How to Use OSINT for Investigations
A practical step-by-step guide to running an OSINT investigation, from scoping to reporting.
What an OSINT investigation actually looks like
A good open source intelligence investigation is structured. It is not just typing a name into Google — it follows a repeatable process that produces evidence you can defend.
Below is the workflow used by professional investigators, simplified for individual practitioners.
Step 1: Scope and goals
Write down what you are trying to learn and what you are not. A clear scope prevents you from drifting into irrelevant or ethically questionable areas.
Step 2: Collect from open sources
Use the OSINT Arsenal directory to pick tools by category — search engines, domain intelligence, social media, image search. Capture URLs, screenshots, and timestamps as you go.
Step 3: Pivot and corroborate
Each finding becomes a new starting point. A username leads to an email, an email leads to a breach, a breach leads to a phone number. Always corroborate from at least two independent sources before treating something as a fact.
Step 4: Analyse
Map relationships in a tool like Maltego or a simple spreadsheet. Look for contradictions and gaps as carefully as you look for confirmations.
Step 5: Report
A good OSINT report is reproducible. Anyone reading it should be able to follow your sources and reach the same conclusions. Include methodology, sources, screenshots, and any uncertainty.
Keep learning
Browse our blog for more OSINT tutorials and explore the full directory of investigation tools to expand your arsenal.
Explore the OSINT Arsenal
Browse thousands of free, freemium, and paid OSINT tools — searchable by category, type, and pricing.
Browse all OSINT tools →