A list of methodologies or a systematic approach. Everything will be found in the main guide.
- Threat Modeling → Identify what matters.
- Self-OSINT Audit → Map your exposure.
- Profiling Others → Structured intelligence collection.
- Counter-OSINT → Privacy hardening + disinformation.
- Physical/Data Protection → Encrypt, compartmentalize, destroy.
- Continuous Review → Adapt cycle, detect PsyOps, stay disciplined.
📍 Goal: Know what you must protect and from whom.
-
Identify Critical Information (CII)
- What do you not want adversaries to know? (emails, network access, home address, sensitive ops, habits).
- Main Guide: CII cycle
-
Analyze Threats & Vulnerabilities
- Who might target you? Employer, stalker, law enforcement, competitor, criminal groups.
- Which vectors are exposed? (social media, old blogs, leaked credentials).
-
Assess Risks
- Probability × Impact = Risk priority.
Example: Old breached email reused across accounts → high risk.
- Probability × Impact = Risk priority.
-
Develop Countermeasures
- Use anonymization, encryption, compartmentalization, and disinfo.
➡️ Cycle: Identify → Analyze → Assess → Protect → Re-evaluate
(Classic OPSEC process).
📍 Goal: Audit yourself before adversaries do.
- Google Dorks:
"First Last" "Address","email.com" site:pastebin.com - Check Google's "Results About You" Index
- People Search Aggregators (US only): PeekYou, ClustrMaps, Nuwber
- Breach Data: HIBP → Pentester.com → LeakPeek
- Compile Findings in CSV/Excel (username/email variations, breached accounts, addresses).
- Document & Categorize by type (Emails, Phones, Addresses, Socials).
➡️ Outcome: A map of your public exposure across the web.
📍 Goal: OSINT workflow for targets, investigations, or red-teaming.
-
Collect Digital Biography
- Gather handles, emails, phone numbers.
- Use Maigret, Blackbird, Crow, Sherlock.
-
Analyze Behavioral Patterns
- Posting hours → timezone.
- Topics/content → interests, affiliations.
- Reply habits → sociability/temperament.
-
Assess Competencies & Countermeasures
- Do they use VPN/Tor? Privacy-focused OS?
- Do they reuse usernames or reveal location data?
-
Leverage IMINT / SOCMINT
- Cross-check posted photos against Google Maps / Bing / GeoHints.
- Extract network ties through follows, likes, hashtags.
-
Iterate
- New email → re-run Phase 2 pipelines.
- Create timeline from old to new accounts.
➡️ Digital profiling cycle = Biography → Behavior → Competency → Tools → Iterate.
📍 Goal: Reduce footprint & mislead hostile collectors.
-
Compartmentalization
- Separate work/personal/anonymous personas.
- Never reuse usernames/emails across compartments.
-
Privacy Hardening
- Lock down social media privacy.
- Opt-out of brokers via Big Ass List / IntelTechniques workbook.
-
disinfo Ops
- Flood decoy identities.
- Redirect investigators with misinformation.
- Create false ties (dummy handles, meaningless patterns).
-
OPSEC Habits
- Use Signal/SimpleX for chats.
- Use Tor and Mullvad VPN separately, not chained.
- Use Monero (XMR) or cash where anonymity is critical.
➡️ Outcome: exposure shrinks + adversary signal-to-noise ratio collapses.
📍 Goal: Eliminate vulnerabilities in hardware, files, and physical space.
-
Physical Security
- Locks, cameras, sometimes firearms or chemical deterrents (where legal).
- Layered defense (Perimeter → Interior → Access Control → Response).
-
Data-at-Rest Protection
- Encrypt drives (VeraCrypt, LUKS).
- Password management: KeePassXC DB1 (human pw) → unlock DB2 → unlock containers (VeraCrypt).
-
File Transfer OPSEC (Tails)
- OnionShare / Taildrop for online.
- Encrypted USBs for offline.
-
Secure Data Destruction Matrix
- HDD → DBAN → drill/hammer/shred platters.
- SSD/NVMe → nvme-cli / nvme-sanitize → destroy NAND chips directly.
- USB → fill with zeros → smash chip, don't just format.
➡️ Outcome: No physical compromise leaks into digital OSINT exposure.
📍 Goal: Stay adaptive and guard against psychological operations.
- Iterate: Run self-OSINT quarterly.
- Profile Adversaries: Just as they profile you.
- PsyOps Awareness: Recognize manipulation (sales, social media, politics).
- Guard Against Paranoia: Skeptical without isolating yourself.
From Digital-Profiling.md:
-
Understand the Basics - Digital profiling gathers and analyzes online data; behavioral analysis infers motives, habits, and future actions.
-
Collect Digital Biographical Information - Gather identifiers, track online activity, search for recurring usernames, document findings.
-
Analyze Behavioral Patterns - Look for posting times, topics, language, interaction style, preferred platforms, and social networks.
-
Assess Competencies and Affinities - Evaluate technical skill, privacy awareness, sociability, and domain expertise.
-
Use Analytical Tools - Employ search engines, data aggregators, visualization/statistics tools and Natural Language Processing (NLPs) for deeper analysis.
-
Iterate and Refine - Continuously update the profile as new data emerges; use structured documentation.
From IMINT.md:
-
Reverse Image Search - Use Google Lens or specialized tools to find image sources and related content.
-
Geolocation Analysis - Cross-reference public images with mapping tools like Google Maps or Street View.
-
SOCMINT Integration - Combine visual intelligence with social data from platforms like Facebook, Instagram, LinkedIn.
-
Verification - Validate findings through multiple sources and analytical techniques.
From HUMINT.md:
-
Direct Engagement - Use interviews, debriefings, and interpersonal communication.
-
Rapport Building - Establish trust through shared interests and gradual disclosure.
-
Active Listening - Use body language and verbal cues to encourage information sharing.
-
Observation - Notice details about appearance, environment, and behavior.
-
Ethical Considerations - Respect privacy boundaries and legal constraints.
From disinformation.md:
-
Information Overload - Flood open sources with irrelevant or misleading information.
-
Decoy Accounts - Create fake social media profiles and websites.
-
False Attribution - Plant data pointing to incorrect actors or locations.
-
Obfuscation Techniques - Use anonymization and deliberate mislabeling of data.
