📄️ OSINT Investigation Techniques
Advanced OSINT methods: social media intelligence, domain reconnaissance, geolocation, people search & comprehensive open-source investigation tactics.
📄️ Blockchain Investigation
Multi-chain crypto-asset tracing methodology: address clustering, bridge read-flow tracing, sanctions integration, commercial and open-source analytics, and court-admissibility tradecraft for OSINT and investigative work.
📄️ OSINT Collection Log & Chain of Custody
Evidence documentation guide: SHA-256 hashing, chain of custody, metadata preservation & forensically sound collection for legal admissibility.
📄️ Darkweb Investigation
Darkweb OSINT methodology: Tor and I2P navigation, hidden-service discovery, marketplace observation, vendor PGP pivots, and ransomware leak-site tracking — open-source observation only.
📄️ Entity Dossier Guide
Build comprehensive subject profiles: identity verification, digital footprint mapping, relationship analysis & intelligence dossier templates for OSINT.
📄️ Financial Crime & AML OSINT
Financial intelligence techniques: cryptocurrency tracing, sanctions screening, AML investigation & blockchain analysis for financial crime detection.
📄️ Image & Video OSINT
Visual intelligence techniques: EXIF analysis, reverse image search, geolocation, video verification & deepfake detection for media investigations.
📄️ Legal, Ethics & Data Governance for OSINT
Essential legal & ethical boundaries for OSINT: GDPR/CPRA/state-privacy compliance, authorization, cross-border transfer, sensitive-data handling & responsible disclosure.
📄️ Mixer & Privacy-Pool Tracing
Mixer, CoinJoin, and privacy-pool de-obfuscation methodology: Tornado Cash on-chain heuristics, CoinJoin clustering attacks, cross-chain bridge laundering defeat, Monero / Zcash traceability research limits, and the regulatory event timeline for sanctions and prosecution work.
📄️ OPSEC Planning for OSINT Investigations
Protect yourself during investigations: VPN setup, burner accounts, browser isolation & operational security best practices for safe OSINT work.
📄️ Reporting, Packaging & Disclosure
Professional OSINT reporting: executive summaries, evidence packaging, chain of custody, law enforcement disclosure & responsible reporting protocols.
📄️ Sensitive Crime Intake & Escalation
Critical incident protocols: CSAM reporting, violent threats, terrorism escalation & law enforcement referral procedures for sensitive investigations.
📄️ Web, DNS & WHOIS OSINT
Domain intelligence techniques: WHOIS/RDAP lookups, DNS records, certificate transparency, subdomain enumeration, passive DNS & infrastructure mapping for web investigations.