Appendix E: Further Reading¶
This appendix organizes recommended reading, organized by topic. Resources are selected for quality, accessibility, and ongoing relevance to OSINT practice.
E.1 Foundational OSINT Methodology¶
Books: - Open Source Intelligence Techniques — Michael Bazzell. The practitioner's handbook for personal investigation methodology. Updated annually; check for current edition. - The Art of Intelligence — Henry Crumpton. Former CIA officer's perspective on intelligence methodology. - Intelligence Analysis: A Target-Centric Approach — Robert M. Clark. Structured analytic methodology with academic rigor. - The Tao of Open Source Intelligence — Stewart Bertram. Concise methodology guide.
Online Resources: - Bellingcat (bellingcat.com): Investigative journalism organization that publishes its methodology alongside its investigations. Essential reading for open source investigation technique. - OSINT Framework (osintframework.com): Categorized tool directory with tool descriptions and links. - OSINT Curious (osintcuriou.us): Practitioner community with methodology articles, podcasts, and a weekly digest. - IntelTechniques (inteltechniques.com): Michael Bazzell's practitioner resources, search tools, and podcasts.
E.2 Investigative Journalism and Research Methodology¶
Books: - The Investigative Reporter's Handbook — Brant Houston. Comprehensive guide to investigative journalism methods. - The New Precision Journalism — Philip Meyer. Data journalism foundations. - Computer-Assisted Reporting: A Practical Guide — Brant Houston. CAR methodology.
Online Resources: - Global Investigative Journalism Network (gijn.org): Training resources, guides, and case studies from investigative journalists worldwide. - IRE (Investigative Reporters and Editors) (ire.org): Professional organization with tipsheets, training, and the NICAR data journalism community. - ProPublica's Nerds Blog: Technical methodology from ProPublica's data journalism team. - The Markup (themarkup.org): Data-driven investigative journalism with published methodology. - OCCRP (Organized Crime and Corruption Reporting Project) (occrp.org): Financial crime and corruption investigation case studies.
E.3 AI and Machine Learning¶
Books: - Designing Machine Learning Systems — Chip Huyen. Production ML systems engineering. - Natural Language Processing with Transformers — Lewis Tunstall et al. Practical NLP with HuggingFace. - Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow — Aurélien Géron. Accessible ML foundations.
Papers and Documentation: - Anthropic Model Card: Anthropic's documentation on Claude's capabilities and limitations. - "Attention Is All You Need" (Vaswani et al., 2017): The transformer architecture paper — foundational to modern LLMs. - HuggingFace documentation: huggingface.co/docs — practical guides for transformer models. - LangChain documentation: Agentic AI framework documentation.
Online Resources: - Andrej Karpathy's educational videos: Accessible deep learning explanations. - Fast.ai courses: Practical deep learning without mathematical prerequisites. - The Gradient: Research-accessible ML commentary.
E.4 Cybersecurity and Threat Intelligence¶
Books: - The Art of Intrusion — Kevin Mitnick. Social engineering and intrusion case studies. - Intelligence-Driven Incident Response — Rebekah Brown and Scott Roberts. Threat intelligence methodology. - The Practice of Network Security Monitoring — Richard Bejtlich. Network defense and monitoring.
Online Resources: - MITRE ATT&CK (attack.mitre.org): Adversary tactics and techniques knowledge base. - VirusTotal Blog: Threat research published by the VirusTotal team. - Krebs on Security (krebsonsecurity.com): Investigative journalism focused on cybercrime. - The Record (therecord.media): Recorded Future's news operation covering cybersecurity. - Threatpost: Security news and research. - DFIRReport (thedfirreport.com): Detailed incident analysis reports. - abuse.ch: URLhaus, MalwareBazaar, and Feodo Tracker — free threat intel feeds.
CTI Frameworks and Standards: - STIX/TAXII documentation: oasis-open.github.io/cti-documentation/ - MISP project: misp-project.org
E.5 Financial Intelligence and AML¶
Books: - The Laundromat — Jake Bernstein. Panama Papers-based financial crime narrative. - Moneyland — Oliver Bullough. Offshore financial system investigation. - The Oligarchs — David Hoffman. Financial crime and corruption in Russia.
Official Resources: - FATF (Financial Action Task Force) (fatf-gafi.org): International AML standards and country assessments. - FinCEN advisories (fincen.gov): US Treasury guidance on financial crime typologies. - OFAC (ofac.treas.gov): Sanctions lists and SDN database. - SEC EDGAR (sec.gov/cgi-bin/browse-edgar): Public company filings.
Databases: - ICIJ Offshore Leaks Database (offshoreleaks.icij.org): Panama Papers, Pandora Papers, Offshore Leaks data. - OpenSanctions (opensanctions.org): Aggregated global sanctions and watchlist data. - OpenCorporates (opencorporates.com): Global corporate registry data.
E.6 Geospatial Intelligence¶
Books: - See No Evil — Robert Baer. Intelligence with geospatial context. - The Satellite Paradox — commercial satellite industry analysis.
Online Resources: - Bellingcat's geolocation guides: Methodology articles on visual geolocation. - SentinelHub EO Browser (apps.sentinel-hub.com/eo-browser): Free Copernicus imagery access. - Copernicus Open Access Hub (scihub.copernicus.eu): Full-resolution Sentinel imagery download. - Planet Labs Education Program: Academic access to Planet imagery. - Maxar SecureWatch: Commercial imagery platform.
