
Open Source / Publicly Available Information can be divided into six categories:
- Media
- Internet
- Public Government Data
- Professional and Academic Publications
- Commercial Data
- Grey literature

Crypto currency is a digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a digital ledger or blockchain using strong cryptography to secure transaction record entries, and to verify the transfer of coin ownership.
Cryptocurrencies typically use a decentralized system based upon math, as opposed to central bank-like systems.

Social media intelligence (SOCMINT) includes collecting information from social media sites, using multiple means, from open and closed social networks.
Research has shown that various social media platforms on the Internet such as Twitter and Tumblr (micro-blogging websites); Facebook (a popular social networking website); YouTube (the largest video sharing and hosting website); Blogs and discussion forums are being misused by multiple types of bad actors for various purposes.

The dark web is the Internet content that exists on darknets or overlay networks that use the Internet but require specific software, configurations, or authorization to access. The dark web forms a small part of the deep web. The deep web is the part of the Internet which is not indexed by search engines (like Google). Sometimes the term deep web is mistakenly used to refer specifically to the dark web.
The various darknets which constitute the dark web include small, friend-to-friend or peer-to-peer networks, as well as the larger / more popular networks such as Tor, Freenet, I2P, and IPFS which are operated by both organizations and individuals.
https://diff.cryptothis.com/
https://slushpool.com/home/
https://www.coinbase.com/
https://localbitcoins.com/
According to the 2020 Cyber Threat Intelligence Report 85% of cyber threat intelligence professionals have received little or no training for online investigative tasks. The survey results reveal that most practitioners lack training, tools and internal oversight. Highlights from the report include:
- 34% of respondents didn’t have any prior experience with OSINT-related research
- 85% reported they received little or no training in OSINT techniques and risk prevention from their current employer
- 55% are venturing into the Dark Web as part of their OSINT activity 10 or more times per month
- 38% do not use managed attribution tools to mask or hide their online identities or personas
- 29% report no oversight procedures to ensure that tools are not being abused by analysts
refers to the tools and solutions that allow organizations to respond to and convert social signals into meaningful trends and analysis
These bad actors are using these platforms for spreading their beliefs and ideologies, promoting radicalization, recruiting members and creating online virtual communities sharing a common agenda.
Social media intelligence (SOCMINT) includes collecting information from social media sites, using multiple means, from open and closed social networks.
Research has shown that various social media platforms on the Internet such as Twitter and Tumblr (micro-blogging websites); Facebook (a popular social networking website); YouTube (the largest video sharing and hosting website); Blogs and discussion forums are being misused by multiple types of bad actors for various purposes.