Open Source Network Tools for Investigations 

What is Open Source Intelligence (OSINT)?

Open Source Intelligence (OSINT) is defined as data and information that is collected legally from open and publicly available resources. Obtaining the information doesn’t require any type of secretive method and is retrieved in a manner that is legal and meets copyright requirements.

 The Internet has all the information readily available for anyone to access. Collection of information using these tools are referred to as open source intelligence. Information can be in various forms like audio, video, image, text, file etc. A few of the data categories available on the internet include:

  1. Social media websites like Twitter, Facebook, Instagram, etc.
  2. Public facing web servers: Websites that hold information about various users and organizations.
  3. Mass media (e.g. newspapers, TV, radio, magazines and websites)
  4. Code repositories: Software and code repositories like Codechef, Github hold a lot of information but we only see what we are searching for.
  5. Public records databases
  6. Government reports, documents and websites
  7. Maps and commercial imagery
  8. Photos and videos
  9. The dark web

Who Engages in Open Source Intelligence gathering and analysis?

Anyone who knows how to use the tools and techniques to access the information is said to have used the process. However, the majority is used formally by the United States intelligence community, the military, law enforcement, IT security professionals, private businesses and private investigators.

Gathering the information manually can eat up a lot of time, but now there are tools that can help collect the data from hundreds of sites in minutes, easing this phase. Let’s say, for example, you want to identify whether a username is present and if so, on which/all social media websites. One way is to log in to all the social media websites (and there are more than you know!) and test the username. Another way is to use an open source tool that is connected to various websites and check the usernames presence on all the websites at once. This is done just in seconds using OSINT.

List of Open Source Intelligence Tools

The tools and techniques used in Open Source Intelligence searching go much further than a simple Google search. Following is a list of helpful, time-saving open source intelligence tools. Note: most are free, although some have advanced features available for a fee.

Email Breach Lookup – Have I Been Pawned

This site allows you to find out if a particular email address was affected by one of the many data breaches that have occurred over the years

Fact Checking Websites – Hoaxy, Media Bugs, PolitiFact, SciCheck, Snopes, Verification Junkie

Hacking and Threat Assessment – Norse

OSINT Image Search – Current Location, Image Identification Project, TinEye

Public Records (Property) – Melissa Data Property Viewer, Emporis Building Search

Sites like Zillow, Trulia, Realtor.com, etc. are always useful and should be a part of your investigative toolbox. But the two mentioned above provide various twists on property records searching and are definitely worth checking out.

OSINT Search EnginesGoogle Correlate, Google Search Operator Guide, Million Short, Shodan, TalkWalkerAlerts

OSINT Social Media Search ToolsFacebook Search Tools, TweetBeaver

OSINT Tool WebsitesIntelTechniques

SoftwareHunchly, Maltego, SearchCode

Surveillance CamerasEarth Cam, Insecam

Username CheckCheckUserNames, Knowem.com, Namech_k

Virus ScannerVirusTotal

Website Analysis – BuiltWith.com

The main benefit of OSINT is how the technology can help us in our day to day tasks. With all that information freely available multiple actors can accomplish various tasks. A security professional can use the information for data protection, security testing, incident handling, threat detection, etc. A threat actor, on the other hand, can gain information to perform phishing attacks, targeted information gathering, DDOS attacks and much more. The key is to select the right tools and techniques. Since this is all free, users can make their decision regarding how best to access the information they need.

#MeToo Allegations on the Rise in Corporate USA

“People are recognizing the impact — and this is the #MeToo movement — of harassment on people, and how it can impact their careers for years.”
Victoria Lipnic, acting chair, U.S. Equal Employment Opportunity Commission

According to the EEOC (Equal Employment Opportunity Commission) the data shows a sharp increase in sexual harassment cases in 2018 by as much as 12%.

