IMINT.md
1 # Table of Contents 2 3 1. [Reverse Search (Google)](#reverse-search-google)</br> 4 1a. [reconnaissance framework](IMINT.md#reconnaissance-framework) 5 * [How to Use Reverse Image Search](#how-to-use-reverse-image-search) 6 - [On Mobile](#on-mobile) 7 - [On Desktop](#on-desktop) 8 * [What You Can Use It For](#what-you-can-use-it-for) 9 - [Find an Article](#find-an-article) 10 - [Identify a Device Name or Type](#identify-a-device-name-or-type) 11 - [Find a Brand, Restaurant, or Location](#find-a-brand-restaurant-or-location) 12 * [What You Cannot Do](#what-you-cannot-do) 13 * [Extra Tips](#extra-tips) 14 15 16 3 [GEOINT (Geographical Intelligence)](#geoint-geographical-intelligence) 17 18 4. [IMINT (Imagery Intelligence)](#imint-imagery-intelligence) 19 * [Definition](#definition) 20 * [Who Uses IMINT?](#who-uses-imint) 21 * [SOCMINT (Social Intelligence)](#socmint-social-intelligence) 22 * [Using Public Images with Maps](#using-public-images-with-maps) 23 * [Ten Practical Applications](#ten-practical-applications) 24 * [Ethical and Legal Considerations](#ethical-and-legal-considerations) 25 26 5. [Combining IMINT, SOCMINT, and Digital Profiling](#combining-imint-socmint-reverse-search-and-digital-profiling) 27 * [Multidimensional Intelligence](#multidimensional-intelligence) 28 * [Enhanced Geolocation](#enhanced-geolocation) 29 * [Improved Digital Profiling](#improved-digital-profiling) 30 * [OPSEC Assessment](#opsec-assessment) 31 * [Real-World Applications](#real-world-applications) 32 33 6. [10 Practical Use Cases](#10-practical-use-cases) 34 7. [Best Practices & Cautions](#best-practices--cautions) 35 8. [References](#References) 36 37 --- 38 39 40 ## Reconnaissance Framework 41 42 <p align="center"> 43 <img alt="IMINT (Imagery Intelligence)" src="../img/png/graphs/Recon.png" width="300" height="auto" /> 44 </p> 45 46 --- 47 48 # Reverse Search (Google) 49 50 Reverse image search tools like **Google Image Search** and **Google Lens** enable you to use images instead of text to find related information online. 51 52 ### How to Use Reverse Image Search 53 54 #### On Mobile 55 - Open the Google app or go to google.com. 56 - Tap the **Google Lens** icon (camera). 57 - Take a photo or upload one from your device. 58 - Adjust the focus area if needed and view results. 59 60 #### On Desktop 61 - Visit google.com or images.google.com. 62 - Click the **camera icon** (Google Lens). 63 - Upload an image, paste an image URL, or drag and drop. 64 - View results showing visually similar images and related pages. 65 66 ### What You Can Use It For 67 - **Find an article:** Locate the original article or similar ones using screenshots or photos.[^9] 68 - **Identify device name or type:** Identify brands and models of devices (e.g., Samsung, Pixel, Apple). 69 - **Find brand, restaurant, or location:** Recognize logos, storefronts, food items, or landmarks.[^9] 70 71 ### What You Cannot Do 72 - **Reverse search people:** Not designed for facial recognition or identifying individuals. 73 - If you wanted to reverse search people, please use this tool for [facecheck.id](https://github.com/vin3110/facecheck.id-results-extractor).[^13][^14][^15] 74 75 ### Extra Tips 76 - On mobile browsers, request the desktop site for full features. 77 - Long-press images in Chrome mobile and select “Search Image with Google.” 78 - Don't just rely on google image search, you may have to manually deduce an image (is this really a iphone or samsung) 79 80 --- 81 82 # GEOINT (Geographical Intelligence) 83 84 What is GEOINT?[^1] 85 86 Geospatial Intelligence is the analysis and visual representation of security related activities on the earth. It is produced through an integration of imagery, imagery intelligence, and geospatial information. 87 88 # IMINT (Imagery Intelligence) 89 90 ### Definition 91 IMINT—Imagery Intelligence[^1] includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. Imagery can be derived from visual photography, radar sensors, and electro-optics. NGA is the manager for all imagery intelligence activities, both classified and unclassified, within the government, including requirements, collection, processing, exploitation, dissemination, archiving, and retrieval.