Vetting a Stranger with OSINT | RDCTD Tradecraft The tradecraft guide on accurately vetting a target individual using only open-source data, as per covert operatives when operating without special database access and without hacking any systems.

LINER TRADECRAFT

When you know where someone lives online, you know where they live in real life – mentally, emotionally, operationally.

Before an direct interaction, surveillance run, or recruitment pitch, an operative must know exactly who they’re dealing with. The process of vetting a human target often starts without access to classified databases or tech-enabled collection. It begins with OSINT: Open Source Intelligence.

Using only publicly available data, an operative can uncover a target’s identity, routines, affiliations, and potential vulnerabilities with surprising depth and speed. This guide outlines how to conduct a fast, accurate, and discreet OSINT-based assessment of a person, the way it’s done in the field – quietly, efficiently, and without ever tipping your hand.

LINER TRADECRAFT

LINER TRADECRAFT

        I.   SET YOUR OBJECTIVE

Before you start pulling data or running queries, define your operational intent. Intelligence gathering without a clear objective is just digital wandering – and in the field, wasted time can mean lost opportunities or blown cover.

Ask yourself: Why am I vetting this target? Every decision downstream; what platforms you look at, how deep you dig, which patterns you prioritize – should support that core purpose. A clear objective keeps your collection focused and efficient, and in covert work, precision matters more than volume.

LINER TRADECRAFT

• Are you trying to verify identity?

• Map out their network?

• Gauge vulnerabilities?

• Understand patterns of life?

LINER TRADECRAFT

Once you’ve defined your goal, match the level of detail you need to the time you’re willing to invest. A low-risk background check for short-term interaction might only require identity verification and surface-level behavioral analysis.

But if you’re assessing a potential asset for recruitment, you’ll need a full psychological profile, social network mapping, and a working understanding of their motivations, fears, and routines. More investment means more insight, but also more risk of leaving digital footprints if you’re careless.

LINER TRADECRAFT

LINER TRADECRAFT

        II.   BASELINE ID COLLECTION

The initial sweep sets the foundation for your entire profile. At this stage, your goal isn’t to dive deep – it’s to establish a verified baseline: Who is this person, and what’s the surface-level data telling you?

You’re identifying key identifiers that you can pivot off later; name variants, known addresses, education history, social media handles, and any publicly accessible professional or personal affiliations. This is also where you confirm that the person is real and not a manufactured identity or digital ghost. Without a reliable baseline, everything that follows is built on sand.

LINER TRADECRAFT

[Start With Knowns]


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER

Use these in combination, not isolation. A name alone is worthless. A name + city + photo gives you traction.

LINER TRADECRAFT

[Primary Tools]


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER

Start with Google. Use operators like:

“John A. Smith” +“San Diego” +“Deloitte” – site:linkedin.com

LINER TRADECRAFT

You’re filtering noise and hunting for connective tissue. Social media handles, obscure mentions in newsletters, PDFs, alumni lists. The point of this phase isn’t to get everything – it’s to confirm you’re looking at the right person and build a stable launchpad for deeper investigation.

Once you’ve got a handful of verified data points that cross-reference cleanly across multiple platforms, you’re ready to dig in without chasing ghosts or wasting time on dead ends.

LINER TRADECRAFT

LINER TRADECRAFT

        III.   SOCIAL MEDIA EXPLOITATION

Social media is a goldmine for open-source collection. What once required surveillance teams, telephoto lenses, and hours of observation can now be done from a screen in is less than a day to under an hour.

Operatives leverage SOCMINT (Social Media Intelligence) not just to collect data, but to understand the target’s worldview, daily life, relationships, and personality. Social media reveals how a person wants to be perceived and, more importantly, what they overlook when curating that image. That gap is where the real intelligence lives.

Most people leak more through social media than they realize. Operatives exploit this constantly for pattern of life, political leanings, psychological profile, and most importantly – network mapping.

LINER TRADECRAFT

• Facebook (friends list, tagged photos, check-ins, comments)

• Instagram (travel, relationships, lifestyle)

• LinkedIn (education, work, connections)

• Twitter/X (ideologies, affiliations, tone)

• TikTok (psychographic insight, peer group)

LINER TRADECRAFT

If the profile’s locked down, check their associates. Friends and family are often careless and unintentionally reveal the very thing the target tried to hide.

Create burner social media accounts to gain access or blend in. Use believable cover: low follower count, casual content, aligned demographics.

Even with minimal output, social media can tell you more than a résumé. Patterns emerge in who the target engages with, what they ignore, how they react under stress, and which parts of their life they choose to amplify or hide.

It’s not about likes or hashtags – it’s about building a human profile rich in behavior, motivation, and exploitable routine. For an operative, SOCMINT isn’t background noise – it’s behavioral telemetry.

LINER TRADECRAFT

LINER TRADECRAFT

        IV.   GEOLOCATION AND CHRONOLOGY

Before you can predict a target’s behavior, you need to understand their movement. That means identifying where they live, where they go, and when they go there. Geolocation and timeline analysis form the backbone of pattern of life development, an essential phase of vetting.

It’s not just about catching someone at the right place and time; it’s about building operational foresight. A reliable pattern gives you windows of opportunity and reveals when they’re vulnerable, distracted, or isolated.

LINER TRADECRAFT

[Use]


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER

LINER TRADECRAFT

[You’re Looking to Answer]


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER

Example: A photo tagged “Havana Nights Salsa Club” posted every Friday at 9PM. That’s not just a hobby, it’s a predictability. Predictability is vulnerability.

LINER TRADECRAFT

Once you’ve assembled the who, where, and when, cross-reference everything. Overlay the data. Correlate timestamps with social posts, work schedules, traffic patterns, and even local events.

