Open source investigation — the collection and analysis of publicly available information to uncover hidden truths, verify events, and hold institutions accountable — requires no special credentials, no proprietary databases, and no access to private information. What it requires is a clear objective, a structured research plan, knowledge of where public records live, discipline about verification, and rigorous documentation of both findings and methods. This guide walks through the core steps: from defining the objective through gathering records, using social media responsibly, verifying across independent sources, and maintaining the evidentiary integrity that makes the resulting work credible and defensible.
What Open Source Investigation Is — and Is Not
Open source investigation refers to the process of gathering and analyzing information that is publicly accessible without breaching privacy laws or accessing private systems. The term encompasses a wide range of source types: news articles and archives, court records and legal filings, government databases and regulatory reports, public records obtained through FOIA requests, social media posts visible to the public, satellite and aerial imagery available through commercial or public services, business registrations and financial disclosures, video footage from public cameras or user-submitted platforms, online forums and community archives, and nonprofit research and published reports.
What OSINT is not is equally important to establish. It does not involve accessing private email accounts, breaking into databases, scraping information from accounts that require login credentials the investigator does not legitimately hold, or using any technique that would constitute unauthorized access to a computer system under federal or state law. Every piece of information used in a legitimate OSINT investigation must be legally available to any member of the public who knows where to look. That constraint is not a limitation on the method’s power — the amount of information that is legally publicly accessible is enormous, and most accountability investigations can be substantially advanced through public records alone.
The Six Steps
Before searching anything, define precisely what the investigation is trying to establish. Three questions structure this: What specifically is being investigated — a person, an institution, a transaction, an event? What kind of evidence would be considered credible proof of the specific allegation or question? What time frame and geographic scope are relevant?
A clear objective does more than focus the research. It determines what counts as a relevant finding and what counts as an interesting but unrelated data point. Investigations without a defined objective tend to accumulate information rather than produce evidence — a distinction that matters when the findings are eventually presented to a public, a publication, or a legal proceeding. The objective also defines the threshold for when the investigation is complete: not when all available information has been gathered, but when the specific question has been answered to the required evidentiary standard.
A research plan maps the sources most likely to contain relevant information and the specific search terms, names, dates, keywords, and organizational affiliations that will guide the search. It identifies which phases of the investigation can proceed in parallel and which depend on information gathered in earlier phases. It establishes a realistic timeline and acknowledges that some investigations will require multiple phases as initial findings generate new questions.
The research plan is also where the investigator thinks through the connection architecture of the subject: what names, companies, locations, and relationships are likely to appear in the public record, and which databases are most likely to document them. A person of interest who appears in court records, property records, campaign finance filings, and business registrations will leave a documentable pattern across multiple independent sources — and mapping those connections in advance makes the search faster and the findings more robust.
Official records provide the evidentiary foundation that distinguishes a documented investigation from an opinion. The most consistently useful categories for accountability investigations are court records — civil lawsuits, criminal case filings, bankruptcy proceedings, and related exhibits — which often contain financial disclosures, sworn testimony, and document production that would be otherwise inaccessible. Business registrations and financial disclosures identify ownership structures, registered agents, and financial relationships. Property records link real estate holdings to individuals and organizations and can document asset transfers that are relevant to financial misconduct investigations. Government audit and regulatory violation reports document how agencies have assessed compliance and what violations have been found. Campaign finance records — available at the state and county level in Michigan and most other states — document financial relationships between candidates, officeholders, and donors that may be relevant to understanding enforcement decisions and institutional relationships.
Many of these records are available through online government portals. When online access is unclear or unavailable, a direct call to the relevant clerk’s office often clarifies what is available, what form it is in, and what the process is for obtaining it — including whether a FOIA request is required and what the typical response timeline is.
Social media is a significant OSINT source, but it requires more careful handling than official records because its content is more susceptible to fabrication, manipulation, and disappearance. Public posts — those visible to anyone without a login — are generally available for OSINT use. Deleted posts and archived content may be accessible through services like the Wayback Machine or specialized archival tools; content should be captured and preserved as early as possible in the investigation because social media is volatile.
