// Comparison

Open Source Intelligence Techniques and Tools vs Tracers in the Dark: Which Should You Read?

Two cybersecurity books on Investigations, compared honestly: who each is for, what each does best, and which to read first.

Beginner
3/52018
Open Source Intelligence Techniques and Tools

Nihad A. Hassan, Rami Hijazi

Hassan and Hijazi's pedagogical introduction to OSINT framed inside the broader intelligence cycle (collection → processing → analysis → dissemination) rather than around a specific toolchain.

Beginner
5/52022
Tracers in the Dark

The Global Hunt for the Crime Lords of Cryptocurrency

Andy Greenberg

Andy Greenberg's investigative narrative of how Bitcoin's allegedly-anonymous public ledger became, in the hands of researchers and federal investigators, the most powerful OSINT tool of the last decade.

Read this if

Readers coming from a non-investigative background — students, analysts, junior threat-intel hires — who want a methodology before they touch tools. Stronger on framing and process than Bazzell, and the right first book if you don't yet know what an OSINT engagement should produce.
Anyone interested in financial investigations, blockchain analysis, dark-market enforcement, or how a public-facing data structure becomes a long-tail forensic record. The Silk Road, Welcome to Video, and AlphaBay arcs are the canonical case studies and Greenberg has the access to tell them properly.

Skip this if

Practitioners who already know the methodology and need current tooling; this book ages quickly on URLs and platforms. Also light on OPSEC, attribution avoidance, and the operational rigour real investigations demand. By 2026 the tooling chapters are partially historical.
Readers wanting tutorials on running Chainalysis or doing on-chain analysis themselves; the book is operationally and personally narrative, not technical. Also not a crypto-policy book — the macro debate over privacy coins and mixers is acknowledged but not adjudicated.

Key takeaways

  • OSINT lives inside the intelligence cycle; treating it as ad-hoc Googling produces ad-hoc Googling-grade output.
  • Source classification, bias awareness, and verification are the boring chapters that separate analysis from speculation.
  • Hassan and Hijazi's strongest contribution is the conceptual scaffolding; once internalized, you can graduate to Bazzell for current depth.
  • Anonymity is a property of the system, not the protocol; Bitcoin's pseudonymity collapses under sufficient analysis and patience.
  • The hardest investigations were won at the intersection of on-chain pivots and traditional OSINT (forum posts, reused emails, parcel addresses), not by clever cryptography breaks.
  • Greenberg's pacing makes this the best 'real OSINT investigation, end to end' book in print; read it before any blockchain-analysis training.

How they compare

We rate Tracers in the Dark higher (5/5 against 3/5 for Open Source Intelligence Techniques and Tools). For most readers, that means Tracers in the Dark is the primary pick and Open Source Intelligence Techniques and Tools is a useful follow-up.

Both books target beginner-level readers, so the choice is about topic, not difficulty.

Open Source Intelligence Techniques and Tools and Tracers in the Dark both cover Investigations, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics