Resistance Survival Guide #267
Skill Level: Beginner to Intermediate
Why This Matters
Most people think privacy disappears only when hackers break into systems. In reality, many investigators never need to hack anything at all. Open Source Intelligence, often called OSINT, relies on publicly available information that people voluntarily leave scattered across the internet every single day. Journalists, researchers, corporations, law enforcement agencies, private investigators, political campaigns, stalkers, and extremist groups all use these techniques to map identities, relationships, travel patterns, workplaces, and social connections.
A single photo can reveal your location. A reused username can connect years of accounts together. An old LinkedIn profile can expose your workplace history. A metadata rich image uploaded carelessly can quietly reveal where you live. Modern surveillance culture depends heavily on public oversharing mixed with automated data collection systems.
This guide is not about paranoia. It is about awareness. The better you understand how online investigations work, the better you can protect yourself, your family, your organizing spaces, and your digital footprint.
What Is Open Source Intelligence
Open Source Intelligence is the process of collecting and analyzing publicly accessible information. Unlike hacking, OSINT relies on information that already exists online or in public databases. Investigators combine small fragments together until a much larger picture emerges.
An investigator might start with nothing more than a username, photo, or email address. From there they can search archived websites, social media posts, map metadata, public records, old forum accounts, leaked databases, business registrations, and image search systems. Individually these details may seem harmless. Combined together they can become extremely revealing.
Professional investigators often call this process “building a digital footprint.” Activists and journalists should understand this process because hostile actors use these same methods constantly.
Useful background reading can be found through the Bellingcat Online Investigation Toolkit, the OSINT Framework, and the Electronic Frontier Foundation Surveillance Self Defense Guide.
Step by Step
Step 1: Understand How Username Tracking Works
One of the easiest ways investigators connect accounts together is through username reuse. Many people unknowingly use the same username across Reddit, Bluesky, Instagram, old forums, gaming platforms, shopping accounts, and email addresses for years.
Once a username appears publicly, search engines can often connect dozens of accounts automatically. Even deleted content may survive in archives or screenshots. Investigators frequently build identity maps by following username trails across platforms.
Take a moment to search your most common usernames in multiple search engines. You may be surprised how many old accounts still appear publicly. Consider separating activist identities, professional identities, and personal identities into completely different naming systems moving forward.
The OSINT Framework demonstrates just how many tools exist for username correlation.
Step 2: Audit Your Public Photos Carefully
Photos reveal far more information than most people realize. Investigators often analyze reflections, street signs, weather conditions, architectural styles, tattoos, clothing logos, and geolocation metadata hidden inside image files.
Many phones automatically embed GPS coordinates into photos unless location settings are disabled. Even when metadata is removed, visual clues may still identify neighborhoods, workplaces, or frequently visited locations.
Before uploading photos publicly, inspect the background carefully. Zoom in. Check mirrors, windows, computer screens, badges, mail, or license plates. Small details often expose much more than intended.
The Electronic Frontier Foundation provides excellent privacy guidance on metadata and digital safety practices.
Step 3: Learn How Reverse Image Searching Works
Reverse image search tools allow investigators to trace where images appeared online previously. A single profile photo may connect anonymous accounts together across multiple platforms.
This technique is commonly used by journalists verifying identities, but it is also widely used for harassment campaigns, doxxing, and surveillance.
Images can be searched using tools like TinEye, Google Lens, and independent verification projects such as Bellingcat. Even cropped or slightly altered images can sometimes still be identified.
If anonymity matters, avoid reusing profile photos across unrelated accounts. Consider how even old images may continue circulating long after deletion.
Step 4: Review Your Old Social Media History
Many people forget that old posts remain searchable for years. Investigators frequently examine historic posts to identify political beliefs, social circles, former workplaces, travel habits, emotional vulnerabilities, or personal routines.
Review your oldest public posts carefully. Check old Facebook albums, abandoned Twitter accounts, public comments, old Tumblr blogs, forum posts, gaming profiles, and cached pages.
Ask yourself simple questions:
- Could a stranger identify where I live?
- Could someone map my routines?
- Could someone identify my friends or organizing spaces?
- Could someone impersonate me using old information?
Cleaning up years of digital breadcrumbs takes time, but it dramatically reduces exposure.
The Surveillance Self Defense Guide includes practical recommendations for reducing long term digital risk.
Step 5: Understand Metadata and Data Brokers
Even when individuals lock down social media accounts, massive data broker industries still collect information through apps, advertising systems, loyalty programs, and commercial tracking networks.
Phone numbers, addresses, relatives, employment history, and location patterns often circulate through people search databases. Many OSINT investigators rely heavily on these commercial records.
Search for yourself periodically using common people search engines to understand what information is publicly exposed. While complete removal is difficult, many services provide opt out systems.
The nonprofit organization Privacy Rights Clearinghouse offers guidance for data broker removal and privacy protection.
Step 6: Separate Activism From Personal Life
One of the most important operational security habits is compartmentalization. Investigators often succeed because people merge every part of their life into a single digital identity.
Activist accounts should not share usernames, profile photos, recovery emails, or phone numbers with personal accounts. Separate browsers, separate email accounts, and separate communication channels create stronger barriers against tracking.
This does not mean living in fear. It means understanding that modern surveillance systems reward convenience and punish separation. Creating boundaries makes automated tracking significantly harder.
The Freedom of the Press Foundation Security Training Resources provide excellent beginner friendly operational security guidance.
Example
Imagine an organizer attends a rally and posts several photos publicly. In one image, a reflective storefront window reveals the organizer’s car. The organizer also uses the same username on a gaming platform linked to an old city based discussion forum. That forum contains references to a neighborhood softball league. Another account using the same username appears on LinkedIn.
None of these details seem dangerous independently. Together they can reveal a real name, approximate home area, employer history, social connections, and movement patterns within a few hours.
This is exactly how modern digital investigations often work. Not through movie style hacking. Through patient collection of tiny public clues.
Required Reading
- Bellingcat Online Investigation Toolkit
- OSINT Framework
- Electronic Frontier Foundation Surveillance Self Defense
- Freedom of the Press Foundation Security Training
- Privacy Rights Clearinghouse
- Mozilla Privacy Resources
Conclusion
The internet remembers far more than people expect. Modern surveillance does not always come from secret agencies hiding in dark rooms. Sometimes it comes from ordinary public information stitched together piece by piece until a complete picture emerges.
Understanding OSINT techniques helps people become smarter digital citizens. It encourages intentional sharing, stronger privacy habits, and healthier awareness about how online identities evolve over time.
You do not need to disappear from the internet completely. You simply need to understand how the system works before somebody else studies your digital footprint more carefully than you do.
Kitty’s Resistance Projects
- Resistance Directory:https://resistancedirectory.com/
- EpsteinWiki:Epsteinwiki.com
Support Resistance Kitty’s Work
- Kitty Merch:https://rgearshop.com/
- Support Kitty:https://buymeacoffee.com/resistancekitty
