OSINT Research: The Devil’s in the Details

For those unfamiliar with the term OSINT Research, it is explained this way by Wikipedia

Open Source Intelligence (OSINT) is the collection and analysis of information that is gathered from public, or open, sources.[2] OSINT is primarily used in national securitylaw enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classifiedunclassified, or proprietary intelligence requirements across the previous intelligence disciplines.

OSINT sources can be divided up into six different categories of information flow

Open Source Intelligence

OSINT Resources Reveal the Details From the Deep Web

Many times our clients want to better understand the difference between a social media scan and a deep web scan. Taking a close look at the image above explains a lot and kind of surprises most people in terms of the data on the web that is openly available.

eChatter Case Study Examples of Deep Web Details

  • Recently, we were trying to find out whether a POI (person of interest) was married. He had no Facebook clues other than he was in a relationship. After conducting a deep web scan we found a local newspaper article in which he was named along with “his wife”. The wife chose to keep her maiden name.
  • A deep scan was ordered by a client to determine what happened to a deceased person’s body. We found an association letter that was published online indicating the person was cremated and buried at sea.
  • A client needed to know if their POI had any business affiliations that wasn’t disclosed in a divorce settlement. After a deep scan was conducted, we located quite a few businesses tied to the POI.

Does it always work out this way? Not at all. Mainly because some people are much better at hiding this than others or because they were advised to delete everything online by advice of counsel. However, these are the kind of details OSINT research is all about. You will not find this in a Google search.

Wait…Where Did That Social Media Post Go?

What happened to that social media post you saw yesterday during your recent online investigation? Are you kicking yourself that you did not capture that post when you saw it? It can happen and very often does. The old adage, what is here today, is gone tomorrow, is something that happens all of the time, especially in social media. It may suddenly be changed from “public” to “private” at any point. The user’s entire profile can be deleted at any time. Where will that leave you and your investigation?

Largent V. Reed

Back in 2011 this was not an issue as social media was just starting to grow. In a personal injury lawsuit, Largent v. Reed, the plaintiff claimed that a recent accident had left her with severe physical and mental pain. During the trial, defendants presented her post-accident photos posted to her Facebook profile. These photos revealed the plaintiff was clearly feeling well enough to engage in her daily activities and exercising at her gym on a regular basis.

Fast forward to 2020 and things have changed. People are more aware of what they post and use user names that are different than their real name. Let me give you a recent example. One of our clients requested a deep scan from us for a case that involved fraud. We conducted the scan and produced the report capturing the subject’s Facebook account. Scans include live URL’s as well as screen shots showcasing all publicly available data. Once given to the attorney, he had a question about one of the posts specifically. When attempting to click on the link within the profile post, he came to a dead end. We did capture a screenshot, which in most cases is sufficient for investigative purposes. However, time is critical when conducting this type of research. Looking a little more closely at one of the posts was no longer possible.

Web Preservation

Preserving digital data is something many attorneys are starting to take a serious look at and in some cases are requesting from their private investigators. Judges are getting stricter when it comes to allowing social media as evidence in court. Not all cases make it to court of course, but preserving social media may be that extra step that your clients may want you to take.

Social media posts can be altered quickly, often at the advice of opposing counsel. Be sure not to wait too long to capture the data you need and in some cases, be sure to preserve that data.

Cyber Crime: The Rise of Sextortion in Video Games & Chatrooms

Sexual predators will use any means available to lure innocent kids into doing what they want. The scary part is that they do their homework first. The FBI reported about a man recently, in his 40’s, who actually worked as a youth Pastor to learn how kids talked and interacted with each other. Next he created fake social media profiles to lure boys to take videos of themselves. He was caught and is now in jail.


Video games is another avenue with which predators attempt to communicate with kids and it is perhaps the most dangerous. The reason for this is because parents don’t always understand the nature of the video games their kids are playing. This puts them at a disadvantage and is one reason why the FBI started a school campaign on the dangers of talking to strangers online.

So, what resources are out there to help educate parents and educators help prevent this crime? One great resource we can recommend is Thorn.

Thorn was born in 2012 by Ashton Kutcher and Demi Moore. When they learned about sex trafficking in Cambodia, they started to dig deeper. Its then that they realized it was happening in the US as well.

Today, Thorn is thriving with a lot of wonderful partners and continued education and promotion.


Facebook has adopted Thorn, and created The Stop Sextortion Hub as an additional resource for people. On this site, Facebook offers a great selection of information.


Meet the staff at Thorn and reach out to them if you are interested in getting involved.


Our success is measured by how many children we’ve helped save, how many cases we’ve contributed to solving and how much harm we’ve prevented. Through focused and persistent effort, we can stop online child sexual abuse.”

From: About us on www.thorn.com

If you are wondering who is most vulnerable, read “Online Predators: What Every Parent Should Know” . Many times parents think that kids are in their room, in their home, playing video games and they are safe. However, there are warning signs parents need to know.

Resources You Need to Know
Chatrooms Community by Talk With Stranger is like a social network of strangers. Discuss topics, follow people, chat with people, make friends & share everything for free! We have 1000s of online users waiting to chat from every corner of the world.


Discord is a proprietary freeware VoIP application and digital distribution platform designed for video gaming communities, that specializes in text, image, video and audio communication between users in a chat channel. Discord runs on Windows, macOS, Android, iOS, Linux, and in web browsers.

If you are reading this blog, please share with parents and people who can make a difference. Education is key to stopping these predators.