You’re not just building a timeline, you’re building a behavioral map. That map will tell you when not to follow, when to engage, or when to vanish. In covert operations, timing isn’t just a tactical advantage – it’s survival.

Understanding your target’s rhythm gives you control. And control is what keeps you one step ahead.

LINER TRADECRAFT

LINER TRADECRAFT

        V.   DIGITAL FOOTPRINT

Every target leaves a digital wake, most just don’t realize how wide or deep it is. While social media gives you the public-facing side of a person, their broader digital footprint tells you who they really are when they’re not performing.

Forums, old blog posts, online purchases, app use, data breaches, and even obscure mailing list archives can offer insight into a target’s true motivations, habits, and blind spots. This is where you start uncovering the pieces they didn’t intend for anyone to see. It’s not about quantity of information, it’s about the quality of what slips through the cracks.

LINER TRADECRAFT

[Search For]


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER

LINER TRADECRAFT

[Cached or Archived Sites]


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER

LINER TRADECRAFT

An old post deleted from a personal blog five years ago might tell you what no LinkedIn profile will: their ideological roots, their mentors, their insecurities.

This stage is where an operative often finds the decisive detail—the hidden addiction, the quiet financial struggle, the fake degree, the emotional trigger. It’s the part of the process where the target’s public mask starts to slip, and the real person emerges.

Always assume there’s more buried if you’re willing to dig. The objective isn’t to stalk, it’s to anticipate. And that anticipation is what separates surveillance from surprise.

LINER TRADECRAFT

LINER TRADECRAFT

        VI.   NETWORK MAPPING AND ASSOCIATION

Almost every single human target exists within a social and professional ecosystem, and understanding that network is as important as profiling the individual themselves. People are influenced, protected, and sometimes exposed by those around them.

Network mapping allows you to uncover gatekeepers, influencers, pressure points, and even potential liabilities within a target’s circle. Whether you’re prepping for an approach or assessing counterintelligence risk, understanding who they interact with—and how—is mission-critical.

LINER TRADECRAFT

[Draw it Out]


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER

LINER TRADECRAFT

It’s not about shame – it’s about leverage, motivations, and openings.

Don’t just collect names, analyze the nature of the relationships. Who do they trust? Who do they fear? Who could be turned? This analysis gives you insight into both opportunity and danger.

More often than not, your real asset or threat won’t be the target – it’ll be someone orbiting them. And if you do this right, you’ll see the whole chessboard before making your first move.

LINER TRADECRAFT

LINER TRADECRAFT

        VII.   BEHAVIORAL ANALYSIS

This is the final layer. Read the target’s writing style. Watch their video content. Study their interactions online. Before you meet a person, surveil them, or even mention their name, you need to understand what drives them.

Behavioral analysis is where raw data becomes actionable intelligence. It’s not just about what the target does, but how they do it and why. Tone, timing, and interaction patterns reveal the human beneath the surface.

For an operative, this insight can be more valuable than a full résumé. You’re not building a dossier, you’re decoding a personality. That difference matters when lives (and missions) depend on the outcome.

LINER TRADECRAFT

[Ask]


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER


REDACTED LOCKER

LINER TRADECRAFT

This is where operatives develop a psychological profile, crucial for recruitment or manipulation operations. Tools like CrystalKnows or Receptiviti can help, but manual observation is more reliable in covert work.

Any analyst can list out where a target works or who they follow online. But only an operative can understand how that target thinks, what motivates them, and how they’re likely to react under pressure.

That’s the human angle and once you understand that, you don’t just know your target. You own the terrain.

LINER TRADECRAFT

LINER TRADECRAFT

        VIII.   OPERATIONAL SECURITY

Before you gather a single data point, understand this: your collection is only as good as your ability to stay invisible while doing it. Every OSINT session leaves a footprint, and if you’re not deliberate about how you operate, you risk alerting the target, compromising the mission, or exposing your true identity.

Operational security (OPSEC) is not a side concern, it’s the foundation. Whether you’re working from a safehouse, a hotel room, or your personal setup, you need to approach every search with the same caution you’d use in hostile territory. Think like you’re being watched, because you might be.

LINER TRADECRAFT

[Rules]

• Use a clean machine (air-gapped preferred)

VPN always on, with rotating servers

• Never log into personal accounts during an OSINT session

• Use anonymous browsers (Tor, hardened Firefox)

• Avoid clicking directly on the target’s LinkedIn unless you’re using a spoofed profile

• Disable all geolocation, autofill, and browser history logging

LINER TRADECRAFT

Wrap your digital behavior in layers of misdirection. Even your choice of search engine, plugins, and keyboard layout can leak metadata. If you’re going to collect data on a target without triggering suspicion or making yourself traceable, your online presence must be as fictional as any alias.

OPSEC isn’t just about avoiding detection, it’s about protecting the broader operation, your alias, and your long game. One careless click can tip your hand and burn weeks of work.

LINER TRADECRAFT

LINER TRADECRAFT

There’s a point where OSINT hits diminishing returns. An experienced operative knows when they’ve gathered enough to form a working profile and make the next move – whether that’s surveillance, contact, or a deeper background dive using HUMINT or SIGINT channels.

Vetting a target isn’t about checking boxes. It’s about forming an operational picture of a human being – one you can anticipate, influence, or avoid. When done right, OSINT lets you do that quietly, legally, without breaking cover.

LINER TRADECRAFT

//   Every photo, post, and comment is a breadcrumb. The operative’s job is to follow them without leaving footprints of their own.

[INTEL : FBI Method of Profiling]
[INTEL : Reaching an Insulated Individual]
[OPTICS : Irvington, New York]