Handling the Test Purchasing Process during OSINT Investigations

Investigators, working on behalf of law enforcement and private companies, monitor digital marketplaces to identify and remove IP infringements, stolen goods, or prohibited goods. Often, identifying an illicit good online is insufficient to support a prosecution. Determining if a good is illicit, legitimate, or fake, requires an investigator to see it…

Continue Reading

Intelligence Function Architecture: A Blueprint for Building and Scaling an Effective Intelligence Unit

Intelligence has been used throughout history to gain an advantage over adversaries.

Continue Reading

Enhancing Financial Crime Controls with OSINT

The United Nations Office on Drugs and Crime estimates that between 2-5% of the global GDP is laundered globally in one year, totaling $2 trillion US dollars. Financial institutions are bound by laws and regulations intended to stop criminals from disguising illegally obtained funds as legitimate income to combat this criminality.

Continue Reading

OSINT for Charities and Non-Profits

Non-profits and Charities can utilize OSINT to secure their people and organization and support investigations. Donation funded, charities and non-profits often have to rely on limited resources to conduct investigations and monitor threats. 

Continue Reading

Browser Extensions for OSINT Investigation

Browser Add-ons can be of great help to OSINT investigators in simplifying and automating tasks. We’ve collated a list of some of the browser add-ons that the Skopenow’s team uses most frequently during internet investigations. 

Continue Reading

Leveraging OSINT for Corporate Security

To successfully protect people and assets, corporations must contend with several crime types, including theft of property, money, and data, intellectual property breaches, fraud, and cyber-attacks.

Continue Reading

The Lego Method: An Investigator's Process for Enhancing OSINT

My bewildered colleague, who wanted to observe a digital investigation, struggled to comprehend my focus on the Facebook profile of a seemingly unimportant woman. I found her by reversing the phone number of a current tenant living where the subject allegedly resided. However, no obvious links between the two individuals existed: major age gap,…

Continue Reading

Google Dorks for OSINT Investigations

Dorking is a technique that uses advanced search operators within Google Search and other search engines to find information. Primarily used to locate security holes in the configuration and computer code within websites, Dorks can also provide investigators with opportunities to enhance intelligence gathering during OSINT investigations.

Continue Reading

Crime Scripts: Interpreting Criminal Decision-Making to Disrupt Crime

To prevent and disrupt crime and disorder at scale, investigators are increasingly utilizing scientific approaches. Problem-oriented policing (POP) is an approach that involves using analytics to identify and understand a specific problem and develop a tailored response.

Continue Reading

Cryptocurrencies: The Evolution of Criminal Funds

In the absence of effective regulation, the criminal use of cryptocurrency is accelerating. Whilst the scale of the criminal use of cryptocurrencies is difficult to determine, it was estimated to be roughly $14 billion worth of transactions in 2021. $14 billion represents only a small share of the overall cryptocurrency market, however, this figure…

Continue Reading


Popular Tags

see all

Follow Us