Choose your role
Start from journalism, cybersecurity, image work, company research, suspicious links, or a general intake.
By role
Not everyone begins OSINT from the same place. A journalist, a cybersecurity learner, and someone checking an image have different first questions. Choose a role and start with a safer path.
Short work order
Start from journalism, cybersecurity, image work, company research, suspicious links, or a general intake.
Decide what you are trying to prove and what would not count as evidence.
Move to a source collection, case file, inquiry form, or report workflow.
Separate findings, assumptions, confidence, and missing context.
Choose your role
Suggested starting path
Use this path when you need to separate the original claim, first source, date, context, and supporting evidence.
First question
What exactly is being claimed, and where might it have appeared first?
Break the claim into parts first. Then check source, date, image, and context as separate questions.
Who is saying what, where, and when? Keep interpretation separate from evidence.
Do not follow only reposts. Look for an original post, official statement, local source, or archive copy.
Look for old images, cropped video, wrong dates, and missing context.
Do not present an uncertain finding as fact. State confidence and what is still missing.
Expected output
A short verification note with sources, confidence level, and missing checks before publication.
Watch for
Continue with this role
Mini practice
Choose one headline, search the same claim in two independent sources, and compare publication dates.
What this is based on
The paths are adapted from common practice in journalism, OSINT research, phishing defense, and basic cybersecurity risk management. They are for training and legal research.