[^1] 92 93 ### Who Uses IMINT? 94 - **Civilians:** Disaster tracking, social media verification, urban planning (unclassified).[^12] 95 - **Law Enforcement:** Surveillance, crime investigation, missing persons search (classified).[^1] 96 97 ### SOCMINT (Social Intelligence) 98 99 SOCMINT[^4][^2] refers to collecting and analyzing digital data about social relationships and networks, primarily through metadata, social media activity, and geolocation data. It focuses on: 100 101 - **Social Networks:** Mapping social dynamics and connections. 102 - **Data Sources:** Social platforms (Facebook, Instagram, LinkedIn), communications metadata, location info. 103 - **Analytical Depth:** Large-scale data and algorithms reveal patterns beyond traditional human or signals intelligence. 104 105 > See also [Digital Profiling](Digital-Profiling.md), which closely relates to SOCMINT. 106 107 ### Using Public Images with Maps 108 Cross-referencing public images with mapping **GEOINT** tools like Google Maps or Street View can: 109 - Verify locations 110 - Track events or individuals 111 - Investigate crimes or fraud 112 - Identify vehicles, buildings, or terrain 113 114 ### Ten Practical Applications 115 - Confirm social media post locations 116 - Investigate crime scenes or accidents 117 - Verify travel photo authenticity 118 - Locate missing persons 119 - Detect unauthorized construction 120 - Map protest activities 121 - Validate disaster imagery 122 - Identify specific objects or vehicles 123 - Enhance geographic data with user-contributed imagery 124 125 ### Ethical and Legal Considerations 126 Use IMINT responsibly, respecting privacy and laws, especially with personally identifiable or sensitive information. 127 128 --- 129 130 # Combining IMINT, SOCMINT, Reverse Search and Digital Profiling 131 132 Combining visual intelligence (IMINT) with social data (SOCMINT) and digital profiling significantly enhances investigative depth and accuracy. 133 134 ### Multidimensional Intelligence 135 - IMINT provides visual context (locations, layouts, environmental changes).[^7][^8] 136 - SOCMINT and digital profiling supply social and behavioral data from online footprints.[^7][^8] 137 - Google Reverse search can identify landmarks, devices and brands.[^10][^9] 138 - Together, these reveal identities, timelines, and interactions in a holistic manner. 139 140 ### Enhanced Geolocation 141 - Identify landmarks in images via IMINT.[^7][^8] 142 - Cross-reference with social data and OSINT tools to connect locations with people or events.[^7][^8] 143 144 ### Improved Digital Profiling 145 - Analyze social media[^3] images with IMINT location verification.[^7][^8] 146 - Use Google reverse search to figure out a device and a users ecosystem (android, apple, mac) and to find landmarks or brands (a restaurant, a landmark, et al).[^10][^9][^8] 147 - Layer data from emails, usernames, and phone lookups to build comprehensive profiles.[^11] 148 149 ### OPSEC Assessment 150 - Use IMINT to assess physical security vulnerabilities (entry points, cameras).[^7][^8][^16] 151 - Use OSINT to identify digital exposure (breached credentials, leaked emails). 152 - This combined view uncovers physical and cyber vulnerabilities. 153 154 ### Real-World Applications 155 - Missing persons searches combining photo and location data.[^5] 156 - Crime scene analysis with visual and digital evidence[^6]. 157 - Event verification by matching social media and satellite data[^7][^8]. 158 159 --- 160 161 # 10 Practical Use Cases 162 163 1. Locate residences by matching social media photos with maps and verifying identities. 164 2. Track suspect movements using geotagged images and breached data. 165 3. Verify viral news images with satellite imagery and digital footprints. 166 4. Identify OPSEC failures from location-revealing social posts. 167 5. Monitor illegal construction using satellite imagery and public records. 168 6. Support disaster response by mapping affected areas and finding contacts. 