OSINT Research: The Devil’s in the Details

For those unfamiliar with the term OSINT Research, it is explained this way by Wikipedia

Open Source Intelligence (OSINT) is the collection and analysis of information that is gathered from public, or open, sources.[2] OSINT is primarily used in national securitylaw enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classifiedunclassified, or proprietary intelligence requirements across the previous intelligence disciplines.

OSINT sources can be divided up into six different categories of information flow

Open Source Intelligence

OSINT Resources Reveal the Details From the Deep Web

Many times our clients want to better understand the difference between a social media scan and a deep web scan. Taking a close look at the image above explains a lot and kind of surprises most people in terms of the data on the web that is openly available.

eChatter Case Study Examples of Deep Web Details

  • Recently, we were trying to find out whether a POI (person of interest) was married. He had no Facebook clues other than he was in a relationship. After conducting a deep web scan we found a local newspaper article in which he was named along with “his wife”. The wife chose to keep her maiden name.
  • A deep scan was ordered by a client to determine what happened to a deceased person’s body. We found an association letter that was published online indicating the person was cremated and buried at sea.
  • A client needed to know if their POI had any business affiliations that wasn’t disclosed in a divorce settlement. After a deep scan was conducted, we located quite a few businesses tied to the POI.

Does it always work out this way? Not at all. Mainly because some people are much better at hiding this than others or because they were advised to delete everything online by advice of counsel. However, these are the kind of details OSINT research is all about. You will not find this in a Google search.

A Private Investigator’s View of Social Media Intelligence

I am pleased to share with you our first guest blog post. It is written by Larry Forletta, owner of Forletta Investigative/ Security Consulting. As a former DEA agent, Larry Forletta has established many resources in the United States and abroad.

Social media investigations have changed the investigative landscape for private investigators.The forensics have been learned through a series of trial and error, utilizing some of the most popular social media platforms in order to gather essential evidence under the laws of collection. Those who work in this department are sometimes referred to as social media
vendors. However, not all social media forensics are the same and they certainly don’t produce the same results every time.

The effective use of social media has aided many investigations already. One investigation that comes to mind is an attempt to extort money from an individual involved with prostitution. By investigating through social media, the individual’s full identity (including name and base of
operations in the U.S.) was able to be identified. This investigative information was then provided to state authorities who were further able to identify the prostitution extortion individual.

It’s quite amazing what people continue to share on social media platforms. Despite the fact that there can be real consequences for what gets posted online, even if it might seem like fun and games, people continue to post sometimes incriminating and hard evidence that can be used against them. Americans spend more time using social media platforms than any other
internet activity, such as email. Most online evidence is compiled manually by an investigator who might screenshot or archive as needed. If something was sent or posted, perhaps even published, then it can be found and used accordingly.

Even when posts are deleted, they never really go away. Emails can be trashed, and accounts can be removed, yet the data and imprint of what has been put online may be able to be resurfaced with a little help. After all, a private investigator is only as good as their resources.

Our primary social media associate is eChatter, an online global source for social media researchers. They are spearheaded by their president, Kathy Doering, and specialize in a multitude of services including deep web searches and dark web searches. They are professional, communicative, and will get the answers that you need.

Every Picture Tells a Story

How to Use it in Your Next Investigation

More than 95 million photos are uploaded to Instagram every day,(as of November 2019). People love to look at pictures in social media and they love to share them. Most Instagram photos are uploaded in the moment of experience, right from a mobile phone. This can be very telling when conducting an investigation around a missing person, a criminal, or even someone who you are trying to serve papers to. Paying attention to the details of the photo is especially helpful. Who are they with? What is in the background? Can you tell what the weather is like?

As an added feature, Instagram stories was launched in 2016 and allows users to upload photos and short videos that will disappear in 24 hours. Yes, like the social platform, SnapChat. Timing is everything and that is where continual monitoring of a site comes in handy.

Not only can Instagram be helpful in your online research, it is also a great place to promote your business. For now, let’s dig in deeper in this overlooked platform for the investigation world.

Starting with the name one chooses when creating a profile, users are encouraged to use any combination of numbers, capital letters, lowercase letters and underscores. Usernames cannot exceed 20 characters. So, as you can see knowing your POI’s full name may not be of help unless they use it publicly in their profile. A good rule of thumb is that most people reuse their usernames. Chances are if you know one, you will uncover other platforms with the same username in your search.

There are even username generators online that help new users create an username that “gets them noticed”. Spin xo is just one of many sites.

