Skip to main content
Synced from an Obsidian vault

For graph and advanced features, download the full Intel Codex Vault and open it in Obsidian.

Entity Dossier Template

Purpose: Comprehensive entity profiling for OSINT investigations. This template provides a structured framework for documenting persons, organizations, digital assets, domains, or cryptocurrency wallets.


1. Entity Overview

Basic Information

FieldValue
Full Name/Designation[Legal name, handle, or identifier]
Entity TypePerson / Organization / Domain / Wallet / Asset
Primary Identifier[Email, phone, domain, address, wallet ID]
Country/Region[Geographic location]
Risk LevelLow / Medium / High / Critical
Confidence LevelLow / Medium / High
StatusActive / Inactive / Suspended / Under Investigation

Aliases & Alternative Identifiers

**Known Aliases:**
- Alias 1 (platform: Twitter, confirmed: 2024-05-10)
- Alias 2 (platform: Telegram, confirmed: 2024-06-15)
- Alias 3 (context: Dark web forum, confidence: medium)

**Usernames:**
- @username1 (Twitter, Instagram, GitHub)
- username2 (Reddit, Discord)
- handle_xyz (Telegram, Signal)

**Email Addresses:**
- primary@example.com (confirmed via WHOIS 2024-01-10)
- secondary@domain.com (found in data breach, confidence: high)
- alias@tempmail.com (possible burner, confidence: low)

**Phone Numbers:**
- +1-555-123-4567 (confirmed via Signal, 2024-03-15)
- +44-20-1234-5678 (linked via LinkedIn, confidence: medium)

**Cryptocurrency Wallets:**
- BTC: bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh
- ETH: 0x742d35Cc6634C0532925a3b844Bc9e7595f0bEb
- Monero: 4AdUndXHHZ6cfufTMvppY6JwXNouMBzSkbLYfpAV5Usx...

**Domains Owned:**
- example.com (WHOIS: 2020-05-10, registrar: Namecheap)
- example.net (WHOIS: 2021-08-20, privacy protection enabled)
- suspicious-site.tk (Free TLD, created: 2024-09-01)

Visual Identifiers

**Profile Photos:**
- Photo 1: SHA256: a1b2c3d4e5f6... (source: Twitter, date: 2024-01-15)
- PimEyes match: 85% confidence
- Google Image Search: 3 matches (LinkedIn, Facebook, company website)
- Photo 2: SHA256: b2c3d4e5f6... (source: Instagram, date: 2024-06-20)
- Location metadata: 51.5074° N, 0.1278° W (London, UK)
- Reverse image search: No additional matches

**Identifying Markers:**
- Tattoo on left forearm (visible in Instagram post, 2024-07-10)
- Distinctive vehicle: Red Tesla Model 3, plate: ABC-1234 (seen in background, 2024-08-05)

2. Profile Summary

Activity Overview

**Primary Activities:**
- Cryptocurrency trading (confirmed via blockchain analysis)
- Software development (GitHub contributions, 200+ repos)
- Social media influencer (Twitter: 50k followers, engagement rate: 3.5%)

**Timeline Highlights:**

| Date | Event | Source | Significance |
|------|-------|--------|--------------|
| 2020-05-10 | Registered example.com | WHOIS | First known online presence |
| 2022-03-15 | First BTC transaction | Blockchain | Started crypto activity |
| 2023-07-20 | Appeared in data breach | HIBP | Email exposed in XYZ breach |
| 2024-01-10 | Twitter account suspended | Twitter | Violated ToS, appealed successfully |
| 2024-09-01 | Large crypto transfer | Blockchain | $500k BTC → unknown wallet |

**Behavioral Patterns:**
- Active hours: 09:00-17:00 UTC (consistent with GMT timezone)
- Posting frequency: 5-10 tweets/day, peaks on weekdays
- Language: English (primary), occasional Spanish
- Topics: Crypto, privacy tech, geopolitics

