Useful Links
Computer Science
Other Tools and Technologies
Open Source Intelligence (OSINT)
1. Introduction to Open Source Intelligence
2. Core Competencies and Mindset
3. Information Collection Sources and Methods
4. Data Processing and Management
5. Analysis and Synthesis Techniques
6. OSINT Tools and Technology
7. Operational Security for OSINT Practitioners
8. OSINT Applications and Use Cases
Operational Security for OSINT Practitioners
Identity Protection and Anonymity
Anonymous Identity Creation
Digital Persona Management
Attribution Avoidance Techniques
Compartmentalization Strategies
Network Security and Privacy
Virtual Private Network (VPN) Usage
VPN Selection Criteria
Configuration Best Practices
Multi-Hop VPN Setups
Tor Network Utilization
Tor Browser Configuration
Onion Service Access
Traffic Analysis Resistance
Proxy and Relay Services
Device and System Security
Secure Operating System Configuration
Browser Hardening Techniques
Fingerprinting Prevention
Secure Communication Tools
Operational Personas and Cover
Sock Puppet Account Creation
Believable Persona Development
Account Aging Strategies
Activity Pattern Simulation
Cover Story Development
Operational Compartmentalization
Cross-Contamination Prevention
Digital Footprint Minimization
Cookie and Tracking Management
Browser History Control
Metadata Scrubbing
Secure File Handling
Communication Security
Encrypted Messaging Platforms
Secure Email Services
Anonymous File Sharing
Secure Voice Communication
Previous
6. OSINT Tools and Technology
Go to top
Next
8. OSINT Applications and Use Cases