Based on preliminary data, in FY 2018:

The EEOC filed 66 harassment lawsuits, including 41 that included allegations of sexual harassment. That reflects more than a 50 percent increase in suits challenging sexual harassment over fiscal year 2017.
In addition, charges filed with the EEOC alleging sexual harassment increased by more than 12 percent from fiscal year 2017.
Overall, the EEOC recovered nearly $70 million for the victims of sexual harassment through litigation and administrative enforcement in FY 2018, up from $47.5 million in FY 2017.

More and more companies are being advised to begin a reputation management program within their organization to precede potential threats to their executives and employees.

When Is It Illegal to Fire an Employee over Social Media Posts?

Here are some examples of when an employee’s social media posts should not result in firing, even if it may seem warranted otherwise:

When the post is protected in some way. The most prominent example that some employers overlook or get wrong: Employees should not be fired when their social media post could be considered “concerted activity” and could, therefore, be protected activity under the National Labor Relations Act (NLRA). Concerted activity includes discussing working environment among coworkers—even in a negative way in public. Employers can get into trouble when they’re too restrictive in their social media policies—over broad restrictions or repercussions can go against an employee’s NLRA rights.


When there are specific rules that must be followed before a termination (and those are not followed). For example, there may be contractual stipulations with the employee’s union that outline steps that must be taken before any termination. If those steps aren’t followed, the termination may be illegal—even if it would have been fine otherwise.


When the social media post represents some other protected activity, like whistle-blowing, or protected reporting of something else, such as discrimination or harassment.


When the employer/employee are in a state that has other protections. Some states do not allow employers to fire employees for conduct outside of work, as long as the activities themselves are legal. This means that it would be much more difficult for an employer in one of these places to fire someone for conduct it finds distasteful that is still nonetheless legal. Some places also have protections in place for political speech.

*Source: HR Daily Advisor

There is no better time than right now to begin a corporate monitoring program and to be very aware of what is being said about your company and your employees online. A PR social media nightmare can happen in a millisecond and repercussions can last for years.

Are Background Checks Failing Us?

All one has to do these days is turn on the local news to hear about another teacher, coach or employee being accused of a crime of either drugs or child sexual abuse. If you are like me, the first question you think of is, “Don’t they do background checks?” What we are starting to find out, is yes they do. The problem is with the way in which the background checks are being done and by whom.

Let’s start with the basics and the must haves. The FCRA, or the Fair Credit Reporting Act, was passed in 1970 to ensure regulations of the collection of credit information. Additionally, The Equal Employment Opportunity Commission   governs how this is to be done:

 In all cases, make sure that you’re treating everyone equally. It’s illegal to check the background of applicants and employees when that decision is based on a person’s race, national origin, color, sex, religion, disability, genetic information (including family medical history), or age (40 or older). For example, asking only people of a certain race about their financial histories or criminal records is evidence of discrimination.

Where the problem lies, in may cases, is with the actual agencies in which background companies receive their information. They may not be updated regularly enough. That in and of itself is a problem. But the list goes on…

background checks

You may be surprised to learn the following flaws:

  1. The FBI offers a National Criminal Information Center which is great, as long as the crime was reported to the FBI. Beginning in 1967, it is  dependent on records that have been provided by criminal justice agencies. It operates under a shared management concept between the FBI and federal, state, local and tribal criminal justice users.
  2. Many times education is not checked out thoroughly which can be very detrimental down the road. This includes professional licenses.
  3. They often don’t utilize the information from paid data bases.
  4. Social Media is rarely included. I don’t mean the prospective employee gives up passwords.  That should not ever be done in my opinion, however much can be gleaned by conducting a deep web investigation, without that information. A social media background check may reveal quite a lot about the character of the individual. Many HR execs are looking anyway, however hiring an agency is the safest way to go. A best practice is to never review your candidates’ social media profiles internally. This is beneficial because an agency’s review and social media report respect your candidate’s privacy and alleviates your employees from reviewing content that could lead to accusations of discrimination or violations of freedoms.