169 7. Detect fraud by matching online listing photos with real locations. 170 8. Analyze protest sites via crowd photos and satellite images. 171 9. Investigate cyberstalking by tracing images to locations and accounts. 172 10. Assess facility security combining IMINT layout and breached credential checks. 173 174 --- 175 176 # Best Practices & Cautions 177 178 - Respect privacy laws and ethical guidelines. 179 - Verify findings through multiple sources. 180 - Protect your own digital footprint and OPSEC during investigations. 181 182 --- 183 184 back to the readme [main OPSEC-OSINT-Tools repository](../README.md). 185 186 ## References: 187 188 [^1]: Office of the Director of National Intelligence. “Intelligence Community.” Office of the Director of National Intelligence, www.odni.gov/index.php/ncsc-what-we-do/121-dni/intelligence-community. Accessed 25 Nov. 2025. (Office of the Director of National Intelligence, sec.Types of Intelligence) 189 190 [^2]: “Social Media Intelligence Best Practices.” Rochester Institute of Technology, 2023-10_CPSI, Rochester Institute of Technology, Oct. 2023, www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files/docs/CRIM%20Resources/2023-10_CPSI%20Working%20Paper_Social%20Media%20Intelligence%20Best%20Practices.pdf. 191 192 [^3]: Kraakevik, Jeff. “Crafting a positive professional digital profile to augment your practice.” Neurology. Clinical practice vol. 6,1 (2016): 87-93. doi:10.1212/CPJ.0000000000000211 193 194 [^4]: “HC3: Analyst Note.” U.S Department of Health and Human Services, 202208091700, Washington D.C., United States of America, Health and Human Services, 9 Aug. 2022, http://web.archive.org/web/20230617000751/https://www.hhs.gov/sites/default/files/osint-how-to-analyst-note-tlpwhite.pdf. 195 196 [^5]: Mathieu Gaucheler. “How OSINT Helps Find Missing Persons.” Maltego, 2 May 2025, www.maltego.com/blog/how-osint-helps-find-missing-persons. 197 198 [^6]: Tracey L. Johnson, Basia E. Lopez, Jonathan McGrath, Caleb D. Hudgins, Meaghan L. Pimsler, and Veronica White, "Introducing the NIJ Forensic Intelligence Framework: Pillars and Guiding Principles for Successful Implementation," National Institute of Justice, NCJ 309128, November 2024. 199 200 [^7]: “The Time 4Chan Called in an Airstrike.” Youtube, uploaded by Pezle, 17 Aug. 2023, www.youtube.com/watch?v=OR6epSP_Xlw. 201 202 [^8]: Lamoureux, Mack, and Mack Lamoureux. “How 4Chan’s Worst Trolls Pulled off the Heist of the Century.” VICE, 27 July 2024, www.vice.com/en/article/4chan-does-first-good-thing-pulls-off-the-heist-of-the-century1. 203 204 [^9]: Postma, Foeke. “Using New Tech to Investigate Old Photographs - Bellingcat.” Bellingcat, 9 Aug. 2022, www.bellingcat.com/resources/2022/08/09/using-new-tech-to-investigate-old-photographs. 205 206 [^10]: Toler, Aric. “Guide to Using Reverse Image Search for Investigations - Bellingcat.” Bellingcat, 27 Dec. 2019, www.bellingcat.com/resources/how-tos/2019/12/26/guide-to-using-reverse-image-search-for-investigations. 207 208 [^11]: Jain, Shefali. “10 Best Background Check Sites In 2022.” United States Department Of Labor, 6 Jan. 2022, www.dol.gov/sites/dolgov/files/ETA/advisories/TEIN/2000/youth.htm. 209 210 [^12]: “IC21: The Intelligence Community in the 21st Century.” U.S. Government Publishing Office, www.govinfo.gov/content/pkg/GPO-IC21/html/GPO-IC21-6.html. Accessed 25 Sept. 2025. 211 212 [^13]: Creps, Jake. “The OSINT Newsletter - Issue #45.” The OSINT Newsletter, 4 Mar. 2024, https://osintnewsletter.com/p/45 213 214 [^14]: Creps, Jake. “The OSINT Newsletter - August 2023 OSINT Review.” The OSINT Newsletter, 14 Aug. 2023, https://osintnewsletter.com/p/the-osint-newsletter-august-2023. 215 216 [^15]: Creps, Jake. “The OSINT Newsletter - April 2023 OSINT Review.” The OSINT Newsletter, 15 Apr. 2023, https://osintnewsletter.com/p/april-osint-2023. 217 218 [^16]: Szuba, Tom, et al. “Chapter 5-Protecting Your System: Physical Security.” The Institute of Education Sciences, The Institute of Education Sciences, 1998, pp. 55–62. https://nces.ed.gov/pubs98/safetech/chapter5.asp.