Using Reverse Image in Your OSINT Research

When conducting OSINT research, don’t forget image searches, as they can reveal quite a bit. We have all heard the saying, ” A picture is worth a thousand words.” We understand its meaning and know it to be very true. However, when it comes to OSINT research, sometimes what is in the background of a picture is worth a million words!

A recent Netflix show comes to mind as I write this blog post. Have you seen The Tiger King yet? Some people can watch it, while others I have heard just can’t get through the series. At any rate, one thing I recall very well is how several social media posts worked in the favor of an investigation to find the fugitives who were on the run. The main character (who was on the run) and his husband posted many social media photos trying to make it look like they were in Mexico. Upon further attention, it was noticed that the background of the images made it very clear that they were indeed in Florida. Certain identifying clues led law enforcement to their exact location.

The more photos found when using OSINT research the better. Bing has an excellent built in option.

Bing’s Reverse Images

  1. Bing: Bing search engine has an image search that allows an upload of an image in the same way Google Image Search does. Below you will see what is produced when we uploaded the image on the left. All the images on the right are instantly populated.
Bing Reverse Image how to
Normal image search reveals a good amount of results.

If nothing comes up, try the cropping the image using the “visual search”. Let’s say we want to focus on one area of the image. The visual search allows you to crop the image in a way that may reveal different results.

Bing Visual Image as an additional search method.
Visual Image

You can see the difference between the two. This can be very helpful when you have a picture of someone in a public place. You may not be able to pinpoint exactly where they are. Using this Bing feature may produce more photos with an exact location.

Pinterest Image Search

  • Log into your Pinterest account.
  • Click on any pin in your home feed (or on any profile or board).
  • Click the icon in the bottom-right corner of the pinned image.
How Pinterest does search of photos
From Search Engine Journal

Simply click on the visual search icon, you can see everything else in Pinterest that is similar.

Instagram Has Over 95 Million Photos Uploaded Daily.

One of our recent blog posts discussed just how many photos are in the social media platform and how it can be used in investigation. In fact, we were recently able to help a client by identifying a person was at Walt Disney when they were trying to locate him to serve papers. It can be quite valuable!

Facial Recognition Apps

In the near future, facial recognition apps may be more readily available. Especially if companies like Clear AI has anything to say about it. An app that lets you identify anyone from a photo, and it is currently being used by law enforcement. Their mission, as stated on their website is:

Clearview AI is a new research tool used by law enforcement agencies to identify perpetrators and victims of crimes.

Clearview AI’s technology has helped law enforcement track down hundreds of at-large criminals, including pedophiles, terrorists and sex traffickers. It is also used to help exonerate the innocent and identify the victims of crimes including child sex abuse and financial fraud.

Using Clearview AI, law enforcement is able to catch the most dangerous criminals, solve the toughest cold cases and make communities safer, especially the most vulnerable among us.

What trick of the trade do you use?

Crime Never Sleeps- COVID-19 Online Schemes & Insurance Fraud

Sadly, in times of crisis, some people use it as an opportunity to make money. COVID-19 is not an exception to that rule, and the FBI is already seeing a rise of Coronavirus fraud schemes. The FBI is warning Americans to be especially careful during this pandemic hitting our country. Always check your sources when receiving an unusual email. Do not click any links that appear suspicious.

Insurance Fraud

As business owners and employees are starting to learn what is covered under insurance and what is not covered, panic is setting in. Couple the fact that many people are out of work for an infinite amount of time, desperation can set in. People begin to do things for money that they never would have under normal conditions. We found this to be true in the beginning of the Great Recession.

Insurance Fraud

According to to the FBI, “The total cost of insurance fraud (non-health insurance) is estimated to be more than $40 billion per year. That means Insurance Fraud costs the average U.S. family between $400 and $700 per year in the form of increased premiums.” This is something that affects all of us one way or another.

If past behaviors are an indicator, we know that we are most likely going to see a surge in insurance fraud. SIU Investigators are going to be overworked in the months ahead. A surge in slip and fall cases for example will occur. The claims are bound to pile up.

Online & Social Media Research

As a company who specializes in online research for fraud assessments, I can not emphasize enough how important it is to conduct your research as soon as possible. What is here today may be gone tomorrow . People will begin to clean up their social media posts.

social media
Facebook

If you think that Google and Facebook are all you need to check, you could run the risk of losing your client or employer a lot of money. When steaks are as high as this, a deep web search will serve you best. That is because people love to share online. They may leave crumbs that lead you to the exact place you need to be.

In conclusion, it is an excellent time to get in front of your insurance clients to let them know you are there and ready to go if and when we start seeing fraud increase over the next months.

If it Can Happen to Amazon, it Can Happen To You

Social Media: The Industry Disrupter

Social media continues to be a major business disrupter. For the last decade most companies and brands have been working like crazy to figure it all out. From social media marketing to social hiring reports. How does it all work?

