IntelTechniques
Michael Bazzell's OSINT tools, training, and methodology — the definitive resource for digital investigations, online search techniques, and personal privacy protection.
What should journalists know about IntelTechniques?
IntelTechniques is Michael Bazzell's one-person operation and the most respected OSINT methodology resource in the English-speaking investigation community. Bazzell spent 18 years as an FBI cyber crimes investigator before leaving to focus on OSINT training and personal privacy consulting. His work sits at the intersection of two concerns that matter deeply to journalists: how to find information about other people online, and how to protect your own information from being found. The core product is a web-based collection of OSINT search tools — structured interfaces that query public records, social media platforms, search engines, archived content, and other open sources. These are not hacking tools or data brokers. They are organized, methodical search interfaces that help researchers exhaust public sources systematically rather than relying on ad hoc Google searches. Categories cover people search, email, username, social media, domain/IP, documents, images, and more. The tools have evolved significantly. Earlier versions linked directly to third-party search engines and databases. Current versions are more cautious about operational security — Bazzell has progressively removed tools that might expose the researcher's identity or search patterns to the target. This privacy-first evolution reflects Bazzell's dual expertise: he teaches both how to investigate and how to avoid being investigated. For journalists, IntelTechniques serves three purposes. First, the tools portal provides structured OSINT workflows — a checklist approach to digital research that ensures you've checked all public sources before concluding someone can't be found online. Second, the books (particularly 'OSINT Techniques,' now in its 10th+ edition, updated annually) provide comprehensive methodology that's applicable to any investigation. Third, the privacy guidance helps journalists protect sources, reduce their own exposure, and understand the same techniques that targets use to hide. The 'Extreme Privacy' book and associated guidance is particularly valuable for journalists in hostile environments. Bazzell covers removing personal information from data brokers, compartmentalizing online identities, securing communications, and reducing physical-world exposure. This is the same tradecraft he teaches to stalking victims, domestic violence survivors, and law enforcement personnel — adapted for anyone whose work creates enemies. The limits: IntelTechniques is one person's operation. When Bazzell updates the tools or books, they're updated. When he doesn't, they age. Some tools break when target platforms change their interfaces or APIs. The subscription tools portal has had periods of being taken offline or restructured as Bazzell rethinks the operational security implications. The content is US-centric in its public records coverage, though the methodology is globally applicable. There is no team, no roadmap, no SLA — this is an expert practitioner sharing his methods, not a software company.
Structured OSINT research methodology — ensuring you've exhausted all public sources. People-finding using public records, social media, and web archives. Username and email investigations across platforms. Learning digital investigation techniques through books and training. Personal privacy protection and digital footprint reduction. Understanding the OSINT landscape and available data sources. Operational security for journalists conducting sensitive research.
Automated bulk data collection or API access — these are manual research tools. Non-English or non-US public records (methodology applies globally, but tool coverage is US-centric). Real-time monitoring or alerting. Breaking into accounts or accessing private data — Bazzell teaches legal, ethical open-source research only. Newsroom-scale deployment — this is an individual researcher's toolkit, not enterprise software. Situations requiring guaranteed uptime or SLA — it's a one-person operation.
Security & Privacy
Data is scrambled while being sent to their servers
Data is scrambled when stored on their servers
Where servers are located — affects which governments can request your data
Privacy policy summary
IntelTechniques is built by a privacy expert and reflects that ethos. The tools portal requires a subscription (email and payment), but Bazzell's known philosophy minimizes data collection. The tools generate queries against third-party sources — those sources have their own tracking and logging. IntelTechniques itself is a search interface, not a data store. Bazzell has explicitly discussed minimizing server logs and user tracking. No advertising, no data sales, no third-party analytics visible on the site.
How to protect yourself:
Use the OSINT tools through a VPN or Tor to prevent your IP from being logged by the third-party sources being queried. Remember that IntelTechniques provides the search interface, but the actual queries hit external platforms that log requests — your operational security depends on how you access those end sources, not just IntelTechniques itself. Use a dedicated browser profile for OSINT research, separate from your personal browsing. Follow Bazzell's own privacy methodology: compartmentalize research identities, use purpose-specific email addresses, and don't mix investigation accounts with personal accounts. Keep a local copy of the methodology (from the books) in case the online tools portal goes offline or is restructured.
Built by a former FBI cyber crimes investigator and active privacy advocate — the developer's personal expertise is the strongest trust signal here. HTTPS encryption in transit. Minimal data collection philosophy consistent with Bazzell's published privacy principles. No advertising, no third-party analytics visible. The main considerations: it's a one-person operation without published security certifications or third-party audits, and the tools generate queries against external sources with their own logging. The privacy expertise of the operator provides high confidence in intentional security design, but no formal verification exists. Rating reflects strong practitioner credibility offset by lack of institutional security documentation.
Who Owns This
Known issues
One-person dependency: The entire operation depends on Michael Bazzell. If he retires, becomes incapacitated, or decides to shut down, there is no succession plan, no team, and no institutional continuity. Books remain available but tools and training would end. Tool maintenance: Individual tools break when target platforms change their interfaces, APIs, or access policies. With one person maintaining the collection, broken tools may remain broken for days or weeks until Bazzell addresses them. No SLA or guaranteed uptime. US-centric coverage: While the OSINT methodology is universally applicable, the specific tool collection and public-records guidance is heavily oriented toward US data sources. Journalists investigating in other countries will need to supplement with local-jurisdiction tools. Periodic restructuring: Bazzell has historically taken the tools portal offline, restructured access, or removed tools he considers operationally risky. The product is not static — features available today may be gone tomorrow based on Bazzell's evolving security philosophy. This is principled but unpredictable for users who depend on specific tools. Subscription required for tools: The tools portal is not free. While the methodology is accessible through books and podcast, the actual structured search tools require an active subscription. For journalists already paying for multiple tool subscriptions, this is one more recurring cost. Ethical boundaries: IntelTechniques teaches legal open-source research only. Journalists hoping for tools that access private databases, bypass authentication, or scrape restricted platforms will not find them here. This is a feature, not a bug — but it sets expectations.
Pricing
The OSINT tools portal requires a paid subscription — pricing has varied but is typically around $50/year for access to the online tools collection. Books ('OSINT Techniques' and 'Extreme Privacy') retail at approximately $36-46 each. The podcast is free. Online training courses and in-person workshops are offered at varying price points. Some free content available through the podcast and blog.
This is an editorial assessment based on publicly available information as of 2026-04-11, using our published methodology. Independent security review is pending. Security posture can change at any time. This is not a guarantee of safety.
Something wrong or outdated? Report it.