OSINT Investigation Techniques Index
Purpose: Comprehensive catalog of standard operating procedures (SOPs) and methodologies for conducting open-source intelligence investigations.
Overview
This directory contains detailed SOPs covering core investigation techniques, evidence handling, operational security, and specialized analysis methods. Each SOP provides step-by-step procedures, tools, commands, and best practices for OSINT practitioners.
Core Investigation Techniques
Evidence Collection & Management
OSINT Collection Log & Chain of Custody
- Purpose: Maintain forensically sound evidence collection practices
- Coverage: Evidence logging, hash verification, multi-format capture, integrity verification
- Key Topics:
- Collection log templates and chain of custody documentation
- Capture procedures (HTML, screenshots, WARC archives)
- Evidence packaging and storage protocols
- Platform-specific collection methods (social media, websites, blockchain)
- Hash calculation and verification workflows
- Legal admissibility requirements
Entity Dossier Template
- Purpose: Comprehensive entity profiling framework
- Coverage: Person/organization/asset profiling, link analysis, risk assessment
- Key Topics:
- Entity overview and basic information structure
- Aliases, identifiers, and visual markers
- Digital footprint analysis (data breaches, crypto activity)
- Links and pivots (WHOIS, DNS, social media)
- Evidence repository management
- Confidence and risk assessment frameworks
- Intelligence gap identification
Operational Security
OPSEC Planning for OSINT Investigations
- Purpose: Protect investigator identity and prevent attribution during investigations
- Coverage: Threat modeling, anonymity techniques, platform-specific OPSEC, incident response
- Key Topics:
- Threat modeling and adversary profiles (5 levels)
- Investigation environment isolation (VMs, containers, Whonix, Tails, Exegol)
- Network security (VPN, Tor, DNS security)
- Research persona development and warming
- Browser security and fingerprint resistance
- Platform-specific attribution risks and countermeasures
- Detection indicators and self-assessment
- OPSEC incident response procedures
Domain-Specific Techniques
Financial Intelligence
Financial & AML OSINT
- Purpose: Anti-money laundering and financial intelligence investigations
- Coverage: Cryptocurrency analysis, financial records, transaction tracking
- Key Topics:
- Blockchain analysis and wallet clustering
- Financial data sources and corporate registries
- Sanctions screening and compliance checks
- Transaction pattern analysis
- Money laundering red flags
Blockchain & Crypto-Asset Tracing
Blockchain Investigation
- Purpose: Multi-chain crypto-asset tracing methodology for OSINT, compliance, and investigative work
- Coverage: Bitcoin and EVM-family ledgers, address clustering, cross-chain bridge read-flow, sanctions integration, commercial and open-source analytics, court-admissibility tradecraft
- Key Topics:
- Multi-chain landscape (UTXO vs account, EVM L2s, non-EVM L1s, privacy coins)
- Address clustering heuristics (common-input ownership, change-address detection, peel chains, account clustering)
- Cross-chain bridge tracing — pairing source-chain lock/burn with destination-chain mint/release events (Wormhole, LayerZero, Synapse, Across, THORChain, Hop, native L2 bridges)
- Sanctions integration (OFAC SDN DCA, EU TFR / MiCA, UK OFSI, FATF Travel Rule)
- Commercial analytics tools (Chainalysis Reactor, TRM Labs, Elliptic, Crystal, Arkham) and their evidentiary limitations
- Open-source analytics workflows (GraphSense, Breadcrumbs, BigQuery datasets, self-hosted nodes)
- Exchange and VASP pivots — deposit-address clustering, KYC subpoena pathway, Travel Rule data flow
- Court-admissibility tradecraft — Sterlingov / Bitcoin Fog precedent, Daubert posture toward heuristic clustering, expert-witness considerations
- Hand-off boundaries: stops at mixer entry → mixer-tracing; smart-contract code review → smart-contract-audit; receives wallet observations from darkweb-investigation §13
Mixer & Privacy-Pool Tracing
Mixer & Privacy-Pool Tracing
- Purpose: Mixer, CoinJoin, and privacy-pool de-obfuscation methodology — picks up where blockchain-investigation stops (at mixer entry and deliberate cross-chain obfuscation)
- Coverage: CoinJoin clustering attacks, Tornado Cash on-chain heuristics, cross-chain bridge laundering defeat, privacy-coin traceability research limits, regulatory event timeline
- Key Topics:
- CoinJoin clustering attacks — Wasabi (ZeroLink → WabiSabi era), Samourai Whirlpool (Tx0 + doxxic-change linkage), JoinMarket maker-taker analysis, post-mix consolidation discipline
- Tornado Cash deposit-withdrawal linkage heuristics — address-reuse, gas-price, time-window, multi-deposit, single-relay, anonymity-set sizing (Tutela / Wu et al. 2022, Beres et al. 2021)
- Cross-chain bridge obfuscation defeat — round-tripping, fragmentation, decoy bridges, chain-hopping, DEX-laundering between bridges, THORChain-mediated obfuscation, aggregator-call decomposition
- Privacy-coin traceability research limits — Monero RingCT (Möser 2017, Kumar 2017, Yu 2019), Zcash shielded-pool egress (Kappos 2018, Quesnelle 2017), Dash PrivateSend, Decred opt-in mixing
- Regulatory event timeline — Tornado Cash 2022-08-08 → 2024-11-26 Van Loon → 2025-03-21 delist, Samourai indictment 2024-04-24, Wasabi / zkSNACKs 2024 shutdown, ChipMixer / Blender.io / Sinbad takedowns, Helix and Bitcoin Fog precedents
- Court-admissibility for mixer findings — elevated Daubert challenge surface (Sterlingov, Storm, Pertsev) — multi-heuristic discipline, off-chain corroboration, academic-citation pinning, tool-version pinning
- Hand-off boundaries: receives mixer-entry observations from blockchain-investigation §11.6; routes back for downstream pursuit; stops at smart-contract source review (→ smart-contract-audit)
Darkweb & Hidden-Service Investigation
Darkweb Investigation
- Purpose: Open-source observation of Tor / I2P hidden services for investigative, journalistic, and threat-intelligence purposes
- Coverage: Tor / I2P navigation, hidden-service discovery, marketplace OSINT, vendor PGP pivots, ransomware leak-site tracking, analyst hygiene
- Key Topics:
- Network access (Tor Browser, Mullvad Browser, Tails, Whonix, Qubes, I2P)
- Hidden-service discovery (Ahmia, dark.fail, Tor.taxi, clearnet pivots)
- Marketplace observation-only methodology and lifecycle (LE takedowns, exit scams)
- Vendor PGP key pivots and operator-continuity attribution
- Forum and community investigation (BreachForums lineage, hacking forums)
- Ransomware leak-site tracking (LockBit, Cl0p, BlackCat lineage; ransomwatch / ransomware.live aggregators)
- State-actor and sanctions-evasion indicators
- Cross-context separation, session discipline, researcher wellness
- Hand-off boundaries: stops at “wallet address X observed” → blockchain-investigation; CSAM hard-stop → sensitive-crime-escalation
Multimedia Analysis
Image & Video OSINT
- Purpose: Extract intelligence from visual media
- Coverage: Metadata extraction, geolocation, reverse image search, deepfake detection
- Key Topics:
- EXIF metadata extraction and interpretation
- Reverse image search techniques (Google, TinEye, Yandex, PimEyes)
- Geolocation via landmarks, shadows, vegetation
- Video frame extraction and timeline analysis
- Deepfake and manipulation detection
- Facial recognition and biometric analysis
Infrastructure & Web Analysis
Web, DNS & WHOIS OSINT
- Purpose: Investigate web infrastructure and domain ownership
- Coverage: WHOIS lookups, DNS enumeration, certificate analysis, website archiving
- Key Topics:
- WHOIS data interpretation and privacy protection bypass
- DNS record enumeration (A, MX, TXT, NS, SPF, DMARC)
- SSL/TLS certificate transparency searches
- Website archiving (Archive.org, archive.today)
- Subdomain discovery and virtual host enumeration
- Passive DNS and historical data analysis
Reporting & Documentation
Reporting, Packaging & Disclosure
- Purpose: Professional reporting standards and evidence presentation
- Coverage: Report structure, evidence packaging, disclosure protocols
- Key Topics:
- Executive summary and findings presentation
- Evidence citation and referencing
- Confidence levels and analytical tradecraft
- Disclosure procedures and recipient handling
- Report security and classification
Legal & Ethical Guidelines
Legal & Ethics SOP
- Purpose: Legal boundaries and ethical considerations in OSINT
- Coverage: Jurisdiction issues, privacy laws, Terms of Service, ethical frameworks
- Key Topics:
- Legal frameworks (GDPR, CCPA, ECPA, CFAA)
- Terms of Service compliance
- Ethical investigation boundaries
- Privacy considerations and consent
- Admissibility and evidence standards
- International jurisdiction challenges
Sensitive Crime Intake & Escalation
- Purpose: Handling investigations involving serious crimes or vulnerable populations
- Coverage: CSAM handling, violent extremism, trafficking, escalation procedures
- Key Topics:
- Content warning systems
