Skip to content
https://rgearshop.com/

Resistance Kitty

The sassiest cat fighting fascism

  • Home
  • About
  • News
  • Comics
  • Survival Guides
  • EpsteinWiki
  • Resistance Directory
  • Merch & Mayhem
  • Subscribe
  • Toggle search form

RSG #267: How Open Source Intelligence Investigators Track People Online

Posted on May 12, 2026May 11, 2026 Dr. Harmony By Dr. Harmony No Comments on RSG #267: How Open Source Intelligence Investigators Track People Online

Resistance Survival Guide #267

Skill Level: Beginner to Intermediate

Why This Matters

Most people think privacy disappears only when hackers break into systems. In reality, many investigators never need to hack anything at all. Open Source Intelligence, often called OSINT, relies on publicly available information that people voluntarily leave scattered across the internet every single day. Journalists, researchers, corporations, law enforcement agencies, private investigators, political campaigns, stalkers, and extremist groups all use these techniques to map identities, relationships, travel patterns, workplaces, and social connections.

A single photo can reveal your location. A reused username can connect years of accounts together. An old LinkedIn profile can expose your workplace history. A metadata rich image uploaded carelessly can quietly reveal where you live. Modern surveillance culture depends heavily on public oversharing mixed with automated data collection systems.

This guide is not about paranoia. It is about awareness. The better you understand how online investigations work, the better you can protect yourself, your family, your organizing spaces, and your digital footprint.

What Is Open Source Intelligence

Open Source Intelligence is the process of collecting and analyzing publicly accessible information. Unlike hacking, OSINT relies on information that already exists online or in public databases. Investigators combine small fragments together until a much larger picture emerges.

An investigator might start with nothing more than a username, photo, or email address. From there they can search archived websites, social media posts, map metadata, public records, old forum accounts, leaked databases, business registrations, and image search systems. Individually these details may seem harmless. Combined together they can become extremely revealing.

Professional investigators often call this process “building a digital footprint.” Activists and journalists should understand this process because hostile actors use these same methods constantly.

Useful background reading can be found through the Bellingcat Online Investigation Toolkit, the OSINT Framework, and the Electronic Frontier Foundation Surveillance Self Defense Guide.

Step by Step

Step 1: Understand How Username Tracking Works

One of the easiest ways investigators connect accounts together is through username reuse. Many people unknowingly use the same username across Reddit, Bluesky, Instagram, old forums, gaming platforms, shopping accounts, and email addresses for years.

Once a username appears publicly, search engines can often connect dozens of accounts automatically. Even deleted content may survive in archives or screenshots. Investigators frequently build identity maps by following username trails across platforms.

Take a moment to search your most common usernames in multiple search engines. You may be surprised how many old accounts still appear publicly. Consider separating activist identities, professional identities, and personal identities into completely different naming systems moving forward.

The OSINT Framework demonstrates just how many tools exist for username correlation.

Step 2: Audit Your Public Photos Carefully

Photos reveal far more information than most people realize. Investigators often analyze reflections, street signs, weather conditions, architectural styles, tattoos, clothing logos, and geolocation metadata hidden inside image files.

Many phones automatically embed GPS coordinates into photos unless location settings are disabled. Even when metadata is removed, visual clues may still identify neighborhoods, workplaces, or frequently visited locations.

Before uploading photos publicly, inspect the background carefully. Zoom in. Check mirrors, windows, computer screens, badges, mail, or license plates. Small details often expose much more than intended.

The Electronic Frontier Foundation provides excellent privacy guidance on metadata and digital safety practices.

Step 3: Learn How Reverse Image Searching Works

Reverse image search tools allow investigators to trace where images appeared online previously. A single profile photo may connect anonymous accounts together across multiple platforms.

This technique is commonly used by journalists verifying identities, but it is also widely used for harassment campaigns, doxxing, and surveillance.

Images can be searched using tools like TinEye, Google Lens, and independent verification projects such as Bellingcat. Even cropped or slightly altered images can sometimes still be identified.

If anonymity matters, avoid reusing profile photos across unrelated accounts. Consider how even old images may continue circulating long after deletion.

Step 4: Review Your Old Social Media History

Many people forget that old posts remain searchable for years. Investigators frequently examine historic posts to identify political beliefs, social circles, former workplaces, travel habits, emotional vulnerabilities, or personal routines.

Review your oldest public posts carefully. Check old Facebook albums, abandoned Twitter accounts, public comments, old Tumblr blogs, forum posts, gaming profiles, and cached pages.

Ask yourself simple questions:

  • Could a stranger identify where I live?
  • Could someone map my routines?
  • Could someone identify my friends or organizing spaces?
  • Could someone impersonate me using old information?

Cleaning up years of digital breadcrumbs takes time, but it dramatically reduces exposure.

The Surveillance Self Defense Guide includes practical recommendations for reducing long term digital risk.

Step 5: Understand Metadata and Data Brokers

Even when individuals lock down social media accounts, massive data broker industries still collect information through apps, advertising systems, loyalty programs, and commercial tracking networks.

Phone numbers, addresses, relatives, employment history, and location patterns often circulate through people search databases. Many OSINT investigators rely heavily on these commercial records.

