Back to all posts
OSINTMarch 30, 20266 min read

OSINT without the rookie mistakes: a checklist for new investigators

The mistakes we see most in fresh OSINT teams — operator hygiene, attribution leaks, and how to make collected evidence stand up in court.

Sd

Sarah de Boer

OSINT Practice Lead

Open-source intelligence has the lowest tooling barrier in our discipline and the highest tradecraft barrier. The skill is not finding things — it is finding things lawfully, repeatably, and without burning your operation. Here are the misconceptions we patiently unwind, course after course.

1. 'It is public, so I can do anything.'

Public availability does not equal lawful collection. Jurisdictional rules apply to what you collect, how you store it, how long you keep it, and what you do with it. Build a collection plan before you open a browser.

2. Operator hygiene is not optional

We still see investigators researching targets from their personal device, on a personal account, on the office network. A hardened workstation, a sensible exit IP, a properly aged sock-puppet identity — these are not paranoia, they are the floor.

3. Capture, then click

Modern OSINT evidence comes with provenance: source URL, capture timestamp, browser configuration, hash. Tools like Hunchly do this in the background; do not interact with content you have not yet captured.

4. Translation matters more than tooling

Across our European caseload, the highest-impact upgrade for most teams is not new software — it is adding a second-language collector. We have native speakers across Dutch, German, Polish, Russian, Arabic and Spanish on our investigations bench for exactly this reason.

5. Document the dead ends

A negative result, properly documented, is also evidence. Defence counsel will always ask what you did not look at. Have an answer.

Back to all posts

More from our analysts