Tools: - SunCalc (suncalc.org): Sun position calculator for temporal geolocation. - ShadowMap (shadowmap.org): Shadow analysis for time estimation. - Windy (windy.com): Historical weather data for location verification.
E.7 Legal and Ethical Frameworks¶
Books: - The Filter Bubble — Eli Pariser. Algorithm influence on information access. - Privacy in Context — Helen Nissenbaum. Contextual integrity theory. - Nothing to Hide — Daniel Solove. Privacy theory and law. - Custodians of the Internet — Tarleton Gillespie. Platform governance.
Online Resources: - EFF (Electronic Frontier Foundation) (eff.org): Digital rights and surveillance issues. - ACLU (aclu.org): Civil liberties and surveillance. - Lawfare Blog (lawfareblog.com): National security and technology law. - Future of Privacy Forum (fpf.org): Privacy policy research. - Stanford Internet Observatory (io.stanford.edu): Disinformation and platform research.
Regulatory: - IAPP (iapp.org): International privacy professional organization; resources and certification. - UK ICO (ico.org.uk): GDPR guidance and enforcement. - EDPB (edpb.europa.eu): EU Data Protection Board guidelines.
E.8 Data Science and Engineering¶
Books: - Designing Data-Intensive Applications — Martin Kleppmann. Distributed data systems. - The Data Warehouse Toolkit — Ralph Kimball. Data modeling fundamentals. - Fluent Python — Luciano Ramalho. Advanced Python for data-intensive applications. - High Performance Python — Micha Gorelick and Ian Ozsvald. Performance optimization.
Documentation and Courses: - Elasticsearch documentation: elastic.co/guide - Apache Kafka documentation: kafka.apache.org/documentation - Neo4j documentation: neo4j.com/docs - FastAPI documentation: fastapi.tiangolo.com - SQLAlchemy documentation: docs.sqlalchemy.org
E.9 Operations Security¶
Online Resources: - EFF's Surveillance Self-Defense (ssd.eff.org): Practical guides for different threat models. - Security in a Box (securityinabox.org): Tools and tactics for digital safety. - Access Now's Digital Security Helpline (accessnow.org/help): Security support for civil society. - Freedom of the Press Foundation (freedom.press): Digital security training for journalists. - Citizen Lab (citizenlab.ca): Research on surveillance and digital attacks against civil society. - Security Planner (securityplanner.org): Personalized security recommendations.
Key Tools Documentation: - Signal: signal.org/docs - Tor Project: torproject.org/docs - Tails OS: tails.boum.org/doc
E.10 Academic Research¶
Journals and Conferences: - Intelligence and National Security — Academic journal on intelligence studies. - Journal of Intelligence and Cyber Security — Peer-reviewed intelligence research. - First Monday — Internet studies journal with OSINT-relevant research. - ACM CCS (Conference on Computer and Communications Security) — Security research. - USENIX Security Symposium — Systems security research. - IEEE S&P (Oakland) — Security and privacy research. - DFRWS (Digital Forensics Research Workshop) — Forensic methodology research.
Research Groups: - Stanford Internet Observatory (io.stanford.edu): Disinformation and platform research. - DFRLab (Atlantic Council) (digitalsherlocks.org): Digital forensics and disinformation. - Oxford Internet Institute (oii.ox.ac.uk): Internet and society research. - MIT Media Lab (media.mit.edu): Technology and society research.
E.11 Community and Professional Development¶
Communities: - OSINT Curious (osintcuriou.us): Practitioner community. - Trace Labs (tracelabs.org): OSINT competitions focused on missing persons. - CTF competitions: Capture-the-flag events often include OSINT challenges. - Reddit r/OSINT: Community forum for questions and discussion. - The Many Hats Club (themanyhats.club): Security community including OSINT practitioners.
Conferences: - DEF CON: Annual security conference with OSINT-relevant content. - Black Hat: Security research conference. - OSINT Summit: Dedicated OSINT conference. - Global Investigative Journalism Conference: Investigative journalism methodology. - IRE Conference: Data journalism and investigative reporting.
Certifications: - SANS SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis - CREST CPIA: Intelligence-based penetration testing - TCM Security OSINT Fundamentals: Practitioner-focused online certification
E.12 Staying Current¶
The OSINT field evolves rapidly. Effective ways to stay current:
Newsletters: - This Week in OSINT (TWIO): Weekly OSINT technique and tool newsletter - OSINT Curious weekly digest - Krebs on Security newsletter - The Record Daily newsletter (cybersecurity)
Social Media: - Follow prominent OSINT practitioners and researchers on Twitter/X and LinkedIn - Bellingcat, DFRLab, Citizen Lab accounts
Podcasts: - The Privacy, Security, and OSINT Show (Michael Bazzell) - Darknet Diaries (cybercrime narratives) - Recorded Future podcast (threat intelligence) - Risky Business (security news)
Practice: - Trace Labs CTF events (monthly) - Bellingcat's Weekly Challenge - OSINT Curious #OSINT in 60 seconds challenges - HackTheBox and TryHackMe OSINT modules