Open Source Intelligence Techniques - 5th Edition (2016)

Fifth Edition Sheds New Light on Open Source Intelligence Collection and Analysis Methods

In this 400+ page textbook, I share my methods for searching and analyzing online information in detail. Each step of the process is explained throughout nineteen chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to “think outside the box” when scouring the internet for personal information. Always thinking like a hacker, I have identified new ways to use various technologies for an unintended purpose. This book will improve anyone’s online investigative skills. Among other techniques, you will learn how to locate:

Hidden Social Network Content
Cell Phone Subscriber Information
Deleted Websites & Posts
Missing Facebook Profile Data
Full Twitter Account Data
Alias Social Network Profiles
Free Investigative Software
Useful Browser Extensions
Alternative Search Engine Results
Website Owner Information
Photo GPS & Metadata
Live Streaming Social Content
Social Content by Location
IP Addresses of Users
Additional User Accounts
Sensitive Documents & Photos
Private Email Addresses
Duplicate Video Posts
Mobile App Network Data
Unlisted Addresses & #s
Public Government Records
Document Metadata
Rental Vehicle Contracts
Online Criminal Activity
Personal Radio Communications
Compromised Email Information
Wireless Routers by Location
Hidden Mapping Applications
Dark Web Content (Tor)
Restricted YouTube Content
Hidden Website Details
Vehicle Registration Details

Updated Links

Occasionally, techniques for obtaining online information change. Some websites shut down and many change the exact address for access. Often, I find new services after the books are published. Those that purchase the book may want easier access to many of the links demonstrated during the instruction. All of these scenarios have convinced me to make my current set of basic OSINT links publicly available. Click the link below to access over 300 investigation resources. Many of the techniques in the book can be found on this page.


5th Edition Updates

If you have the 4th edition of this book, you may want to know what has changed in this 5th edition. Overall, 1/3 of the book is new content, 1/3 is updated material, and 1/3 is recycled relevant instruction. I removed the majority of the screen captures in this textbook and replaced the space with detailed tutorials. This allowed much new additional content without increasing the page count, which allowed the price of the book to remain unchanged. A more compact font was used in order to present more content within less space. The entire Social Networks chapter was rewritten to reflect the many new possibilities within search options. A new chapter on securing your computer presents several precautions that should be taken before conducting investigations. The new chapter on USB boot operating systems presents several new ways to completely protect your computer from infection and your cases from contamination. All expired and outdated resources were replaced with new methods throughout every chapter, and the OSINT flow charts were re-built to reflect all changes. Finally, several new online custom search tools were created and implemented into the tutorials for easier search execution.

$39 - $44 - Amazon

-In Stock Now.
-Ships within one day.
-Free International Shipping.

United States:



Bulk Orders

Please contact us to inquire about bulk pricing options available on all books. Additionally, we offer an expanded LE/GOV/MIL version of this title with a minimum order of 10 copies at the bulk rate.