Key Associates

**Known Associates:**

1. **John Doe (@johndoe)**
- Relationship: Business partner
- Evidence: Co-owns domain "partnership.com" (WHOIS)
- Last interaction: 2024-09-15 (Twitter mention)
- Risk level: Medium

2. **Jane Smith (@jsmith)**
- Relationship: Frequent contact
- Evidence: 50+ mutual Twitter interactions, Signal contact (leaked)
- Last interaction: 2024-10-01
- Risk level: Low

3. **Acme Corp**
- Relationship: Former employer
- Evidence: LinkedIn employment history (2018-2022)
- Confirmation: Company website lists entity in team page (archived 2020)
- Risk level: Low

**Social Graph Visualization:**
[Insert network diagram showing connections between entities]


Shared Infrastructure

WHOIS/DNS Pivots:

**Registrant Email Pivoting:**
- Email: admin@example.com found in WHOIS for:
- example.com (registered 2020-05-10)
- example.net (registered 2021-08-20)
- suspicious-domain.xyz (registered 2024-09-01)

**Name Server Pivoting:**
- ns1.example.com used by:
- example.com
- partnerdomain.com (linked to John Doe)
- client-site.org

**IP Address Pivoting:**
- 192.168.1.100 hosts:
- example.com
- example.net
- malicious-site.tk (⚠️ flagged by VirusTotal)

**Commands Used:**
```bash
# WHOIS reverse lookup
whois -H example.com | grep "Registrant Email"

# DNS enumeration
dig example.com ANY
host -t NS example.com

# Reverse IP lookup
curl -s "https://api.hackertarget.com/reverseiplookup/?q=192.168.1.100"

# Certificate transparency search
curl -s "https://crt.sh/?q=%25.example.com&output=json" | jq -r '.[].name_value' | sort -u

Tracking & Analytics Pivots

**Google Analytics Pivoting:**
- UA-123456789-1 found on:
- example.com
- partnerdomain.com
- affiliate-site.org

**Google AdSense Pivoting:**
- pub-9876543210123456 found on:
- example.com
- monetized-blog.net

**Favicon Hash Pivoting:**
- Favicon hash: -1234567890
- Shodan search: `http.favicon.hash:-1234567890`
- Results: 15 domains using identical favicon

**Commands Used:**
```bash
# Extract Google Analytics ID
curl -s https://example.com | grep -oP "UA-\d{4,10}-\d{1,4}"

# Extract AdSense ID
curl -s https://example.com | grep -oP "pub-\d{16}"

# Calculate favicon hash
curl -s https://example.com/favicon.ico | python3 -c 'import mmh3, sys; print(mmh3.hash(sys.stdin.buffer.read()))'

# Shodan search
shodan search "http.favicon.hash:-1234567890"

Social Media Cross-Referencing

**Platform Correlation:**

| Platform | Username | URL | Verified | Activity |
|----------|----------|-----|----------|----------|
| Twitter | @entity_name | https://twitter.com/entity_name || Active (last post: 2024-10-05) |
| Instagram | entity.name | https://instagram.com/entity.name || Active (last post: 2024-10-04) |
| LinkedIn | entity-name | https://linkedin.com/in/entity-name || Active (updated: 2024-09-15) |
| GitHub | entityname | https://github.com/entityname || Active (last commit: 2024-10-02) |
| Telegram | @entityname | t.me/entityname || Active (online 2 hours ago) |
| Reddit | u/entityname | https://reddit.com/user/entityname || Active (last comment: 2024-10-03) |

