// Comparison

Extreme Privacy vs Open Source Intelligence Techniques and Tools: Which Should You Read?

Two cybersecurity books on OSINT, compared honestly: who each is for, what each does best, and which to read first.

Intermediate
5/52024
Extreme Privacy

What It Takes to Disappear

Michael Bazzell

Michael Bazzell's defender-side companion to OSINT Techniques: a step-by-step program for removing yourself from data brokers, public records, and the everyday surveillance economy without going off-grid.

Beginner
3/52018
Open Source Intelligence Techniques and Tools

Nihad A. Hassan, Rami Hijazi

Hassan and Hijazi's pedagogical introduction to OSINT framed inside the broader intelligence cycle (collection → processing → analysis → dissemination) rather than around a specific toolchain.

Read this if

Anyone whose threat model includes stalkers, doxxers, abusive ex-partners, hostile foreign governments, or simply the data-broker industry. Also the canonical reference for journalists, executives, public defenders, and investigators who need their personal footprint to stop being a vector.
Readers coming from a non-investigative background — students, analysts, junior threat-intel hires — who want a methodology before they touch tools. Stronger on framing and process than Bazzell, and the right first book if you don't yet know what an OSINT engagement should produce.

Skip this if

Readers who want philosophical privacy theory rather than a 558-page operational checklist. Bazzell does not argue for privacy — he assumes you're sold and shows you the work. Also US-centric; the LLC, mail-forwarding, and DMV chapters require translation outside North America.
Practitioners who already know the methodology and need current tooling; this book ages quickly on URLs and platforms. Also light on OPSEC, attribution avoidance, and the operational rigour real investigations demand. By 2026 the tooling chapters are partially historical.

Key takeaways

  • Privacy is a continuous practice, not a one-time purge: data brokers re-acquire your records every quarter, and the workflow is what holds the line.
  • The hardest links to break are the ones you created yourself — utility accounts, professional licensing, vehicle titles — and most of the book is the playbook for breaking them.
  • Most leaks come from people who used to know you; the book's chapters on family, devices, and shared services are the most underrated.
  • OSINT lives inside the intelligence cycle; treating it as ad-hoc Googling produces ad-hoc Googling-grade output.
  • Source classification, bias awareness, and verification are the boring chapters that separate analysis from speculation.
  • Hassan and Hijazi's strongest contribution is the conceptual scaffolding; once internalized, you can graduate to Bazzell for current depth.

How they compare

We rate Extreme Privacy higher (5/5 against 3/5 for Open Source Intelligence Techniques and Tools). For most readers, that means Extreme Privacy is the primary pick and Open Source Intelligence Techniques and Tools is a useful follow-up.

Extreme Privacy is pitched at intermediate level. Open Source Intelligence Techniques and Tools is pitched at beginner level. Read the easier one first if you're not yet comfortable with the topic.

Extreme Privacy and Open Source Intelligence Techniques and Tools both cover OSINT, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics