OSINT โ Open-Source Intelligence โ is the discipline of gathering information from publicly available sources to answer specific questions. The "open" doesn't mean free or easy; it means lawfully accessible without breaking into anything. The skill is knowing where to look, how to correlate findings, and when to stop.
This post is the cornerstone of the djEnterprises OSINT series: what the field actually is, who works in it, what a real investigation looks like, and the ethical guardrails that separate competent practitioners from people who get themselves into trouble.
What OSINT is, exactly
The formal U.S. government definition of OSINT comes from the Intelligence Community: information collected from publicly available sources for intelligence purposes. In practice, that includes news outlets, public records, social media, search engines, technical datasets, satellite imagery, court filings, corporate registries, leaked databases that are now public, and many other sources.
What OSINT is not:
- Not hacking. OSINT doesn't bypass access controls or exploit vulnerabilities. If a login is required, OSINT stops there.
- Not surveillance. Real-time monitoring of a specific individual generally requires legal authorization that OSINT alone doesn't provide.
- Not magic. Most OSINT findings come from patient cross-referencing of mundane public records, not from secret tools.
Who actually uses OSINT in 2026
- Cybersecurity teams โ for threat intelligence, attack surface mapping, and pre-engagement reconnaissance on penetration tests.
- Investigative journalists โ verifying stories, geolocating events, tracking corporate ownership chains.
- Law enforcement โ finding missing persons, supporting human-trafficking and child-safety investigations, financial crime.
- Due-diligence and fraud teams โ background research on business partners, M&A targets, and counterparties.
- National-security analysts โ geopolitical and economic intelligence, often a starting point before classified collection.
- Defenders โ auditing their own digital footprint (or their organization's) to understand what an attacker would see.
- Researchers and academics โ open-source verification of claims, election integrity, conflict monitoring.
The OSINT methodology
Good OSINT work follows a repeatable cycle. The exact phase names vary by source, but the structure is consistent:
- Define the question. What specifically do you need to know? Vague goals produce vague results.
- Plan the collection. Which categories of sources are likely to contain the answer? What's your time budget?
- Collect. Systematically pull data, preserving provenance (URL + timestamp + screenshot) for every finding.
- Process and verify. Cross-check claims against at least two independent sources. Many OSINT errors come from a single source confidently asserting something wrong.
- Analyze. Connect the dots. What do the findings mean in context?
- Report. Communicate findings with confidence ratings โ what's verified, what's likely, what's speculation.
Skipping the verification step is the most common mistake. The internet is full of confidently-wrong information that propagates because no one checked the original source.
Source categories every OSINT practitioner should know
Search engines & advanced operators
Google, Bing, and DuckDuckGo with advanced operators ("dorks") can surface information that's technically public but not indexed prominently. We cover this in depth in our Google Dorks post.
Internet device search engines
Tools like Shodan, Censys, and ZoomEye index internet-connected devices and services. Critical for security research and asset inventory. Our Shodan deep dive covers how to use it without misusing it.
Social media intelligence (SOCMINT)
Public posts, profile metadata, posting patterns, and social graphs. Privacy settings change frequently, so what was public yesterday may not be today.
Public records
Court filings (PACER, state systems), corporate registries (SEC EDGAR, state Secretary of State databases), property records, professional licensing boards. Vast, free, often under-indexed by major search engines.
Geospatial & imagery
Satellite imagery (some free, much commercial), mapping platforms, geolocation analysis of photographs. Covered in our geolocation OSINT post.
Technical telemetry
DNS records (WHOIS, passive DNS), TLS certificate transparency logs, BGP route data, archived web content (Wayback Machine), internet archives.
Breach & leak data
Once data is public, it's part of the OSINT corpus. Services like Have I Been Pwned index breach data lawfully for defensive purposes.
Operational security: not getting yourself burned
OSINT research can be observed. The websites you visit log your IP. Some platforms notify users when their profile is viewed. Professional OSINT operators use:
- Sock-puppet accounts โ separated identities for research, never connected to personal accounts. Set up on clean infrastructure.
- Compartmentalized browsers โ separate browser profiles or containers per investigation. No cookies bleeding between them.
- VPN or anonymizing proxies โ mask your real IP. Our VPN explainer covers what these actually do and don't hide.
- Dedicated research VM โ a virtual machine just for OSINT work. Snapshots before risky browsing, revert after.
- Document everything but tag carefully. Investigations grow fast. Without rigorous notes you'll re-do work.
Ethics & the law
Just because information is publicly accessible doesn't mean using it is appropriate or legal in every context. The boundaries:
- Computer Fraud and Abuse Act (US) โ bypassing terms of service can have legal consequences in certain contexts. Be cautious with automated scraping.
- GDPR (EU) โ collecting personal data on EU residents, even from public sources, triggers data-protection obligations.
- Stalking and harassment laws โ the techniques used in legitimate research can be misused for stalking. Don't.
- Platform terms of service โ many platforms prohibit automated collection. Violating ToS isn't always illegal but can have other consequences.
- Workplace authority โ corporate OSINT typically requires written authorization. Doing it on your own initiative against another company is risky.
A simple test: would you be comfortable explaining your work, in detail, to a journalist, a judge, and the subject of the investigation? If any of those answers is "no," reconsider what you're doing.
A starter framework for your first investigation
To learn OSINT, audit yourself. You are the safest possible subject. Here's a starter exercise:
- Search your own full name in Google, Bing, and DuckDuckGo. Open all results in the first three pages.
- Search your common usernames across major platforms. Cross-reference accounts you'd forgotten about.
- Run your email addresses through Have I Been Pwned to see which breaches you appear in.
- Pull your home address from a property-records site if relevant in your jurisdiction.
- Search your phone number in major search engines and reverse-lookup directories.
- Document everything you find with screenshots and URLs.
The output is a snapshot of what an attacker, a journalist, or a recruiter would see when they look for you. It's almost always uncomfortable, and almost always actionable โ most people have specific accounts they can lock down, services they can opt out of, and content they can request removed.
Where to go from here
This post is the front door. The rest of our OSINT series covers specific techniques in depth:
- Shodan.io โ Searching the Internet of Things
- Google Dorks โ Advanced Search Operators
- The OSINT Toolkit โ Tools Every Researcher Should Know
- Username & Email OSINT
- Geolocation OSINT
- OSINT for Cybersecurity Reconnaissance
- Privacy Defense โ Auditing Your Own Footprint
djEnterprises offers OSINT-focused consulting engagements for security teams, legal teams, and journalists. Book a discovery call if you'd like to talk through a specific project.
- U.S. Director of National Intelligence โ What is Intelligence (OSINT overview)
- SANS Institute โ OSINT Summit archives
- Bellingcat โ OSINT investigation methodology resources
- Have I Been Pwned โ Breach data lookup
- OSINT Framework โ Categorized directory of OSINT resources