13. WikiLeaks Public Library of US Diplomacy (PlusD)
Searchable archive of millions of US diplomatic cables (1966-2010). https://search.wikileaks.org/plusd/
14. You Fund This Searchable database of U.S. government grants, SBA loans, state subsidies, and foreign aid allocations to businesses and countries (aggregated from public sources like USASpending.gov). https://youfundthis.com/
Specialized tools for investigating profiles, posts, connections, and metadata on platforms like X (Twitter), Instagram, Facebook, TikTok, LinkedIn, and more.
UFADE (Ultimate Forensic Apple Device Extractor)
Advanced data extraction from Apple devices. GitHub - UFADE
Recommended OSINT Training Courses
Top-rated courses for learning OSINT skills, including certifications and free options as of 2025.
SANS SEC497: Practical Open-Source Intelligence (OSINT)
Hands-on course on secure OSINT research with tools and labs. SANS SEC497
Certified in Open Source Intelligence (C|OSINT) - McAfee Institute
Comprehensive certification covering OSINT gathering, analysis, and management. C|OSINT Certification
Foundations of OSINT - OSINT Academy
8-week online course for beginners to enhance OSINT skills. OSINT Academy Foundations
Open-Source Intelligence Fundamentals - TCM Security
Focuses on OSINT tactics for investigations. TCM OSINT Fundamentals
OSINT: Open-Source Intelligence - IACIS
40-hour introduction to OSINT principles and analysis. IACIS OSINT Course
My OSINT Training Catalog
Various courses on social media, dark web, tools, etc. My OSINT Training
Free Options: Maltego Academy, Totem Project Social Media Research
Free certifications and training on specific tools and methods. Maltego Academy (Free) | Totem Project (Free)
Michael Bazzell Books
Essential reading from former FBI cyber investigator and OSINT/privacy expert Michael Bazzell. His works are widely used as training manuals by government agencies and professionals worldwide.
OSINT Techniques: Resources for Uncovering Online Information (11th Edition, 2024)
The definitive OSINT bible - over 590 pages covering self-hosted tools, custom search scripts, virtual machines, and advanced techniques for domains, people, social media, and more. Emphasizes self-reliance with local tools to avoid external dependencies. Latest digital revision: April 2025. Buy Direct from IntelTechniques | Amazon
Extreme Privacy: What It Takes to Disappear (5th Edition, 2024)
Proactive guide to ultimate anonymity - 590 pages with 228 chronological tasks for high-risk individuals (celebrities, witnesses, etc.). Covers nomad living, secure devices, trusts, LLCs, and complete digital/physical disappearance strategies. Buy Direct from IntelTechniques | Amazon
Other Notable Works
Includes earlier editions and supplements (e.g., device-specific privacy guides). Full catalog available on his site. All Books on IntelTechniques | Amazon Author Page
OSINT Ethics Guidelines
OSINT practitioners must adhere to strict ethical standards to protect privacy and ensure responsible use:
Always comply with applicable laws (e.g., GDPR, CCPA, computer misuse acts) and platform terms of service.
Use OSINT only for legitimate purposes (e.g., journalism, security research, due diligence); avoid harassment, stalking, or doxxing.
Respect individual privacy rights - publicly available data does not equate to permission for any use.
Be proportionate: Collect and retain only necessary information.
Maintain accuracy: Verify sources and avoid spreading unconfirmed or misleading information.
No unauthorized access, social engineering, or deception.
Transparency: Document methods and sources where appropriate.
Key references: Michael Bazzell's ethics discussions, SANS OSINT guidelines, and community frameworks like those from OSINT Curious.
Real-world examples showcasing the power of OSINT investigations, with expanded focus on Bellingcat's work.
Bellingcat - MH17 Downing (2014)
Used social media, satellite imagery, and videos to trace the Russian Buk missile system responsible for downing Malaysia Airlines Flight 17. MH17 Open Source Evidence
Bellingcat - Skripal Poisoning (2018)
Identified GRU agents via passport data, travel records, and leaks in the Novichok attack on Sergei Skripal. Skripal Case Reports
Bellingcat - Navalny Poisoning (2020)
Traced FSB unit involvement through phone/metadata analysis and flight records. Navalny Reports
Bellingcat - Syrian Chemical Weapons Attacks (2013-2018)
Geolocated and verified videos of chemical attacks using open-source imagery and munitions analysis. Syria Archives
Bellingcat - Yemen Conflict Investigations (2015+)
Documented airstrikes, arms trafficking, and human rights abuses using satellite imagery and social media. Yemen Reports
Bellingcat - Ukraine War Crimes (2022+)
Collected and archived digital evidence of atrocities, including Bucha massacre verification. Ukraine Investigations
Bellingcat - Navalny's Corruption Yachtspotting (2021)
Used OSINT to investigate luxury yachts linked to Russian oligarchs in Navalny's anti-corruption probes. Yachtspotting Case Study
Bellingcat - Russia's Clandestine Chemical Weapons Programme (2020)
Exposed Russia's ongoing Novichok development and operations. Novichok Investigations
Bellingcat - The Story of a Storm: Visualising Conflict and Displacement (2025)
Analyzed conflict incidents overlaid on weather data during Cyclone Kenneth. Story of a Storm Report
Bellingcat - A Guide To Monitoring Conflict Amidst a Sea of Misinformation (2025)
Provided methods to verify conflict-related information using OSINT amidst disinformation. Monitoring Conflict Guide
Golden State Killer Capture (2018)
Combined OSINT genealogy databases with forensic DNA to identify the serial killer. Case Overview
Unredacted Jeffrey Epstein Black Book
Full unredacted copy of Jeffrey Epstein's contact list (commonly known as the "little black book"). Download PDF: epstein-unredacted.pdf
Related Resources
Major Conspiracy Theories Overview
Curated list of prominent conspiracy theories with sources and explanations. Open Conspiracy Theories Page
Private Investigator & Skip Tracer Tools
Comprehensive list of databases, surveillance equipment, digital forensics tools, and case management software for licensed investigators. Open PI & Skip Tracer Tools Page
Important Note: These resources use publicly available data, declassified documents, or leaks. Always use ethically and in full compliance with laws, platform terms of service, and privacy regulations.