The law enforcement OSINT community applies open-source intelligence to crime prediction
, prevention, investigation, and prosecution, including terrorism. Search through social media and DarkNet plays a significant role in their work, and so does connection analysis. With the sheer volume of content traffic transiting across the internet through social media platforms, law enforcement would be remiss to ignore social media accounts as a resource for discovering evidence potentially relevant to a variety of criminal investigations.
Private corporate security services are also eager to apply OSINT tools. They conduct individual checks: their own employees, top-management, employees, executive officers and shareholders of their contractors. 'Know Your Customer' (KYC) mode is on here. Is this an off-shore company or not? Who is the real owner? Hasn`t it been into any dark business? Knowing this is crucial before execution of any major deal.
To check affiliation of individuals or entities - this is the main goal, as it is expressed usually. Economic security services monitor internal deals for hidden interest. For instance, if a procurement manager enters into transactions with entities belonging to his or her family members. Transaction services department runs check-ups before each merger or acquisition: whether a firm acquired is run by criminals. Thus, major companies endeavor to minimize reputational risks for the company, as for the shareholders. Each serious firm usually has its own list of reliable and non-advisable counter agents. In any case, management always has to know, who stands behind this or that entity.
Interesting cases of application of OSINT in insurance business have already come into our knowledge. They correlate to a company's personal data analysis, as so as to business analytics. A huge federal company notices that in one separate region payments for one separate insurance product have increased significantly.
Affiliation checks through social media of the company's region branch employees has shown that one of the managers had been insuring his or her friends and family in order to register insured accidents and payments afterwards. Such knowledge is still not an evidence of the person's guilt, but it sure is a matter for internal investigation.
HR departments employ OSINT for running check-ups of actual or possible employees of their companies. Do they post any negative data on the company in their social media? Or maybe they disclose confidential information? Sometimes it happens not out of malice but accidentally.
Some public organizations perform constant monitoring of threats, including terrorist threats. For example, one Jewish studies organization form the USA uses Social Links for this exact purposes. They fear attacks or incidents during their events, so they perform such monitoring in order to prevent them.
A whole other group of goals is reached through OSINT: risk assessment, when information is collected in order to make a decision. Due diligence procedure can be performed by a bank or by a consulting company, when the main goal is to run a complex assessment of the asset value. In such cases reputation, connections and beneficiaries' financial position matter.
Such check-ups, as so as affiliation search between employees and contractors, have been performed as far as business goes. The matter is - how fast and how efficient, and how precise they may be. Internet, especially social media, gives us huge volume of data for analysis, but collecting data by hand would be too difficult, too long and too inefficient.
The main bonus of the OSINT tools is possibility to find and check all the necessary information with software. For example, a Social Links product requires one hour to gather such an amount of data from open sources, which a skilled worker would collect by hand in a week.
With Social Links you can mine data from 50+ socials, databases and use 700+ search methods empowered with Face Recognition and search by Geo-coordinates. You will get unique searches in 30+ DarkNet forums and marketplaces without authorization by Phrase, PGP Key, Alias, also, you can get analytics by Products and Locations (shipping from/to).