**Username Enumeration:**
```bash
# WhatsMyName (canonical username-enumeration ruleset; >600 sites)
# https://github.com/WebBreacher/WhatsMyName (web UI: whatsmyname.app)
python3 web_accounts_list_checker.py -u entity_name

# Maigret (WhatsMyName fork + parsing of returned profiles)
# https://github.com/soxoj/maigret
maigret entity_name --html

# Sherlock (legacy but still maintained)
# https://github.com/sherlock-project/sherlock
sherlock entity_name

# Nuclei OSINT templates (template tag `osint` exists, but is not a username-enumeration
# replacement for the above — use for surface-level recon only) [verify 2026-04-26]
nuclei -t http/osint/ -var user=entity_name

# Manual spot-check
# X (Twitter): https://x.com/entity_name
# Instagram: https://instagram.com/entity_name
# GitHub: https://github.com/entityname

Bio/Description Correlation:

  • Twitter bio: "Crypto enthusiast | Privacy advocate | Coffee lover"
  • Instagram bio: "☕ Crypto & Privacy | DM for collabs"
  • LinkedIn bio: "Cryptocurrency consultant specializing in privacy tech"
  • Common themes: Cryptocurrency, privacy, professional availability

Sanctions, Beneficial-Ownership & Corporate Registries

Run every named entity (person, company, wallet, vessel) against the canonical lists below before finalizing risk rating. For deeper financial-crime methodology see Financial / AML OSINT.

Sanctions screening:

SourceURLNotes
OFAC SDN + Consolidated (US)sanctionssearch.ofac.treas.govAuthoritative US Treasury list; CSV/XML downloads at home.treasury.gov/policy-issues/financial-sanctions/
EU Consolidated Financial Sanctionsdata.europa.eu/en/datasets/consolidated-list-of-persons-groups-and-entities-subject-to-eu-financial-sanctionsXML / CSV; mirrored by FSF
UK OFSI Consolidated Listgov.uk/government/publications/financial-sanctions-consolidated-list-of-targetsHM Treasury OFSI
UN Security Council Consolidatedun.org/securitycouncil/sanctions/un-sc-consolidated-listUN-1267, UN-1718, etc.
OpenSanctionsopensanctions.orgAggregated multi-jurisdiction sanctions + PEPs (FollowTheMoney schema)
AU DFAT / CA SEMA / CH SECOper-government portalsVerify URL at use time [verify 2026-04-26]

Beneficial-ownership / corporate registries:

SourceURLNotes
OpenCorporatesopencorporates.comLargest open-data corporate registry index
UK Companies House — People with Significant Control (PSC)find-and-update.company-information.service.gov.ukPublic; ID-verification phase-in under ECCT Act 2023 [verify 2026-04-26]
US FinCEN Beneficial Ownership Information (BOI)fincen.gov/boiScope materially narrowed by Treasury's March 2025 interim final rule to foreign reporting companies only — verify current state before relying on it [verify 2026-04-26]
EU UBO registers (5AMLD/6AMLD)per-member-state portalCJEU C-37/20 + C-601/20 (Nov 2022) invalidated unrestricted public access; most member states now require "legitimate interest" — document the access pathway used [verify 2026-04-26]
ICIJ OffshoreLeaksoffshoreleaks.icij.orgPanama / Paradise / Pandora / Pandora-2 / Cyprus / Bahamas leaks
OCCRP Alephaleph.occrp.orgInvestigative document + leak corpus search
Sayari Graph / Moody's Orbis (BvD) / LSEG World-CheckcommercialDocument use without endorsement

Threat-actor / cyber-TI dossier sources (when entity is an adversary group):

SourceURLNotes
MITRE ATT&CK Groupsattack.mitre.org/groups/Curated TTP-attribution dossiers
MISPmisp-project.orgThreat-sharing platform; community feeds
OpenCTI (Filigran / ANSSI)opencti.ioTI knowledge graph (STIX 2.1)
Mandiant Advantage / Recorded Future / CrowdStrike Falcon IntelligencecommercialDocument without endorsement
DFIR Report / Talos Intelligence (Cisco) / Unit 42 (Palo Alto)OSS write-upsUseful for incident-derived attribution

Sanctions hits are not a verdict — name collisions (esp. PEP-class lists) require corroborating identifiers (DOB, country of citizenship, primary identifier) before downgrading confidence to "match." Annotate every hit with the source list, list version/date, and confirming identifier(s).


4. Digital Footprint Analysis

Data Breach Exposure

**Confirmed Breaches (Have I Been Pwned):**
```bash
# Check email in breaches
curl -H "hibp-api-key: YOUR_API_KEY" \
"https://haveibeenpwned.com/api/v3/breachedaccount/entity@example.com"

