FAQs
Have a question about OSINT, executive risk, or our services? We’ve answered some of the most common client questions here.
What is Open Source Intelligence (OSINT)?
Open Source Intelligence (OSINT) is the collection and analysis of publicly available information to generate actionable insights. This includes social media, news, court records, websites, corporate filings, and deep/dark web content. Unlike hacking or intrusive surveillance, OSINT is fully legal and ethical.
How does OSINT support cybersecurity?
OSINT can uncover exposed personal data, employee vulnerabilities, and leaked credentials that cybercriminals exploit to launch social engineering, spearphishing, impersonation, SIM swapping, and credential harvesting attacks. By identifying these exposures early, we help clients reduce their overall cyber risk.
Can OSINT help prevent other types of attacks beyond cyber threats?
Yes. OSINT plays a critical role in identifying risks beyond just digital intrusions. Our investigations can surface early warning signs of physical threats, insider risks, and targeted harassment by analyzing online chatter, social media behavior, and deep/dark web forums. This includes detecting doxxing attempts, pre-operational surveillance, threats to executives or events, and behavioral indicators of insider compromise. By flagging these exposures early, we help clients proactively harden both their physical and organizational security posture.
What’s included in a Digital Profile Review?
A Digital Profile Review assesses how much personal or sensitive information about a specific individual is available online. We flag details that could enable phishing, impersonation, stalking, or harassment—and provide actionable steps to reduce the attack surface.
How do you vet candidates or partners?
Our due diligence reviews use OSINT to surface undisclosed affiliations, reputational issues, adverse media, online behavior concerns, or signs of insider threat risk. We customize reports based on your role (e.g. executive hire, vendor, founder, investor) and risk tolerance.
How is your service different from automated monitoring tools?
Unlike automated tools, our analysts use investigative techniques and judgment to validate findings, connect the dots, and provide context. Every report is tailored, actionable, and aligned to your priorities—not a generic data dump.
Is your work legal and ethical?
Absolutely. We operate strictly within legal and ethical boundaries, collecting only from sources that are publicly available or legally accessible. We do not engage in hacking, intrusive surveillance, or deception-based access.
Who typically uses your services?
Our clients include corporations, law firms, family offices, private security teams, high-net-worth individuals, and compliance or HR departments. We work closely with executive protection teams, CISOs, and general counsel to support broader security strategies.
How quickly can you deliver a report?
Turnaround time depends on the type and complexity of the report. For example, Potential Employee OSINT Reviews can be completed in as little as two business days, while more in-depth Digital Profile Reviews may take up to 10 business days. Expedited services are available for urgent requests. For clients on a monitoring plan, we deliver ongoing alerts and summaries on a scheduled basis.
Can we request a sample report or speak with someone?
Yes—please contact us to request a sample report, set up a discovery call, or discuss a specific use case. We're happy to walk you through how we can support your risk management strategy.