BeginnerOSINTInvestigations

Open Source Intelligence Techniques and Tools

3 / 5

Hassan and Hijazi's pedagogical introduction to OSINT framed inside the broader intelligence cycle (collection → processing → analysis → dissemination) rather than around a specific toolchain.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2018
Publisher
Apress
Pages
354
Language
English

Read this if

Readers coming from a non-investigative background — students, analysts, junior threat-intel hires — who want a methodology before they touch tools. Stronger on framing and process than Bazzell, and the right first book if you don't yet know what an OSINT engagement should produce.

Skip this if

Practitioners who already know the methodology and need current tooling; this book ages quickly on URLs and platforms. Also light on OPSEC, attribution avoidance, and the operational rigour real investigations demand. By 2026 the tooling chapters are partially historical.

Key takeaways

  • OSINT lives inside the intelligence cycle; treating it as ad-hoc Googling produces ad-hoc Googling-grade output.
  • Source classification, bias awareness, and verification are the boring chapters that separate analysis from speculation.
  • Hassan and Hijazi's strongest contribution is the conceptual scaffolding; once internalized, you can graduate to Bazzell for current depth.

Notes

Use it as a stepping stone to OSINT Techniques 11e (Bazzell), not as a substitute. Pair with Tracers in the Dark (Greenberg) for a real investigation that exercises every stage of the cycle. The book's strength is teaching you to ask the right questions; once you can, the tools you reach for change every quarter and that's fine.

Related topics