Spin XO

As you can see, finding a POI’s user name can be a challenge. Once you do some digging, and you find the profile, the following searching sites can be used to make digging in easier:

  1. https://picpanzee.com/
  2. https://www.piwox.com/
  3. https://www.searchmy.bio/

As with every other social media account, marketing dollars are a high priority. In order to get that revenue, the site must show ROI., which includes how may people engage. There are many tools to use for this purpose.

Don’t forget to check Instagram!

Wait…Where Did That Social Media Post Go?

What happened to that social media post you saw yesterday during your recent online investigation? Are you kicking yourself that you did not capture that post when you saw it? It can happen and very often does. The old adage, what is here today, is gone tomorrow, is something that happens all of the time, especially in social media. It may suddenly be changed from “public” to “private” at any point. The user’s entire profile can be deleted at any time. Where will that leave you and your investigation?

Largent V. Reed

Back in 2011 this was not an issue as social media was just starting to grow. In a personal injury lawsuit, Largent v. Reed, the plaintiff claimed that a recent accident had left her with severe physical and mental pain. During the trial, defendants presented her post-accident photos posted to her Facebook profile. These photos revealed the plaintiff was clearly feeling well enough to engage in her daily activities and exercising at her gym on a regular basis.

Fast forward to 2020 and things have changed. People are more aware of what they post and use user names that are different than their real name. Let me give you a recent example. One of our clients requested a deep scan from us for a case that involved fraud. We conducted the scan and produced the report capturing the subject’s Facebook account. Scans include live URL’s as well as screen shots showcasing all publicly available data. Once given to the attorney, he had a question about one of the posts specifically. When attempting to click on the link within the profile post, he came to a dead end. We did capture a screenshot, which in most cases is sufficient for investigative purposes. However, time is critical when conducting this type of research. Looking a little more closely at one of the posts was no longer possible.

Web Preservation

Preserving digital data is something many attorneys are starting to take a serious look at and in some cases are requesting from their private investigators. Judges are getting stricter when it comes to allowing social media as evidence in court. Not all cases make it to court of course, but preserving social media may be that extra step that your clients may want you to take.

Social media posts can be altered quickly, often at the advice of opposing counsel. Be sure not to wait too long to capture the data you need and in some cases, be sure to preserve that data.

Cyber Crime: The Rise of Sextortion in Video Games & Chatrooms

Sexual predators will use any means available to lure innocent kids into doing what they want. The scary part is that they do their homework first. The FBI reported about a man recently, in his 40’s, who actually worked as a youth Pastor to learn how kids talked and interacted with each other. Next he created fake social media profiles to lure boys to take videos of themselves. He was caught and is now in jail.


Video games is another avenue with which predators attempt to communicate with kids and it is perhaps the most dangerous. The reason for this is because parents don’t always understand the nature of the video games their kids are playing. This puts them at a disadvantage and is one reason why the FBI started a school campaign on the dangers of talking to strangers online.

So, what resources are out there to help educate parents and educators help prevent this crime? One great resource we can recommend is Thorn.

Thorn was born in 2012 by Ashton Kutcher and Demi Moore. When they learned about sex trafficking in Cambodia, they started to dig deeper. Its then that they realized it was happening in the US as well.

Today, Thorn is thriving with a lot of wonderful partners and continued education and promotion.


Facebook has adopted Thorn, and created The Stop Sextortion Hub as an additional resource for people. On this site, Facebook offers a great selection of information.


Meet the staff at Thorn and reach out to them if you are interested in getting involved.


Our success is measured by how many children we’ve helped save, how many cases we’ve contributed to solving and how much harm we’ve prevented. Through focused and persistent effort, we can stop online child sexual abuse.”

From: About us on www.thorn.com

If you are wondering who is most vulnerable, read “Online Predators: What Every Parent Should Know” . Many times parents think that kids are in their room, in their home, playing video games and they are safe. However, there are warning signs parents need to know.

Resources You Need to Know
Chatrooms Community by Talk With Stranger is like a social network of strangers. Discuss topics, follow people, chat with people, make friends & share everything for free! We have 1000s of online users waiting to chat from every corner of the world.


Discord is a proprietary freeware VoIP application and digital distribution platform designed for video gaming communities, that specializes in text, image, video and audio communication between users in a chat channel. Discord runs on Windows, macOS, Android, iOS, Linux, and in web browsers.

If you are reading this blog, please share with parents and people who can make a difference. Education is key to stopping these predators.