OSINT Blog
The Lego Method: An Investigator's Process for Enhancing OSINT
My bewildered colleague, who wanted to observe a digital investigation, struggled to comprehend my focus on the Facebook profile of a seemingly unimportant woman. I found her by reversing the phone number of a current tenant living where the subject allegedly resided. However, no obvious links between the two individuals existed: major age gap,…
Continue ReadingGoogle Dorks for OSINT Investigations
Dorking is a technique that uses advanced search operators within Google Search and other search engines to find information. Primarily used to locate security holes in the configuration and computer code within websites, Dorks can also provide investigators with opportunities to enhance intelligence gathering during OSINT investigations.
Continue ReadingCrime Scripts: Interpreting Criminal Decision-Making to Disrupt Crime
To prevent and disrupt crime and disorder at scale, investigators are increasingly utilizing scientific approaches. Problem-oriented policing (POP) is an approach that involves using analytics to identify and understand a specific problem and develop a tailored response.
Continue ReadingThe Intelligence Cycle: Generating OSINT from OSINF
The Intelligence Cycle is a structured process that outlines the steps involved in producing intelligence. Intelligence, most simply defined as information with added value, is the output of the intelligence cycle, where raw data and information flow into the process and emerge with value for the organization.
Continue ReadingBusiness Due Diligence: Understanding the Fake Agency Fraud Behind Madbird.
In 2020, the world went into lockdown. During this time, many people lost their jobs and many others began to work from home full-time. During this time, Madbird, a London-based digital design agency, hired roughly 50 remote employees worldwide for management, sales, and design positions. Job ads were posted internationally, promising sponsorship to…
Continue ReadingDigital Policing: Conducting Internet Investigations in an Increasingly Digitized World
Technology plays a significant and central part in almost everything humans do. By the end of 2021, the number of internet users worldwide stood at roughly 4.9 billion people, almost two-thirds of the global population. The majority of people using the internet have no links to criminality and the protection of their right to privacy has always been,…
Continue ReadingSource Code: Investigating Websites Beneath the Surface
Source code is the programming language behind any web page or piece of software. Source code lies beneath the surface of a web page and contains embedded text, images, and videos. Source code can provide valuable insights to an investigator, providing a plethora of information hidden from public view.
Continue ReadingConnecting the Dots: Social Network Analysis in Criminal Investigation
Investigators frequently need to establish if two or more individuals or businesses connected to an investigation are associated with one another in any way. Identifying an association may mean identifying if two people know one another or may involve identifying an array of links between a large group of people within an organized crime group.…
Continue ReadingExecutive Protection with OSINT
Executive protection refers to security and risk mitigation measures taken to guarantee the safety of individuals, particularly those exposed to elevated risk due to their employment, status, or net worth. Executive protection of VIPs previously involved hiring close protection specialists to provide physical security measures. However, in the modern…
Continue ReadingOSINTforGood: The Philanthropic Application of OSINT
Open Source Intelligence, commonly referred to as OSINT, is the collection, collation, and analysis of publicly available information. OSINT is a tradecraft developed in the national security sector that has now expanded through a range of sectors, including law enforcement, journalism, corporate security, academic research, and the legal sector.
Continue Reading