FRONTLINEPRIVACY
OSINT defense

Think like the adversary

Tactical walkthroughs of the open-source intelligence techniques used to identify, locate, and target first responders. How they work, how to do them on yourself, what to do about what you find. The OSINT chain almost always ends at a broker page; cleaning the broker is the upstream protection.

Search-engine

Social media

Public records

Personal data

Defensive techniques