credible OSINT analysis. Publicly available information can be outdated, biased, or intentionally false. Always cross-check findings using multiple independent sources before accepting them as fact. Follow the “three-source rule.” Confirm critical information through at least three separate, unrelated sources to establish its reliability. Evaluate source credibility by looking at publication history, editorial standards, possible biases, and expertise in the relevant subject matter. Verify publication dates and how often information is updated to ensure its currency and relevance.

When possible, check original sources instead of depending on secondary reports. Use reverse image searches to verify the authenticity of visual content and to spot manipulated media. Fact-check claims against trusted databases, official records, and established references. Document the verification steps you take for each piece of information. This creates an audit trail that backs up your conclusions and allows for peer review.

Stay current

The OSINT landscape changes quickly as new tools, techniques, platforms, and threats appear all the time. Successful practitioners need to commit to ongoing learning. Monitor specialized OSINT communities, forums, and social media groups where members share the latest updates, tool changes, and new techniques. Follow industry leaders, researchers, and organizations on Twitter, LinkedIn, and relevant forums. Subscribe to OSINT newsletters, blogs, and podcasts that provide regular updates on new trends, tools, and case studies. Attend virtual and in-person conferences, workshops, and training sessions to learn from experts and connect with others in the field. Participate in OSINT challenges and competitions that test your skills against changing scenarios. Regularly review and update your toolkit as platforms change, new sources become available, or existing tools fall out of use. Experiment hands-on with new techniques and tools in safe settings. Join professional associations and certification programs that offer organized learning paths and uphold industry standards for OSINT practice.

Maintain ethics

Ethical conduct is fundamental to responsible OSINT practice and professional credibility. Always respect privacy boundaries by limiting collection to truly public information and avoiding attempts to access restricted or private content.

Strictly follow legal guidelines including data protection regulations like GDPR, CCPA, and local privacy laws that may restrict information use even if publicly available. Consider information sensitivity and potential harm – just because information is public doesn’t mean it should be collected or shared. Use information responsibly, ensuring findings serve legitimate purposes rather than harassment, stalking, or malicious intent.

Obtain proper authorization before conducting investigations involving individuals or organizations. Respect platform terms of service and avoid automated collection methods that violate website policies. Consider the human impact of your investigations, particularly regarding private individuals who may be inadvertently affected. Document ethical decision-making processes and maintain professional standards that would withstand public scrutiny and legal review.

Build technical skills

OSINT effectiveness depends heavily on technical proficiency across diverse tools, platforms, and analytical techniques. Master multiple search engines beyond Google, including specialized databases, academic repositories, and niche platforms relevant to your investigation domains.

Learn automation capabilities through programming languages like Python for web scraping, data processing, and repetitive task automation. Develop proficiency with OSINT-specific tools such as Maltego, Shodan, TinEye, and various social media analysis platforms. Understand data analysis techniques, including timeline construction, link analysis, and pattern recognition, to extract meaningful insights from collected information.

Stay updated on technology trends including artificial intelligence integration, new social media platforms, and emerging data sources. Practice with different operating systems, browsers, and privacy tools to maintain operational security. Build skills in data visualization, report writing, and presentation techniques to effectively communicate findings. Develop expertise in specific domains relevant to your work, whether cybersecurity, financial investigations, or corporate intelligence, ensuring deep technical knowledge supports broader OSINT capabilities.

Conclusion

Open Source Intelligence represents one of the most accessible and powerful approaches to information gathering in the modern digital age. Of all the threat intelligence subtypes, open source intelligence (OSINT) is perhaps the most widely used, reflecting its versatility and effectiveness across numerous domains.

Understanding OSINT fundamentals provides the foundation for advanced techniques and specialized applications. As we progress through this tutorial series, we’ll explore specific tools, techniques, and methodologies that will enhance your OSINT capabilities.

The key to OSINT success lies in combining systematic methodology with creative thinking, technical skills with ethical considerations, and automated tools with human analysis. By mastering these fundamentals, you’ll be well-prepared to tackle the more advanced OSINT techniques covered in subsequent tutorials.

Next steps

In Tutorial 2, we’ll dive deep into image analysis techniques, exploring reverse image searches, metadata extraction, and the various file types you’ll encounter in OSINT investigations. This hands-on tutorial will provide your first practical OSINT skills.

Further reading