Note Taking for OSINT¶
Effective note-taking is crucial for successful OSINT investigations. Proper documentation ensures information integrity, enables pattern recognition, and maintains evidence chains.
Essential Note-Taking Tools¶
Desktop Applications¶
KeepNote¶
- Type: Hierarchical note organization
- Features:
- Tree-like structure for organizing information
- Rich text formatting with images and attachments
- Cross-platform compatibility
- Offline functionality
- Best for: Structured investigations with multiple subjects
CherryTree¶
- Type: Hierarchical note-taking application
- Features:
- Tree structure with nodes and subnodes
- Syntax highlighting for code
- Password protection
- Export to multiple formats
- Best for: Technical investigations requiring code documentation
Joplin¶
- Type: Open source note-taking and to-do application
- Features:
- Markdown support
- End-to-end encryption
- Synchronization across devices
- Web clipper extension
- Best for: Secure, synchronized note-taking across multiple devices
Cloud-Based Solutions¶
Notion¶
- Type: All-in-one workspace for notes and collaboration
- Features:
- Database functionality
- Template system
- Real-time collaboration
- Integration with other tools
- Best for: Team investigations and comprehensive case management
OneNote¶
- Type: Microsoft's cloud-based note-taking platform
- Features:
- Free-form canvas
- Handwriting recognition
- Integration with Microsoft Office
- Real-time synchronization
- Best for: Mixed media documentation and Microsoft ecosystem users
Screenshot and Image Annotation Tools¶
Greenshot¶
- Features:
- Built-in image editor
- Automatic upload to cloud services
- OCR capabilities
- Annotation tools (arrows, text, highlighting)
- Best for: Quick screenshot documentation with annotations
Flameshot¶
- Features:
- Powerful screenshot software
- Advanced editing tools
- Command-line interface
- Cross-platform support
- Best for: Linux users and command-line workflows
Note-Taking Best Practices¶
Structure and Organization¶
- Use Consistent Naming Conventions
- Date-based filing (YYYY-MM-DD)
- Subject-based categorization
-
Unique case identifiers
-
Create Information Hierarchies
- Main investigation folder
- Subject-specific subfolders
-
Evidence categories (images, documents, profiles)
-
Implement Tagging Systems
- Use relevant keywords
- Create tag taxonomies
- Enable cross-reference capabilities
Documentation Standards¶
Source Attribution¶
Always record: - URL and timestamp - Screenshot date and time - Tool or method used for collection - Confidence level of information
Evidence Preservation¶
- Maintain original file formats
- Create backup copies
- Document chain of custody
- Use hash values for integrity verification
Information Verification¶
Cross-Reference Methods¶
- Multiple source confirmation
- Timeline consistency checks
- Fact-checking against known data
- Reverse verification techniques
Confidence Levels¶
Use standardized confidence indicators: - High: Multiple independent sources confirm - Medium: Single reliable source or multiple unconfirmed sources - Low: Unverified single source - Uncertain: Conflicting information exists
Sock Puppets and Operational Security¶
Creating Research Personas¶
Sock puppets are fictional online personas used for intelligence gathering without revealing your real identity.
Key Resources:¶
Example Persona Elements:¶
- Email:
louisthornton@jourrapide.com - Consistent backstory and interests
- Appropriate profile photos
- Realistic activity patterns
Platform-Specific Considerations:¶
- Twitter: Focus on interests and engagement patterns
- LinkedIn: Professional background and connections
- Facebook: Personal interests and social connections
Security Measures¶
- Compartmentalization
- Separate devices or virtual machines
- Different browsers with cleared data
-
Unique personas for different investigations
-
Anonymous Communication
- VPN services
- Tor browser
- Temporary email services
-
Encrypted messaging
-
Evidence Protection
- Encrypted storage
- Secure backup procedures
- Access control measures
- Regular security audits
Documentation Templates¶
Investigation Log Template¶
Case ID: [Unique Identifier]
Date: [YYYY-MM-DD]
Investigator: [Name/ID]
Objective: [Investigation goals]
Timeline:
- [Timestamp]: [Action taken]
- [Timestamp]: [Information discovered]
- [Timestamp]: [Verification completed]
Sources:
- [Source 1]: [Description and reliability]
- [Source 2]: [Description and reliability]
Findings:
- [Key finding 1]: [Confidence level]
- [Key finding 2]: [Confidence level]
Next Steps:
- [Action item 1]
- [Action item 2]
Source Verification Checklist¶
- URL documented with timestamp
- Screenshot captured
- Source reliability assessed
- Cross-referenced with other sources
- Information categorized by confidence level
- Chain of custody maintained