You are new to OSINT
Learn the intelligence cycle, the vocabulary, and the habits that keep an investigation honest before touching a single tool.
Read the methodology →OSINT Academy — A Subthesis Resource
A structured curriculum for practitioners who need to find, verify, and document what public information actually shows — without cutting legal or ethical corners.
Pick a pathway by where you are today. Each one lands you on material pitched at your level.
Learn the intelligence cycle, the vocabulary, and the habits that keep an investigation honest before touching a single tool.
Read the methodology →Journalism, academic research, financial, corporate, or legal — start from the domain guide that matches the work you already do.
Open the domain guides →Read worked investigations — how a lead became a pivot, how evidence was preserved, and where the work would have failed without discipline.
Study the case studies →OSINT is a general discipline with specific expectations in each field. Pick the guide that matches how your findings will be used.
Source verification, social media investigation, and standards of proof for published reporting.
Digital ethnography, document analysis, and reproducibility for scholarly work.
Beneficial ownership, sanctions screening, and following money through public data.
Due diligence, supply-chain investigation, and third-party risk research.
Asset tracing, litigation support, and evidence preservation for the record.
Every serious open-source investigation follows the same arc. Skipping a phase is how investigators end up publishing a fabrication.
Define the question, the audience, and the standard of proof before a single query.
Gather evidence from public sources, documented with timestamps and provenance from the first click.
Corroborate, triangulate, and stress-test the findings against alternative explanations.
Communicate what the evidence supports, flag what it does not, and preserve the chain back to source.
Step-by-step Wayback Machine tutorial for investigators: search captures, pivot across snapshots, cite archived URLs, and preserve evidence before it disappears.
Investigator's guide to WHOIS and DNS lookups: identify registrars, trace name servers, enumerate records, and pivot between domains owned by the same operator.
Practical Google dorking tutorial: combine site, filetype, intitle, and inurl operators to surface exposed documents, staff directories, and legacy pages.
journalism
A viral image presented as recent was matched to an earlier publication, its original context recovered, and the reposter's claim retracted.
corporate
A five-jurisdiction corporate chain was mapped, with three natural persons identified as common directors across the chain.
financial
A published methodology for turning a scanned log set into a searchable, hashed, and cross-referenced dataset suitable for long-form investigation.
Real-world investigative journalism built on OSINT — Bellingcat, ICIJ, Reuters, and the techniques that produced award-winning stories from public records.
A repeatable end-to-end OSINT workflow — templates, logs, and habits that turn individual skill into reliable output across investigations.
OSINT ethics beyond legality — proportionality, harm minimization, and the frameworks that keep investigators on defensible ethical ground.