OSINT Research: The Devil’s in the Details

For those unfamiliar with the term OSINT Research, it is explained this way by Wikipedia

Open Source Intelligence (OSINT) is the collection and analysis of information that is gathered from public, or open, sources.[2] OSINT is primarily used in national securitylaw enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classifiedunclassified, or proprietary intelligence requirements across the previous intelligence disciplines.

OSINT sources can be divided up into six different categories of information flow

Open Source Intelligence

OSINT Resources Reveal the Details From the Deep Web

Many times our clients want to better understand the difference between a social media scan and a deep web scan. Taking a close look at the image above explains a lot and kind of surprises most people in terms of the data on the web that is openly available.

eChatter Case Study Examples of Deep Web Details

  • Recently, we were trying to find out whether a POI (person of interest) was married. He had no Facebook clues other than he was in a relationship. After conducting a deep web scan we found a local newspaper article in which he was named along with “his wife”. The wife chose to keep her maiden name.
  • A deep scan was ordered by a client to determine what happened to a deceased person’s body. We found an association letter that was published online indicating the person was cremated and buried at sea.
  • A client needed to know if their POI had any business affiliations that wasn’t disclosed in a divorce settlement. After a deep scan was conducted, we located quite a few businesses tied to the POI.

Does it always work out this way? Not at all. Mainly because some people are much better at hiding this than others or because they were advised to delete everything online by advice of counsel. However, these are the kind of details OSINT research is all about. You will not find this in a Google search.

A Private Investigator’s View of Social Media Intelligence

I am pleased to share with you our first guest blog post. It is written by Larry Forletta, owner of Forletta Investigative/ Security Consulting. As a former DEA agent, Larry Forletta has established many resources in the United States and abroad.

Social media investigations have changed the investigative landscape for private investigators.The forensics have been learned through a series of trial and error, utilizing some of the most popular social media platforms in order to gather essential evidence under the laws of collection. Those who work in this department are sometimes referred to as social media
vendors. However, not all social media forensics are the same and they certainly don’t produce the same results every time.

The effective use of social media has aided many investigations already. One investigation that comes to mind is an attempt to extort money from an individual involved with prostitution. By investigating through social media, the individual’s full identity (including name and base of
operations in the U.S.) was able to be identified. This investigative information was then provided to state authorities who were further able to identify the prostitution extortion individual.

It’s quite amazing what people continue to share on social media platforms. Despite the fact that there can be real consequences for what gets posted online, even if it might seem like fun and games, people continue to post sometimes incriminating and hard evidence that can be used against them. Americans spend more time using social media platforms than any other
internet activity, such as email. Most online evidence is compiled manually by an investigator who might screenshot or archive as needed. If something was sent or posted, perhaps even published, then it can be found and used accordingly.

Even when posts are deleted, they never really go away. Emails can be trashed, and accounts can be removed, yet the data and imprint of what has been put online may be able to be resurfaced with a little help. After all, a private investigator is only as good as their resources.

Our primary social media associate is eChatter, an online global source for social media researchers. They are spearheaded by their president, Kathy Doering, and specialize in a multitude of services including deep web searches and dark web searches. They are professional, communicative, and will get the answers that you need.

Cyber Crime: The Rise of Sextortion in Video Games & Chatrooms

Sexual predators will use any means available to lure innocent kids into doing what they want. The scary part is that they do their homework first. The FBI reported about a man recently, in his 40’s, who actually worked as a youth Pastor to learn how kids talked and interacted with each other. Next he created fake social media profiles to lure boys to take videos of themselves. He was caught and is now in jail.


Video games is another avenue with which predators attempt to communicate with kids and it is perhaps the most dangerous. The reason for this is because parents don’t always understand the nature of the video games their kids are playing. This puts them at a disadvantage and is one reason why the FBI started a school campaign on the dangers of talking to strangers online.

So, what resources are out there to help educate parents and educators help prevent this crime? One great resource we can recommend is Thorn.

Thorn was born in 2012 by Ashton Kutcher and Demi Moore. When they learned about sex trafficking in Cambodia, they started to dig deeper. Its then that they realized it was happening in the US as well.

Today, Thorn is thriving with a lot of wonderful partners and continued education and promotion.


Facebook has adopted Thorn, and created The Stop Sextortion Hub as an additional resource for people. On this site, Facebook offers a great selection of information.


Meet the staff at Thorn and reach out to them if you are interested in getting involved.


Our success is measured by how many children we’ve helped save, how many cases we’ve contributed to solving and how much harm we’ve prevented. Through focused and persistent effort, we can stop online child sexual abuse.”

From: About us on www.thorn.com

If you are wondering who is most vulnerable, read “Online Predators: What Every Parent Should Know” . Many times parents think that kids are in their room, in their home, playing video games and they are safe. However, there are warning signs parents need to know.

Resources You Need to Know
Chatrooms Community by Talk With Stranger is like a social network of strangers. Discuss topics, follow people, chat with people, make friends & share everything for free! We have 1000s of online users waiting to chat from every corner of the world.


Discord is a proprietary freeware VoIP application and digital distribution platform designed for video gaming communities, that specializes in text, image, video and audio communication between users in a chat channel. Discord runs on Windows, macOS, Android, iOS, Linux, and in web browsers.

If you are reading this blog, please share with parents and people who can make a difference. Education is key to stopping these predators.