- Mandatory reporting obligations
- Investigator safety and psychological support
- Evidence preservation for law enforcement
- Escalation chains and jurisdictional handoff
- Victim protection protocols
Quick Reference Matrix
| Investigation Type | Recommended SOPs | Priority Order |
|---|---|---|
| Person Investigation | Entity Dossier → OPSEC Plan → Collection Log → Platform SOPs | Start here for individuals |
| Organization/Corporate | Entity Dossier → Financial AML → Web/DNS → Collection Log | Business entities |
| Domain/Infrastructure | Web/DNS WHOIS → Collection Log → Entity Dossier | Websites, servers |
| Cryptocurrency | Financial AML → Collection Log → Entity Dossier | Wallet investigations |
| Visual Media | Image/Video OSINT → Collection Log | Photo/video analysis |
| High-Risk/Adversarial | OPSEC Plan → Collection Log → Legal/Ethics | Nation-state, criminal |
| Sensitive Content | Sensitive Crime Intake → Legal/Ethics → OPSEC Plan | CSAM, violence, trafficking |
Investigation Workflow
Standard Investigation Lifecycle
1. Planning & Authorization
└─> Read: Legal & Ethics, OPSEC Plan
2. Environment Setup
└─> Read: OPSEC Plan (VM/VPN setup, persona creation)
3. Collection Phase
└─> Read: Collection Log, Platform SOPs, Domain-specific techniques
4. Entity Profiling
└─> Read: Entity Dossier (compile findings)
5. Analysis & Correlation
└─> Read: Domain-specific SOPs (Financial, Image/Video, Web/DNS)
6. Documentation & Reporting
└─> Read: Reporting & Packaging, Collection Log (chain of custody)
7. Disclosure (if required)
└─> Read: Reporting & Packaging, Legal & Ethics, Sensitive Crime EscalationRelated Resources
Platform-Specific SOPs
See Platform SOPs Index for detailed procedures covering:
- Twitter/X, Instagram, LinkedIn, Facebook
- Telegram, Discord, Reddit, TikTok
- Dark web forums and marketplaces
Security Analysis
See Security Analysis Index for:
Investigation Cases
See Investigations Index for:
- Active case templates
- Investigation methodologies
- Case studies and lessons learned
Tool Categories
Evidence Collection
- SingleFile - Complete webpage archival (HTML)
- wget/ArchiveBox - WARC archival
- ExifTool - Metadata extraction
- yt-dlp - Social media download
OPSEC & Anonymity
- Mullvad VPN / ProtonVPN - Anonymous networking
- Tor Browser / Whonix / Tails - Maximum anonymity
- VirtualBox / VMware - Environment isolation
- KeePassXC - Password management
Analysis & Enrichment
- Maltego - Link analysis and visualization
- Shodan / Censys - Internet-wide device search
- theHarvester - Domain/email enumeration
- Nuclei - Username enumeration
Blockchain & Financial
- Blockchain.info / Etherscan - Transaction analysis
- Chainalysis - Advanced blockchain analytics
- OpenCorporates - Corporate registry search
Best Practices Summary
Evidence Handling
- ✅ Calculate SHA-256 hashes immediately upon collection
- ✅ Capture in multiple formats (HTML + screenshot + archive)
- ✅ Document chain of custody from collection to storage
- ✅ Store evidence on encrypted volumes
- ✅ Verify integrity weekly/monthly
Operational Security
- ✅ Always use VPN/Tor for investigations
- ✅ Warm personas for 30 days before active use
- ✅ Never login to personal accounts in investigation environment
- ✅ Randomize timing and behavior (avoid bot patterns)
- ✅ Test for DNS/WebRTC leaks before each session
Legal & Ethical
- ✅ Obtain proper authorization before starting investigation
- ✅ Stay within legal boundaries (no hacking, no unauthorized access)
- ✅ Respect Terms of Service (or document violations)
- ✅ Escalate sensitive content immediately (CSAM, violence)
- ✅ Document confidence levels and analytical assumptions
Quality Assurance
- ✅ Maintain reproducibility documentation
- ✅ Peer review findings before reporting
- ✅ Cite sources and evidence for all claims
- ✅ Use appropriate confidence levels (low/medium/high)
- ✅ Identify intelligence gaps and unknowns
Training & Certification
Recommended Learning Path
- Foundations: Legal & Ethics, OPSEC Plan
- Core Skills: Collection Log, Entity Dossier
- Specialization: Domain-specific techniques (Financial, Image/Video, Web/DNS)
- Advanced: Platform-specific SOPs, sensitive content handling
External Resources
- Bellingcat - OSINT investigation guides and case studies
- SANS FOR578 - Cyber Threat Intelligence course
- IntelTechniques - Michael Bazzell’s OSINT resources
- OSINT Framework - Comprehensive tool directory
Maintenance & Updates
Document Control:
- Created: 2025-10-09
- Last Updated: 2025-10-09
- Review Cycle: Yearly
Navigation: