LodgeOSINT · Guides

Step-by-step research guides.

Practical, methodology-first guides for open-source intelligence work. Each guide covers a specific research scenario from initial question to documented findings — with tools, ethics checkpoints, and failure modes included.

← Hub Tools Guides Workflows Ethics Contact
01 // BEGINNER

OSINT for Journalists: A Beginner's Guide

The foundational methodology for using open-source intelligence in investigative reporting. Covers verification workflow, tool setup, and ethical guardrails for newsroom environments. Where to start when you have a name, a website, or a video to verify.

What is OSINTVerification workflow Source protectionTool setupEthics checklist
// in progress
02 // BEGINNER

How to Audit Your Own Digital Footprint

A step-by-step self-OSINT audit. Before you can protect your privacy, you have to see what the world sees. Covers search engine indexing, social media exposure, data broker records, and opt-out strategies. What you find will probably surprise you.

Search engine scrubbingSocial media audit Data broker opt-outsGoogle AlertsOngoing monitoring
// in progress
03 // INTERMEDIATE

Domain Intelligence: Reading a WHOIS Record

A WHOIS record is a window into a domain's history, ownership, and infrastructure relationships. Most researchers miss 80% of the signal. This guide covers every field, what privacy proxies hide (and don't), and how to use historical records to trace ownership changes over time.

WHOIS anatomyPrivacy proxy identification Historical WHOISIP relationship mappingReverse WHOIS
// in progress
04 // INTERMEDIATE

Verifying Images and Videos in the Field

Practical techniques for confirming the authenticity and origin of visual media. Covers the complete verification pipeline: reverse image search across multiple engines, EXIF metadata extraction, Error Level Analysis for manipulation detection, and geolocation from visual context clues.

Multi-engine reverse searchEXIF extraction ELA analysisShadow/sun analysisGeolocation
// in progress
05 // INTERMEDIATE

Social Media Account Investigation

A structured approach to social media research — from username pivoting across platforms to identifying account age, behavioral patterns, and network relationships. Includes how to archive evidence before accounts go private, and the ethics of collecting social media data at scale.

Username enumerationAccount timeline analysis Network mappingEvidence archivalEthics checkpoints
// in progress
06 // ADVANCED

Infrastructure Investigation: Following the Server Trail

When a domain alone isn't enough. This guide covers how to trace a website's infrastructure relationships — shared hosting, certificate chains, reverse DNS, and ASN routing — to build a picture of who controls a network of domains and what they share beneath the surface.

DNS footprintingTLS certificate analysis Shared hosting detectionASN routingInfrastructure graph
// in progress