# Results:
# - Adobe (2013): Email, password hash
# - LinkedIn (2021): Email, phone, job title
# - Collection #1 (2019): Email, plaintext password

Exposed Data:

  • Email: entity@example.com
  • Password: Summer2023! (plaintext in Collection #1)
  • Phone: +1-555-123-4567 (LinkedIn breach)
  • Date of birth: 1985-05-15 (estimated from LinkedIn education dates)

Cryptocurrency Activity

**Bitcoin Analysis:**
```bash
# Balance + tx history — blockchain.info endpoints still respond but are legacy;
# prefer mempool.space or Blockstream Esplora for modern, rate-limit-friendly access.
# (blockchain.com rebrand kept the blockchain.info JSON paths live — [verify 2026-04-26])
curl -s "https://blockchain.info/balance?active=bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh"
curl -s "https://blockchain.info/rawaddr/bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh" | jq '.txs'

# Modern equivalents (prefer for new dossiers):
curl -s "https://mempool.space/api/address/bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh"
curl -s "https://blockstream.info/api/address/bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh/txs"

# Cluster analysis — note: walletexplorer.com (Sam Rushing / formerly btc.com) is the
# legacy free clusterer; verify currency before citing in evidence. Modern alternatives:
# - mempool.space (open, on-chain only, no clustering)
# - oxt.me (closed/limited post-Samourai enforcement [verify 2026-04-26])
# - Chainalysis Reactor / TRM Labs / Elliptic / Crystal / GraphSense (commercial / OSS)
# Linked wallets: 5 addresses in same cluster
# Total balance across cluster: 15.3 BTC (illustrative — convert at audit time, not template time)

Key Transactions:

  • 2024-09-01: 10 BTC sent to 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa (Satoshi's wallet? likely error)
  • 2024-08-15: Received 5 BTC from Binance hot wallet
  • 2024-07-20: 2 BTC sent to unknown wallet (possible OTC trade)

Ethereum Analysis:

# Etherscan API
curl "https://api.etherscan.io/api?module=account&action=balance&address=0x742d35Cc6634C0532925a3b844Bc9e7595f0bEb&tag=latest&apikey=YourApiKeyToken"

# Token holdings
curl "https://api.etherscan.io/api?module=account&action=tokentx&address=0x742d35Cc6634C0532925a3b844Bc9e7595f0bEb&apikey=YourApiKeyToken"

Holdings:

  • ETH: 50.5 ETH (~$100,000 USD)
  • USDT: 25,000 USDT
  • USDC: 10,000 USDC
  • Other: 5 different ERC-20 tokens

Geolocation Intelligence

**Location Indicators:**

**IP Address History:**
- 192.168.1.100 → London, UK (ISP: BT Group, 2024-01-01 to 2024-06-15)
- 10.0.0.50 → Berlin, Germany (ISP: Deutsche Telekom, 2024-06-16 to present)

**Photo Metadata:**
```bash
# Extract EXIF data
exiftool image.jpg | grep -E "(GPS|Date|Camera)"

# Results:
# GPS Position: 51.5074° N, 0.1278° W (London, UK)
# Date Taken: 2024:07:15 14:30:22
# Camera: iPhone 13 Pro

Social Media Geotagging:

  • Instagram check-ins: London (15 posts), Berlin (8 posts), Dubai (3 posts)
  • Twitter location: "London, UK" (profile), frequent tweets geotagged "Berlin"

Timezone Analysis:

  • Posting times suggest GMT/CET timezone (09:00-17:00 UTC)
  • Consistent with London/Berlin location claims

5. Evidence & Exhibits

Artifact Repository

**File Evidence:**

| Filename | Hash (SHA256) | Source | Date | Description |
|----------|---------------|--------|------|-------------|
| profile_photo.jpg | a1b2c3d4e5f6... | Twitter | 2024-01-15 | Profile photo with EXIF data |
| screenshot_telegram.png | b2c3d4e5f6... | Telegram | 2024-09-10 | Conversation excerpt |
| website_archive.html | c3d4e5f6... | Archive.org | 2024-08-01 | Archived website snapshot |
| email_evidence.eml | d4e5f6... | Subpoena | 2024-10-01 | Email thread with associate |

