// Comparison

OSINT Techniques vs Tracers in the Dark: Which Should You Read?

Two cybersecurity books on Investigations, compared honestly: who each is for, what each does best, and which to read first.

Intermediate
5/52024
OSINT Techniques

Resources for Uncovering Online Information

Michael Bazzell

Michael Bazzell's relentlessly updated technical manual for finding people, accounts, breach data, geolocation evidence, and online identifiers — the de facto reference of the modern OSINT field.

Beginner
5/52022
Tracers in the Dark

The Global Hunt for the Crime Lords of Cryptocurrency

Andy Greenberg

Andy Greenberg's investigative narrative of how Bitcoin's allegedly-anonymous public ledger became, in the hands of researchers and federal investigators, the most powerful OSINT tool of the last decade.

Read this if

Investigators, journalists, threat-intel analysts, fraud teams, and anyone whose job depends on what they can verify from public sources. The single most utilitarian OSINT book in print; Bazzell rewrites it nearly every year because the field's surface keeps moving.
Anyone interested in financial investigations, blockchain analysis, dark-market enforcement, or how a public-facing data structure becomes a long-tail forensic record. The Silk Road, Welcome to Video, and AlphaBay arcs are the canonical case studies and Greenberg has the access to tell them properly.

Skip this if

Readers wanting an academic intelligence-cycle textbook or a single tidy OSINT methodology. Bazzell's strength is breadth, currency, and tooling — if you want methodology before tools, read Hassan & Hijazi first. Also written for North America; non-US techniques are sparser.
Readers wanting tutorials on running Chainalysis or doing on-chain analysis themselves; the book is operationally and personally narrative, not technical. Also not a crypto-policy book — the macro debate over privacy coins and mixers is acknowledged but not adjudicated.

Key takeaways

  • Treat the book as a current toolbox, not a finished doctrine — the URLs and tools die, the workflow Bazzell teaches outlives them.
  • Build a separate VM and disposable identity per investigation; the book's OPSEC posture is non-negotiable for serious work.
  • Breach-data, username, and email pivots are still the highest-yield queries in 2026; everything else is supporting evidence.
  • Anonymity is a property of the system, not the protocol; Bitcoin's pseudonymity collapses under sufficient analysis and patience.
  • The hardest investigations were won at the intersection of on-chain pivots and traditional OSINT (forum posts, reused emails, parcel addresses), not by clever cryptography breaks.
  • Greenberg's pacing makes this the best 'real OSINT investigation, end to end' book in print; read it before any blockchain-analysis training.

How they compare

OSINT Techniques and Tracers in the Dark are both rated 5/5 in our catalog. Pick by topic preference and reading style rather than by rating.

OSINT Techniques is pitched at intermediate level. Tracers in the Dark is pitched at beginner level. Read the easier one first if you're not yet comfortable with the topic.

OSINT Techniques and Tracers in the Dark both cover Investigations, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics