// Comparison
OSINT Techniques vs Tracers in the Dark: Which Should You Read?
Two cybersecurity books on Investigations, compared honestly: who each is for, what each does best, and which to read first.
Michael Bazzell's relentlessly updated technical manual for finding people, accounts, breach data, geolocation evidence, and online identifiers — the de facto reference of the modern OSINT field.
The Global Hunt for the Crime Lords of Cryptocurrency
Andy Greenberg
Andy Greenberg's investigative narrative of how Bitcoin's allegedly-anonymous public ledger became, in the hands of researchers and federal investigators, the most powerful OSINT tool of the last decade.
Read this if
Skip this if
Key takeaways
- Treat the book as a current toolbox, not a finished doctrine — the URLs and tools die, the workflow Bazzell teaches outlives them.
- Build a separate VM and disposable identity per investigation; the book's OPSEC posture is non-negotiable for serious work.
- Breach-data, username, and email pivots are still the highest-yield queries in 2026; everything else is supporting evidence.
- Anonymity is a property of the system, not the protocol; Bitcoin's pseudonymity collapses under sufficient analysis and patience.
- The hardest investigations were won at the intersection of on-chain pivots and traditional OSINT (forum posts, reused emails, parcel addresses), not by clever cryptography breaks.
- Greenberg's pacing makes this the best 'real OSINT investigation, end to end' book in print; read it before any blockchain-analysis training.
How they compare
OSINT Techniques and Tracers in the Dark are both rated 5/5 in our catalog. Pick by topic preference and reading style rather than by rating.
OSINT Techniques is pitched at intermediate level. Tracers in the Dark is pitched at beginner level. Read the easier one first if you're not yet comfortable with the topic.
OSINT Techniques and Tracers in the Dark both cover Investigations, so reading them in sequence reinforces the same material from different angles.