**Evidence Storage:**
- Path: `/evidence/CASE-2025-1005/entity_name/`
- Backup: `/backup/CASE-2025-1005/entity_name/`
- Access: Restricted (analyst only)

**Hash Verification:**
```bash
# Verify evidence integrity
cd /evidence/CASE-2025-1005/entity_name/
sha256sum -c SHA256SUMS
# All files: OK

Screenshot Evidence

**Social Media Screenshots:**
1. Twitter post (2024-09-15)
- Content: "Just moved to Berlin! Loving the crypto scene here 🚀"
- Engagement: 150 likes, 30 retweets
- Hash: e5f6g7h8...

2. Instagram story (2024-10-01)
- Content: Photo at Berlin conference
- Visible: Conference badge with name visible
- Hash: f6g7h8i9...

3. LinkedIn update (2024-09-15)
- Content: Job title changed to "Crypto Consultant"
- Hash: g7h8i9j0...

OSINT Tool Outputs

**Tool Execution Records:**
```bash
# Nuclei output
nuclei -tags osint -var user=entity_name > evidence/nuclei_output.txt
# Found: 12 platforms

# theHarvester output
theHarvester -d example.com -b all > evidence/theharvester_output.txt
# Found: 15 emails, 10 hosts, 5 IPs

# Maltego transform results
# [Export Maltego graph as evidence/maltego_graph.mtgx]
# Entities found: 50+ linked nodes

6. Assessment & Analysis

Confidence Rating

Anchor frameworks: rate every claim against (a) the Berkeley Protocol on Digital Open Source Investigations §V — Information Verification (corroboration, source assessment, three-source rule) and (b) the NATO Admiralty Code (STANAG 2511 / AJP-2) 6×6 source-credibility × information-credibility matrix (A–F × 1–6). Use the Collection Log for evidentiary traceability and the Cone of Plausibility to bound analytic uncertainty on forward-looking claims.

**Overall Confidence: MEDIUM-HIGH**

| Information Type | Confidence | Justification |
|------------------|------------|---------------|
| Identity (name) | High | Multiple corroborating sources (LinkedIn, WHOIS, social media) |
| Location (current) | Medium | IP geolocation + social media posts, but VPN usage possible |
| Email addresses | High | Confirmed via WHOIS, data breaches, social media |
| Cryptocurrency wallets | High | Blockchain transactions verified, linked to known entities |
| Associates | Medium | Social media interactions observed, business relationships inferred |
| Intentions | Low | Speculative, requires further investigation |

**Confidence Modifiers:**
- ✅ Multiple independent sources confirm identity
- ✅ Blockchain evidence is immutable and verifiable
- ⚠️ Some aliases unconfirmed (only one sighting)
- ⚠️ VPN/proxy usage detected (IP reliability reduced)
- ❌ No official government records obtained

Risk Assessment

**Risk Level: MEDIUM**

**Risk Factors:**
- Cryptocurrency activity involving large sums ($500k+ movements)
- Association with entities on sanctions lists (TBD - requires verification)
- Past ToS violations on social media platforms
- Data breach exposure with plaintext passwords

**Mitigating Factors:**
- No criminal record found (public records search)
- Legitimate business presence (registered company, public profiles)
- Responsive to legal requests (per social media platform data)

**Threat Indicators:**
- None currently identified
- Monitor for: darknet presence, sanctioned entity contact, illegal fundraising

**Recommendation:**
- Continue monitoring cryptocurrency transactions
- Flag any contact with high-risk entities
- Escalate if transaction volume exceeds $1M in 30-day period

Intelligence Gaps

**Known Unknowns:**
- [ ] Government-issued ID verification (no passport/driver's license obtained)
- [ ] Physical address (residence unknown, only IP geolocation available)
- [ ] Employment status (LinkedIn shows "self-employed" but no verification)
- [ ] Source of funds for cryptocurrency investments
- [ ] Full list of cryptocurrency wallets (only 3 confirmed, likely more)
- [ ] Associates in jurisdiction X (geographic gap in intelligence)

