At Du-Zel Consulting, we provide open source intelligence (OSINT) services designed to proactively identify and mitigate cyber, physical, and reputational threats. From digital footprint audits to high-stakes due diligence, we help protect what matters most.

Our Services

At Du-Zel Consulting, we provide open source intelligence (OSINT) services designed to proactively identify and mitigate cyber, physical, and reputational threats. From digital footprint audits to high-stakes due diligence, we help protect what matters most.

  • Executive and Personnel Digital protection

    We specialize in safeguarding high-risk individuals - executives, board members, entrepreneurs, high-net-worth clients, and public figures- from online exposure and targeted threat activity.

    Digital Profile Review: Detailed audits of personal and professional online footprint, including personally identifiable information, social media, and deep and dark web searches. We provide a detailed report identifying vulnerabilities threat actors could use against the individual or corporation for attacks such as doxxing, spearphishing, impersonation, and in person. The report also includes tailored security recommendations.

    Ongoing Threat Monitoring: Subscription-based surveillance for emerging threats across open web, social media, and dark web against a company or individual.

    Travel Intelligence Reports: Location-based security briefs and digital monitoring for threats before and during high-risk travel.

    Personally Identifiable Information (PII) Monitoring and Suppression: Regular scans for sensitive PII online and manual removal requests where applicable.

  • Due Diligence & Corporate Risk Intelligence

    We uncover hidden risks and connections using publicly available data—essential for making informed business and hiring decisions.

    Potential Employee OSINT Reviews: Identify potential insider threats or reputational red flags before you onboard. A succinct report highlighting any concerning online behavior, including competitor ties, illicit activity, online harassment, or other behavior that could raise concern from a brand safety, cultural fit, or compliance perspective.

    Vendor & Partner Due Diligence: Before entering into partnerships, investments, or long-term contracts, conduct OSINT-based due diligence to understand reputational, financial, and compliance risks.

    M&A and Investment Target Profiling: Deep research on acquisition targets or founders, including regulatory, financial, and reputational red flags.

    Litigation & Legal OSINT Support: Opposing party profiling, jury research, and issue-specific intelligence to support legal teams.

  • Corporate Security

    We provide proactive intelligence to identify potential threats, understand online discourse about your organization, and respond before issues escalate.

    Real-Time Threat Monitoring: Ongoing online surveillance for brand impersonation, executive targeting, or specific threat actors.

    Pre-event guest list review: Review of guest lists for security threats, reputational risks, or competitor ties.

    Threat Landscape Assessments: An overall assessment of threats facing your specific business and industry, including specific cyberattack concerns, adversary concerns, environmental factors, and more.

    Social Media & Dark Web Research: Investigate online personas and underground forums relevant to your risk profile.

  • Threat Intelligence & Investigations

    We track, identify, and assess the individuals or groups behind digital threats using open source tradecraft—no malware or hacking required.

    Adversary Attribution Investigations: Identify anonymous threat actors, including social media trolls or cyber harassment sources. Assessment of real and credible threats and motivation.

    Social media investigations: We provide anonymous social media investigations into online actors to meet a client’s needs.

    Open source intelligence analysis: We provide actionable intelligence based on a client’s specific need.

  • Exposure Protection Package for Small Businesses

    We help small businesses, entrepreneurs, and founder-led companies reduce the risk of being targeted through impersonation, phishing, social engineering, and publicly available information exposure. This program is designed for businesses that rely heavily on online visibility, trust-based communication, and public-facing identities but may not have dedicated internal security resources. With different package levels, we’ve put cybersecurity within reach of small businesses.

    Digital Exposure Audits

    Structured assessments of a business owner’s and company’s publicly visible digital footprint, including social media, search engine exposure, contact information, business identity exposure, and impersonation risks. We provide a detailed report identifying how threat actors could leverage publicly available information for phishing, business email compromise, impersonation, fraud, or physical targeting, along with tailored exposure reduction recommendations.

    Exposure Maps & Risk Recommendations

    Exposure mapping and risk analysis illustrating how personal, business, and publicly available information connects across platforms and can be used to identify, profile, or target a business or individual. Includes prioritized recommendations to reduce visibility, impersonation opportunities, and social engineering risk.

    Ongoing Threat & Scam Intelligence Updates

    Quarterly intelligence updates focused on emerging scams, phishing tactics, impersonation schemes, and fraud trends actively targeting small businesses and entrepreneurs. Includes practical security guidance and educational materials designed to help businesses recognize and avoid common attack methods.

    Impersonation & Identity Misuse Monitoring

    Monitoring for fake profiles, impersonation attempts, unauthorized use of business branding, and identity misuse across public online platforms. Designed to identify indicators of fraudulent activity or targeting before they escalate.

    Personally Identifiable Information (PII) Monitoring & Suppression

    Regular reviews for exposed sensitive information, including phone numbers, addresses, email addresses, and other personally identifiable information across public and data broker platforms, with manual suppression requests where applicable.