Which platform should we use to market? What is the ROI? How can we keep track of our online reputation? The waters get murky when it comes to hiring employees and screening their social accounts. Yet, so many HR professionals continue to conduct unethical searches and find themselves in compromising situations. Should we screen employees social media prior to hiring? How is that different from the background checks were already conducting? 


Just last week it was reported that an Amazon employee was fired for reporting that her supervisor instructed her to “scour social media on applicants to determine race and gender. ” She did not feel this was the correct way to do this, and notified management. She was terminated. The ex-employee has since then filed a lawsuit against Amazon for wrongful termination among other things.

Many times we hear HR executives say that they do check social media on applicants and don’t give it too much thought as to the legality of it all. According to the Society for Human Resource Management (SHRM), HR execs recruit candidates for specific jobs using social media, up from 56 percent in 2011 and 34 percent in 2008. Using this as a recruitment strategy is different than using it to determine employment, however.

The Right Way to Conduct Social Media Background Checks

This varies from state to state, however for the most part be aware of the following red flags that are allowed under FCRA compliance:

Racist, Sexist, or Discriminatory Behavior
Sexually Explicit Material
Threats or Acts of Violence
Potentially Illegal Activity

Developing a social media policy for your company is a great first step. This way everyone is on the same page when it comes to remaining fair to all applicants.

Never ask for passwords.

Include this as part of your background check policy and clearly state it for all applicants to see and agree to.

Use an outside agency.

Reputation management and workplace safety are just two of the three top reasons companies seek out social media background checks.

At eChatter we use software that is FCRA compliant. Results generated by our staff are in line with federal and state specific laws. However, we don’t stop there. Avoid a PR nightmare by monitoring social media once employees are hired, to protect employees from toxic behavior in the workplace. What starts at the office, sometimes spills into social media and vise versa.

Human Resource Social Media Hiring Scan

OSINT Research: The Devil’s in the Details

For those unfamiliar with the term OSINT Research, it is explained this way by Wikipedia

Open Source Intelligence (OSINT) is the collection and analysis of information that is gathered from public, or open, sources.[2] OSINT is primarily used in national securitylaw enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classifiedunclassified, or proprietary intelligence requirements across the previous intelligence disciplines.

OSINT sources can be divided up into six different categories of information flow

Open Source Intelligence

OSINT Resources Reveal the Details From the Deep Web

Many times our clients want to better understand the difference between a social media scan and a deep web scan. Taking a close look at the image above explains a lot and kind of surprises most people in terms of the data on the web that is openly available.

eChatter Case Study Examples of Deep Web Details

  • Recently, we were trying to find out whether a POI (person of interest) was married. He had no Facebook clues other than he was in a relationship. After conducting a deep web scan we found a local newspaper article in which he was named along with “his wife”. The wife chose to keep her maiden name.
  • A deep scan was ordered by a client to determine what happened to a deceased person’s body. We found an association letter that was published online indicating the person was cremated and buried at sea.
  • A client needed to know if their POI had any business affiliations that wasn’t disclosed in a divorce settlement. After a deep scan was conducted, we located quite a few businesses tied to the POI.

Does it always work out this way? Not at all. Mainly because some people are much better at hiding this than others or because they were advised to delete everything online by advice of counsel. However, these are the kind of details OSINT research is all about. You will not find this in a Google search.

A Private Investigator’s View of Social Media Intelligence

I am pleased to share with you our first guest blog post. It is written by Larry Forletta, owner of Forletta Investigative/ Security Consulting. As a former DEA agent, Larry Forletta has established many resources in the United States and abroad.

Social media investigations have changed the investigative landscape for private investigators.The forensics have been learned through a series of trial and error, utilizing some of the most popular social media platforms in order to gather essential evidence under the laws of collection. Those who work in this department are sometimes referred to as social media
vendors. However, not all social media forensics are the same and they certainly don’t produce the same results every time.

The effective use of social media has aided many investigations already. One investigation that comes to mind is an attempt to extort money from an individual involved with prostitution. By investigating through social media, the individual’s full identity (including name and base of
operations in the U.S.) was able to be identified. This investigative information was then provided to state authorities who were further able to identify the prostitution extortion individual.

It’s quite amazing what people continue to share on social media platforms. Despite the fact that there can be real consequences for what gets posted online, even if it might seem like fun and games, people continue to post sometimes incriminating and hard evidence that can be used against them. Americans spend more time using social media platforms than any other
internet activity, such as email. Most online evidence is compiled manually by an investigator who might screenshot or archive as needed. If something was sent or posted, perhaps even published, then it can be found and used accordingly.

Even when posts are deleted, they never really go away. Emails can be trashed, and accounts can be removed, yet the data and imprint of what has been put online may be able to be resurfaced with a little help. After all, a private investigator is only as good as their resources.

Our primary social media associate is eChatter, an online global source for social media researchers. They are spearheaded by their president, Kathy Doering, and specialize in a multitude of services including deep web searches and dark web searches. They are professional, communicative, and will get the answers that you need.