OSINT is powerful and easy to misuse. This page documents the ethical framework I've built into my research practice — not as a disclaimer, but as the actual operating principles that determine what I will and won't do, and why.
Collect only the information required to answer the specific question. Every piece of data about a person that you collect beyond what the question demands is a privacy cost with no corresponding benefit. OSINT is not stamp collecting.
A research log that only records findings is not sufficient. Document the pivots you chose not to pursue and why. If your methodology is ever challenged, the reasoning matters as much as the findings.
"I could not find public information sufficient to answer this question" is a legitimate and honest research conclusion. Never fill an evidence gap with inference presented as fact. The temptation to connect dots is where most OSINT investigations go wrong.
How findings are shared, stored, and used must match the stated purpose of the research. Evidence gathered to verify a journalistic claim is not appropriate for public posting. Evidence gathered for personal safety is not appropriate for sharing with third parties without consent.
Public figures — politicians, executives, public organizations — have reduced privacy expectations regarding their public roles. Private individuals, including family members of public figures, do not. Apply a substantially higher burden of necessity before researching a private individual.
Building ongoing location profiles, monitoring an individual's movements, or tracking someone's daily activity — regardless of whether the data is technically public. Purpose matters more than method.
Aggregating and publicly posting personal information with the intent or likely effect of enabling harassment. This is harm facilitation, not research, regardless of whether every individual piece of data was public.
Using public data to facilitate corporate theft, IP appropriation, or targeted competitive harm. The techniques may overlap; the purpose determines whether the work is legitimate research or an attack vector.
OSINT is a passive discipline. The moment you interact with a system beyond what any public user would encounter — including exploiting misconfigurations — you have left the domain of OSINT and entered unauthorized access territory.