Open Source Intelligence (OSINT) Study Notes in PDF
The OSINT Study guide outlines structured methods for building resilient sock puppet accounts that withstand platform scrutiny.
If you believe Open Source Intelligence is limited to typing a name into a search engine, you’re missing the discipline entirely. Effective intelligence gathering is structured tradecraft driven by analytical mindset, strict operational security, and tools that extend far beyond the surface web.
These OSINT Notes and this structured OSINT Study guide compile more than 150 pages of investigative methodologies, command-line utilities, and verification frameworks into a cohesive field manual. Rather than relying on subscription-based people-search platforms, the focus is on technical, analyst-grade techniques used to trace digital footprints, map online infrastructure, and surface hidden connections.
Whether you are a journalist following a lead, a red team operator conducting reconnaissance, or an investigator building attribution chains, this OSINT Study guide provides repeatable workflows designed to convert scattered data into actionable intelligence.
From The Notes: Operational Security & Sock Puppet Strategy
A foundational principle reinforced throughout these OSINT Notes is maintaining investigative OpSec. Intelligence gathering is not only about collecting information it’s about protecting your investigative identity.
The OSINT Study guide outlines structured methods for building resilient sock puppet accounts that withstand platform scrutiny.
It explains why common shortcuts such as creating accounts behind obvious VPN endpoints can trigger automated defenses, and why controlled verification methods (including properly managed burner devices) offer stronger operational reliability than disposable VoIP numbers.
Additionally, the OSINT Notes detail the staged aging process for investigative personas across platforms like Facebook and LinkedIn, reducing algorithmic suspicion and extending operational longevity.
This is practical Open Source Intelligence tradecraft the difference between sustainable investigative access and losing accounts within hours.
Why will you need a notes system?
You could be actively working as an incident responder, security operations analyst, network security specialist or you could be preparing and studying for a certification exam such as Cisco Cyber Ops. In both cases, a set of notes maintained in your repository where you can search for commands, concepts or use cases that could aid you in the task you are performing is necessary for a productive studying and/or working.
Table of Contents:
- Definition of OSINT
- OSINT Stages
- Planning
- Data Collection
- Data Processing
- Data Analysis
- Dissemination and Distribution
- Domain OSINT
- Email & Username OSINT
- IP OSINT
- Image OSINT
- Video OSINT
- Documents OSINT
- Leaks and Dumps
- Social Media OSINT
- OSINT with Google
- Blockchain OSINT
- Phone Number OSINT & People Search
- Companies OSINT
- Leaks OSINT
- OSINT with GeoMaps
- OSINT with Google Hacking Database
- OSINT with Shodan
- OSINT with Maltego
- OSINT Suites, Frameworks & Other Tools
- OSINT Resources & Websites
- Case Studies
Who are these for?
This study book is for investigative analysts, journalists, researches and even students who want to understand OSINT and have a ready playbook to conduct investigations
Page Count: 173
Format: PDF & Markup
Note: If you saw figures and images not showing up in the markup file, kindly check them in the PDF version.
How to buy the E-book?
You can buy the booklet directly by clicking on the button below
After you buy the booklet, you will be able to download the PDF booklet along with the markup files if you want to import them to Obsidian software.