**Collection Priorities:**
1. **High:** Obtain physical address via commercial data brokers
2. **High:** Map complete cryptocurrency wallet cluster
3. **Medium:** Verify employment claims via business registry
4. **Low:** Historical social media activity (pre-2020)

7. Operational Notes

OPSEC Considerations

Canonical guidance lives in OPSEC Plan — the example block below records the dossier-specific execution log, not the policy. Do not re-derive sock-puppet provisioning, network egress, or device-hardening doctrine here.

**Investigator OPSEC (per-dossier execution log):**
- ✅ All queries performed via VPN (exit node: Switzerland)
- ✅ Burner email used for service registrations (e.g. ProtonMail / SimpleLogin alias — pick per [OPSEC](../../Investigations/Techniques/sop-opsec-plan) §Identities)
- ✅ Browser fingerprinting protection enabled (Mullvad Browser, or Tor Browser for higher-risk pivots)
- ⚠️ Avoid direct contact with entity's social media (may alert target — LinkedIn especially: anonymous viewing requires Premium and is not perfectly opaque [verify 2026-04-26])
- ⚠️ Use passive OSINT only; no active probing of infrastructure

**Sensitive Actions Log:**
| Date | Action | Tool/Method | Alert Risk | Mitigation |
|------|--------|-------------|------------|------------|
| 2024-10-01 | LinkedIn profile view | Manual | Low | Used anonymous account |
| 2024-10-02 | WHOIS lookup | whois command | None | Passive query |
| 2024-10-03 | Shodan search | Shodan API | None | Passive database query |

Next Steps

**Immediate Actions:**
- [ ] Submit cryptocurrency wallets to blockchain analytics platform (Chainalysis)
- [ ] Cross-reference email addresses with additional breach databases
- [ ] Request historical WHOIS data via DomainTools
- [ ] Monitor social media accounts for new posts

**Follow-Up Tasks (7-day timeline):**
- [ ] Re-check data breach databases for new exposures
- [ ] Verify employment claims via LinkedIn Sales Navigator
- [ ] Attempt to identify additional cryptocurrency wallets via clustering
- [ ] Review archived website snapshots for historical data (Wayback Machine)

**Long-Term Monitoring:**
- [ ] Set up Google Alerts for entity name + aliases
- [ ] Configure social media monitoring (Hootsuite, X Pro [formerly TweetDeck — renamed Aug 2023, gated behind X Premium], Bluesky deck.blue, Mastodon Elk/Phanpy)
- [ ] Subscribe to blockchain transaction alerts (Whale Alert)
- [ ] Periodic review every 30 days

Jurisdictional framing (CFAA, CMA, EU Cybercrime Directive 2013/40/EU, GDPR Art. 6/9, DPA 2018, BIPA/CUBI, etc.) is canonical in Legal & Ethicsdo not re-derive here. Capture only the per-dossier authorization record below; flag minor-related, exploitation, or trafficking content per Sensitive-Crime Intake immediately and stop collection until escalation completes.

**Per-dossier authorization record:**
- Case ID: CASE-2025-1005-001
- Authorized by: [Legal Team / Supervisor Name]
- Authorization date: 2025-10-01
- Scope: Open-source intelligence only (no hacking, no illegal access)
- Expiration: 2025-12-31 (renewable)
- Lawful basis (GDPR Art. 6 / Art. 9 if special-category data): [select + cite]

**Data handling (align with [Collection Log](../../Investigations/Techniques/sop-collection-log) retention schedule):**
- Classification: CONFIDENTIAL
- Storage: Encrypted vault (AES-256-GCM or stronger; document KMS / passphrase custody)
- Access: Analyst + supervisor only (RBAC enforced)
- Retention: 7 years per policy (verify against jurisdictional limit)
- Disposal: Secure deletion after retention period (NIST SP 800-88 Rev. 1 sanitization)