Profile information on social media should be cross-referenced with other public records rather than accepted at face value. People misrepresent their credentials, affiliations, locations, and timelines on social media, and claims that cannot be verified through independent sources should not be treated as established. Digital images often contain embedded metadata — timestamps, geolocation data, device information — that can be extracted using freely available tools and that may be relevant to establishing when and where an image was captured. This metadata should be documented when present.
The most important discipline with social media OSINT is verification: a social media post showing something is a starting point for inquiry, not a conclusion. Before including social media evidence in any published or reported finding, it should be verified through at least one independent source that does not depend on the social media content itself.
Verification is the step that converts collected information into credible evidence. A single source establishing a fact is a lead. Multiple independent sources establishing the same fact — particularly when those sources have no connection to each other — are a finding. The independence standard matters: if three sources all derive from the same original document or the same person’s account, they are not three independent confirmations. They are one source repeated.
Verification also involves actively seeking disconfirming evidence — information that would contradict or undermine the investigation’s emerging conclusions. An OSINT investigation that only looks for evidence supporting what the investigator already suspects will miss material that could change the conclusion. The discipline of actively seeking disconfirmation is not a sign of weakness in the investigation. It is what makes the investigation defensible when the findings are challenged.
Every step of an OSINT investigation must be documented with enough specificity that another person could follow the same path and reproduce the findings. This means recording the sources searched, the URLs of documents accessed, screenshots with timestamps of web content that may change or disappear, the dates on which materials were accessed, and the chain of custody for any digital evidence. It means keeping a log of search terms used, results reviewed, and findings recorded. And it means noting what was searched but not found — negative findings are part of the evidentiary record too.
Documentation serves two functions simultaneously. It enables others to verify the findings — a critical requirement for any investigation that will be published, reported, or presented in a legal proceeding. And it protects the investigator against claims that evidence was fabricated, selectively assembled, or taken out of context. Findings that cannot be reproduced and verified are not findings. They are allegations. The documentation is what makes the difference.
OSINT investigations operate within a defined legal and ethical perimeter. Everything gathered must be legally available to any member of the public. Creating false identities to access private accounts, pretending to be someone else to obtain information, accessing password-protected systems without authorization, or using any technique that would constitute computer fraud under federal or state law are all outside the boundaries of legitimate OSINT. Within those boundaries, the information available through public records, official databases, and publicly visible social media is extensive — and most meaningful accountability investigations can be substantially advanced without going anywhere near those boundaries.
Essential Tools for Public Record Research
Federal court records through PACER (pacer.gov); Michigan state court records through courts.michigan.gov. Both allow case searches by name, case number, and filing date.
Archived snapshots of web pages, social media profiles, and news articles. Essential for recovering deleted or modified content and establishing what was published at a specific date and time.
Michigan Campaign Finance Information System (Michigan.gov/sos) for state-level donor and expenditure records. OpenSecrets for federal campaign finance and lobbying data.
Michigan Department of Licensing and Regulatory Affairs for business entity searches. ProPublica Nonprofit Explorer for 990 filings disclosing nonprofit finances, officer compensation, and governance.
Michigan county-level property records are maintained by the Register of Deeds and County Equalization offices. Many counties offer online parcel search tools; others require in-person or FOIA access.
Google Earth for historical satellite imagery with timeline functionality. Sentinel Hub for higher-resolution European Space Agency satellite data. Both are free for basic use and can establish the state of a location at a specific date.
Sources and Further Reading
Rita Williams, How to Conduct Open-Source Investigations: A Beginner’s Guide, Clutch Justice (Apr. 26, 2025), https://clutchjustice.com/2025/04/26/how-to-conduct-open-source-investigations-a-beginners-guide-to-finding-truth-in-public-data/.
Williams, R. (2025, April 26). How to conduct open-source investigations: A beginner’s guide. Clutch Justice. https://clutchjustice.com/2025/04/26/how-to-conduct-open-source-investigations-a-beginners-guide-to-finding-truth-in-public-data/
Williams, Rita. “How to Conduct Open-Source Investigations: A Beginner’s Guide.” Clutch Justice, 26 Apr. 2025, clutchjustice.com/2025/04/26/how-to-conduct-open-source-investigations-a-beginners-guide-to-finding-truth-in-public-data/.