What is OSINT?
Open Source Intelligence (OSINT) is the collection, evaluation, and analysis of information from publicly available sources to answer a specific intelligence question. While the term originated in the military and intelligence communities, OSINT is now a fundamental skillset for private investigators, skip tracers, journalists, and corporate risk analysts.
"Open source" does not just mean "found on Google." It encompasses any information that is legally accessible to the public, whether it is free, requires registration, or is available for purchase. This includes:
- The Surface Web: News articles, corporate websites, public blogs, and standard search engine results.
- Social Media: Public profiles, posts, images, and network connections on platforms like Facebook, LinkedIn, X (Twitter), and Instagram.
- Public Records: Government databases, court registries, land titles, and corporate filings (e.g., ASIC).
- The Deep Web: Information not indexed by standard search engines, such as academic databases, archived websites, and specific forum contents.
The Legal Framework for OSINT in Australia
A common misconception is that because information is "public," you can do whatever you want with it. In Australia, OSINT practitioners must navigate a complex web of legislation to ensure their intelligence gathering is lawful and their evidence is admissible in court.
Privacy Act 1988 (Cth)
Even if information is publicly available on social media, collecting and storing it may still be subject to the Privacy Act if you are an entity covered by the Act. You must have a lawful purpose for collecting the information, and you cannot collect it in an unreasonably intrusive manner.
Surveillance Devices Legislation
While OSINT is primarily digital, the line between "research" and "surveillance" can blur. For example, using automated tools to constantly monitor a person's digital activity without their consent could, in some contexts, intersect with state-based surveillance or stalking laws. It is crucial to understand the difference between passive observation and active tracking.
Computer Offences (Criminal Code Act 1995)
OSINT relies on authorised access. Bypassing security controls, guessing passwords, using stolen credentials, or exploiting vulnerabilities to access private data is not OSINT-it is a cybercrime. In Australia, unauthorised access to computer data carries severe penalties.
The Golden Rule of OSINT: If you have to break a lock, deceive a person, or use stolen credentials to get the information, it is not Open Source Intelligence.
Core OSINT Techniques
Professional OSINT goes far beyond typing a name into a search engine. It involves structured methodologies and advanced techniques:
1. Advanced Search Operators (Google Dorks)
Using specific commands (like site:, filetype:, inurl:) to force search engines to return highly specific results, uncover exposed documents, or search within specific domains that lack their own search functionality.
2. Social Media Intelligence (SOCMINT)
Analysing social media not just for content, but for connections. Who is interacting with the subject? What metadata is attached to their photos? What time of day are they active? SOCMINT requires careful operational security (OpSec) to ensure the investigator's own identity is not compromised.
3. Image and Video Analysis
Extracting EXIF data (metadata hidden in image files that can reveal GPS coordinates and camera details), performing reverse image searches to find where else an image appears online, and conducting geolocation analysis based on visual landmarks.
4. Historical Web Analysis
Using tools like the Wayback Machine to view deleted websites, altered articles, or removed social media posts. The internet rarely forgets, and historical data is often crucial in investigations.
Essential OSINT Tools
While a skilled investigator can do a lot with a standard browser, professional tools streamline the process and uncover connections that manual searching might miss.
TracerDesk is the premier platform for Australian investigators, offering a suite of over 45 OSINT tools, including:
- TraceLink: Visualises relationships between entities.
- SocialScan: Identifies social profiles linked to specific identifiers.
- EXIF Data Analyzer: Extracts hidden metadata from files.
- Wayback Snapshot Diff: Compares archived versions of websites to highlight changes.
Training: The OSCI Standard
Because OSINT techniques and the digital landscape change so rapidly, formal training is essential. The OSCI (Open Source Collection & Intelligence) course, delivered by ThinkEdu, is recognised as the industry standard in Australia. It covers advanced tradecraft, legal compliance, operational security, and evidence preservation, ensuring that the intelligence you gather is robust and legally defensible.