Search for yourself periodically using common people search engines to understand what information is publicly exposed. While complete removal is difficult, many services provide opt out systems.

The nonprofit organization Privacy Rights Clearinghouse offers guidance for data broker removal and privacy protection.

Step 6: Separate Activism From Personal Life

One of the most important operational security habits is compartmentalization. Investigators often succeed because people merge every part of their life into a single digital identity.

Activist accounts should not share usernames, profile photos, recovery emails, or phone numbers with personal accounts. Separate browsers, separate email accounts, and separate communication channels create stronger barriers against tracking.

This does not mean living in fear. It means understanding that modern surveillance systems reward convenience and punish separation. Creating boundaries makes automated tracking significantly harder.

The Freedom of the Press Foundation Security Training Resources provide excellent beginner friendly operational security guidance.

Example

Imagine an organizer attends a rally and posts several photos publicly. In one image, a reflective storefront window reveals the organizer’s car. The organizer also uses the same username on a gaming platform linked to an old city based discussion forum. That forum contains references to a neighborhood softball league. Another account using the same username appears on LinkedIn.

None of these details seem dangerous independently. Together they can reveal a real name, approximate home area, employer history, social connections, and movement patterns within a few hours.

This is exactly how modern digital investigations often work. Not through movie style hacking. Through patient collection of tiny public clues.

Required Reading

  • Bellingcat Online Investigation Toolkit
  • OSINT Framework
  • Electronic Frontier Foundation Surveillance Self Defense
  • Freedom of the Press Foundation Security Training
  • Privacy Rights Clearinghouse
  • Mozilla Privacy Resources

Conclusion

The internet remembers far more than people expect. Modern surveillance does not always come from secret agencies hiding in dark rooms. Sometimes it comes from ordinary public information stitched together piece by piece until a complete picture emerges.

Understanding OSINT techniques helps people become smarter digital citizens. It encourages intentional sharing, stronger privacy habits, and healthier awareness about how online identities evolve over time.

You do not need to disappear from the internet completely. You simply need to understand how the system works before somebody else studies your digital footprint more carefully than you do.


Kitty’s Resistance Projects

  • Resistance Directory:https://resistancedirectory.com/
  • EpsteinWiki:Epsteinwiki.com

Support Resistance Kitty’s Work

  • Kitty Merch:https://rgearshop.com/
  • Support Kitty:https://buymeacoffee.com/resistancekitty

R – We Tread On Tyrants Light Style Unisex Long Sleeve Tee
Resistance Survival Guide Tags:activist safety, digital footprint, digital privacy, internet safety, metadata tracking, online investigations, open source intelligence, operational security, OSINT, privacy protection, Resistance survival guide, reverse image search, social media privacy, surveillance culture

Post navigation

Previous Post: Day 476 All Grown Up

Related Posts

  • #30 How to Stay Anonymous While Resisting Like a Pro Resistance Survival Guide
  • #22 How to Start a Pirate Radio Station and Beam the Truth Through the Static Resistance Survival Guide
  • How to Spot and Report Election Disinformation Campaigns Resistance Survival Guide
  • RSG #260: How to Protect Your Mental Health in an Environment Designed to Overwhelm You Resistance Survival Guide
  • #179 How to Document Government Abuse Without Getting Yourself Targeted Resistance Survival Guide
  • #23 How to Weaponize Patriotic Holidays Without Getting Invited to the BBQ Resistance Survival Guide

More Related Articles

#38 How to Hack a Surveillance State with Stickers, Mirrors, and Tinfoil Resistance Survival Guide
#118 How to Survive a Government Shutdown Without Losing Your Claws Resistance Survival Guide
RSG #207 When NOT to Publish Information Resistance Survival Guide
#165 How to Demand Congressional Investigations Without Letting the Fascists Run Out the Clock Resistance Survival Guide
Resistance Survival Guide #261: How to Talk to People Who Are Deep in Propaganda Without Escalating Resistance Survival Guide
#149 The Bad Deal Blues: How to Fight When Your Senators Sell You Out Resistance Survival Guide

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RSS FEED

Categories

  • Call to Action
  • Civic Mischief HQ
  • Executive Orders
  • Featured Resisters
  • Knives Out Activities
  • Resistance Kitty Comics
  • Resistance Survival Guide
  • Resistance Wins
Sign Up To Get Resistance Kitty in your inbox!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

Recent Posts

  • RSG #267: How Open Source Intelligence Investigators Track People Online
  • Day 476 All Grown Up
  • Day 475 Resistance Update and Agenda
  • RSG #266: How to Detect Hidden Surveillance Cameras in Public Spaces and Rentals
  • Day 475 It’s Fine

Recent Comments

  1. Dr. Harmony on RSG#199 Creating a Personal Legal Emergency Card
  2. Dr. Harmony on RSG#199 Creating a Personal Legal Emergency Card
  3. Monica on RSG#199 Creating a Personal Legal Emergency Card
  4. Monica on How to Prepare for War-Related Disruption Without Panicking
  5. Dr. Harmony on Request for Emergency Medical and Constitutional Review of Presidential Fitness

Copyright © 2026 Resistance Kitty.