The OSINT Bible

How to use OSINT to investigate targets and protect against it.

Up a Level Propose Changes

Resources

Kill Chain

Introduction

Open Source Intelligence (OSINT) is one of the most powerful strategies for gathering information and uncovering “secrets” passively from the perspective of the target. OSINT encompasses a wide range of applications, from legitimate uses like conducting due diligence before signing contracts, to more questionable activities such as monitoring political opponents. In the context of cybersecurity, OSINT helps Red Teams and Threat Hunters to gather intelligence about a target. For instance, it can be used to facilitate spear-phishing campaigns or identify vulnerable systems exposed on the internet. The potential of OSINT is so vast that, in 2025, the U.S. government established a subagency dedicated to this activity. This guide will first provide an overview of OSINT, introduce key tools, and ultimately offer guidance on how to better protect yourself from its potential threats.

Everything Is Prone To OSINT

When people first begin to study OSINT, they often associate it with stalking people on social media. While that’s a common misconception, OSINT means much more than just social media monitoring. In fact, the term “SOCMINT” specifically refers to the process of gathering intelligence from social media platforms. OSINT, however, includes a wide range of information-gathering techniques, both in digital and physical worlds, allowing for a comprehensive intelligence collection about a target.

GEOINT

Geospatial Intelligence is, in my opinion, one of the most fascinating forms of OSINT, though it also remains one of the least accessible to the general public. Its development is closely linked to the Cold War and the space race. In the early years of the USA vs. USSR rivalry, intelligence gathering was typically conducted through physical espionage — sending undercover agents to infiltrate enemy territory and relay information back. However, with the rise of the space race and the development of the first satellites, an anonymous clever mind within the CIA had the idea of using satellites for surveillance, which eventually led to the CORONA project.

CORONA first image

Before CORONA, the U.S. was already conducting GEOINT, starting after World War II, but relied on stealth aircrafts like the iconic Lockheed U-2. Similarly, the Soviets had their own methods of surveillance, using planes such as the Beriev S-13, which was their counterpart to the U-2.

Today, GEOINT has become a standard tool in geopolitics, with countries deploying a variety of resources such as military and commercial satellites, unmanned aerial vehicles (UAVs), GPS data, LIDAR-equipped planes, and more. GEOINT is also the reason why military bases appear blurred on Google Maps — it’s a protective measure that shields sensitive locations from curious minds, especially for countries lacking the resources to engage in traditional GEOINT.

Despite this, Google Maps remains an invaluable tool for civilians, offering rich information for reconnaissance purposes. It allows individuals to conduct preliminary research on targets, including studying physical security measures. Google Street View, for instance, provides the opportunity to analyze a building’s security systems, and in some cases, even identify the company responsible for physical security.

SIGINT

CYBINT

DARKINT

HUMINT

SOCMINT

Tools

Protecting Against OSINT

Average Joe

Digitally Exposed Person

High Corp

Persona Non Grata