- Geosint - Using OSINT to gather and process geographic location data about a subject
- Examples of programs that provide Geosint data are countless, but notably include apps like Spiderfoot, Maltego, and Spydialer.com on the web.
- Autosint - Automated OSINT
- Prosint - Professional OSINT
- Nosint - Practicing the prevention and/or removal of OSINT about a subject (person, place, thing).
- AKA "OPSEC" in the military and for private / business use.
- For a real world example of Operational Security (OPSEC), look at this Tor Dont's guide (at fossbytes.com) to see what not to do when using Tor.
- Nosint means using Operational Security principles to protect information about a subject.
- AKA "OPSEC" in the military and for private / business use.
- Yosint - You are the OSINT subject.
- "Go OSINT yourself".
- This is essentially OPSEC, but limited to just you.
- Once you've done your Yosint, take it up to the next level - Nosint - to make sure no one can gather sensitive data about you.
- Sosint - Secure OSINT.
- AKA gathering OSINT securely - in a way that's completely secure & anonymous.
- Examples of Sosint are using a secure operating system (like TAILS), using a VPN, and deleting all gathered data from all operating environments.
Typical Tactics Used by Attackers or Operational Security Professionals
The methods below are commonly used to attack and protect from information attacks:
- Observation of actions to observe patterns and when those patterns get broken
- Harvesting data online from social media
- Intercepting unsecured cell phone, email, and other communications
- WiFi Pineapple
- Using observers, spies, moles, or other agents to listen in on public conversations, socially engineer gatekeepers such as base operators or administrative staff
- Dumpster diving and trash theft
- The digital equivalent of dumpster diving could be seen as OSINT
- Tracking the movements of troops, families, and friends using geolocation data
- Wigle
- Geosint
End