**Operational boundaries (canonical list in [Legal & Ethics](../../Investigations/Techniques/sop-legal-ethics)):**
- ✅ Public records search (WHOIS / RDAP, social media, blockchain, court PACER, etc.)
- ✅ Data breach database queries (HIBP, Dehashed, IntelX — per licensing + jurisdiction)
- ✅ Commercial data brokers (within licensing terms; document the dataset version)
- ❌ Unauthorized access to private accounts
- ❌ Social engineering or pretexting
- ❌ Exploitation of vulnerabilities
- ❌ Scraping in violation of CFAA / CMA / GDPR Art. 6 lawful-basis tests (see [Legal & Ethics](../../Investigations/Techniques/sop-legal-ethics) §Scraping)

8. Appendix

Tools Used

Replace fictional version pins with --version invocations at audit time. Versions below are illustrative anchors [verify 2026-04-26].

ToolTypePurposeCommand / Link
WhatsMyNameCLI/WebUsername enumeration (canonical)whatsmyname.app / WebBreacher/WhatsMyName
MaigretCLIUsername enumeration + profile parsesoxoj/maigret
SherlockCLIUsername enumeration (legacy, active)sherlock-project/sherlock
Nuclei (v3.x)CLISurface-level OSINT templatesnuclei -t http/osint/
theHarvesterCLIEmail/domain OSINTtheHarvester -d domain.com -b all (current 4.x)
WHOIS / RDAPCLIDomain registration lookupwhois domain.com / openrdap / rdap.org
Shodan / Censys / FOFA / ZoomEyeWeb/CLIInternet-wide attributionshodan search ... (verify tier + active credits)
Have I Been PwnedAPIData breach check (v3 API key required)haveibeenpwned.com
Dehashed / IntelXWeb/APIBreach + leak corpus searchper licensing
mempool.space / Blockstream EsploraAPIBitcoin chain analysis (open)https://mempool.space/api/...
EtherscanAPIEthereum chain analysisetherscan.io
Chainalysis Reactor / TRM Labs / Elliptic / Crystal / GraphSenseCommercial / OSSWallet clustering & risk scoringper licensing
OpenSanctionsWeb/APISanctions + PEP aggregationopensanctions.org
OpenCorporatesWeb/APICorporate registry indexopencorporates.com
ICIJ OffshoreLeaks / OCCRP AlephWebInvestigative leak corpusoffshoreleaks.icij.org / aleph.occrp.org
ExifToolCLIMetadata extractionexiftool image.jpg
Maltego CEGUILink analysismaltego.com (Maltego Technology GmbH)
i2 Analyst's NotebookGUILink analysis (commercial)N. Harris Computer Corp acquired from IBM 2022 [verify 2026-04-26]
Neo4j Bloom / Linkurious / GephiGUI/OSSGraph relationship vizper vendor
Spiderfoot / Recon-ngCLIAutomated OSINT enumerationspiderfoot.net / lanmaster53/recon-ng

Common Pitfalls

  • Name-collision sanctions hits — common names produce false positives on PEP / SDN lists; require ≥1 corroborating identifier (DOB, country, primary identifier) before "match."
  • Stale alias confidence — "confirmed via Twitter 2024-05-10" doesn't survive a platform sale or account migration; re-verify before publishing.
  • Cluster claims without provenance — wallet-clustering output (Chainalysis, TRM, OXT) is an opinion of the analytics provider, not a chain-of-custody fact. Cite the provider + dataset version + run date.
  • Geolocation overconfidence — IP geo-lookups, EXIF, and check-ins are independently weak; Berkeley Protocol §V three-source rule applies.
  • VPN / Tor false negatives — counter-intel use of residential proxies and CGNAT collapses simple geo signals; flag rather than discard a contradicting datum.
  • Schema drift — if you rename a front-matter field (primary_id, risk, confidence), every downstream Case dossier inherits the break. Add new fields rather than rename.
  • C2PA / Content Credentials absence ≠ authenticity — see Image / Video OSINT §6 for synthetic-media verification limits before crediting profile photos.
  • LinkedIn anonymous-view leak — Premium "anonymous viewer" still surfaces region/industry on the target's "Who's Viewed Your Profile" panel [verify 2026-04-26]. Use a clean sock-puppet account per OPSEC.

