📄️ OSINT Investigation Techniques
Advanced OSINT methods: social media intelligence, domain reconnaissance, geolocation, people search & comprehensive open-source investigation tactics.
📄️ OSINT Collection Log & Chain of Custody
Evidence documentation guide: SHA-256 hashing, chain of custody, metadata preservation & forensically sound collection for legal admissibility.
📄️ Entity Dossier Guide
Build comprehensive subject profiles: identity verification, digital footprint mapping, relationship analysis & intelligence dossier templates for OSINT.
📄️ Financial Crime & AML OSINT
Financial intelligence techniques: cryptocurrency tracing, sanctions screening, AML investigation & blockchain analysis for financial crime detection.
📄️ Image & Video OSINT
Visual intelligence techniques: EXIF analysis, reverse image search, geolocation, video verification & deepfake detection for media investigations.
📄️ Legal, Ethics & Data Governance for OSINT
Essential legal & ethical boundaries for OSINT: GDPR compliance, authorization requirements, privacy laws & responsible disclosure protocols.
📄️ OPSEC Planning for OSINT Investigations
Protect yourself during investigations: VPN setup, burner accounts, browser isolation & operational security best practices for safe OSINT work.
📄️ Reporting, Packaging & Disclosure
Professional OSINT reporting: executive summaries, evidence packaging, chain of custody, law enforcement disclosure & responsible reporting protocols.
📄️ Sensitive Crime Intake & Escalation
Critical incident protocols: CSAM reporting, violent threats, terrorism escalation & law enforcement referral procedures for sensitive investigations.
📄️ Web, DNS & WHOIS OSINT
Domain intelligence techniques: WHOIS lookups, DNS records, SSL certificates, subdomain enumeration & infrastructure mapping for web investigations.