Methodology & authorization:

OSINT collection feeders:

Evidence-side handoffs:

External / Reference Resources

Methodology:

  • Berkeley Protocol on Digital Open Source Investigations (UN OHCHR + UC Berkeley HRC, 2022) — canonical methodology, esp. §V Information Verification.
  • NATO STANAG 2511 / AJP-2 — Admiralty Code — A–F source-credibility × 1–6 information-credibility matrix.
  • Cone of Plausibility (Charles W. Taylor / UK MoD) — bounding analytic uncertainty on forward-looking claims.
  • NIST SP 800-88 Rev. 1 — media sanitization (used at retention-period disposal).
  • SWGDE / SWGIT Best Practices — digital-evidence forensic baseline.

Sanctions & beneficial ownership:

  • OFAC SDN / Consolidated — sanctionssearch.ofac.treas.gov
  • EU Consolidated Financial Sanctions — data.europa.eu (search "consolidated list ... financial sanctions")
  • UK OFSI Consolidated List — gov.uk/government/publications/financial-sanctions-consolidated-list-of-targets
  • UN Security Council Consolidated — un.org/securitycouncil/sanctions/un-sc-consolidated-list
  • OpenSanctions — opensanctions.org
  • OpenCorporates — opencorporates.com
  • ICIJ OffshoreLeaks — offshoreleaks.icij.org
  • OCCRP Aleph — aleph.occrp.org
  • UK PSC (Companies House) — find-and-update.company-information.service.gov.uk
  • US FinCEN BOI — fincen.gov/boi (scope narrowed by 2025 Treasury interim final rule [verify 2026-04-26])

Threat-actor / cyber-TI:

  • MITRE ATT&CK Groups — attack.mitre.org/groups/
  • MISP — misp-project.org
  • OpenCTI — opencti.io

Identity verification (jurisdictional, with consent):

  • eIDAS (EU), GOV.UK One Login (UK), India Aadhaar (jurisdictional), US REAL ID (full enforcement May 7 2025 [verify 2026-04-26])
  • KYC vendors: Onfido, Jumio, Trulioo, Persona (document without endorsement)

Case References

  • Case file: Cases/<YYYY-NNN-Brief-Description>/ (per CLAUDE.md naming)
  • Evidence repository: Cases/<YYYY-NNN-Brief-Description>/Evidence/<entity_name>/
  • Worked example: Example Investigation
  • Template: Case Template

Canonical text lives in Legal & Ethics. Dossier-specific reminders:

  • Lawful basis required. GDPR Art. 6 (and Art. 9 for special-category data: biometric/health/political/religion/sexuality/criminal-conviction). Document the basis on the dossier front matter or in §7 authorization record.
  • Profiling restrictions. GDPR Art. 22 limits decisions made solely on automated profiling — flag if downstream consumers will use the dossier in automated decisioning.
  • Cross-border transfer. If the dossier subject is in the EU/EEA/UK and the receiving analyst is not, document the transfer mechanism (SCCs, adequacy decision, derogation).
  • Sensitive-crime triggers. If collection surfaces CSAM, trafficking, imminent-harm threats, or terrorism content, stop and escalate per Sensitive-Crime Intake. Do not download, hash, or screenshot until escalation completes.
  • Defamation surface. Risk-rating language ("Critical", "High") is adversarial-context-only; avoid it in client-facing summaries unless evidence supports the claim under the relevant jurisdiction's defamation standard.
  • Subject-access / GDPR Art. 15. Investigated subjects can request their data; prepare for SAR handling in the retention plan.

Analyst: gl0bal01 Date Created: 2025-10-05 Last Updated: 2026-04-26 Review Cycle: Yearly (slow-rot anchor SOP per CLAUDE.md watchlist)