List of the 100 OSINT topics with subtopics:
List of the 100 OSINT topics with subtopics:
Here's an expanded list of the 100 OSINT topics with subtopics:
1. Social Media Analysis (e.g., Twitter, Facebook)
-
- Analyzing sentiment from posts and comments
- Using browser-based tools (e.g., Scrapy, Selenium)
- Census data and demographic analysis
- Corporate registries and ownership information
- Open crime data and incident mapping
- FOIA requests for data access
- Identifying wallet ownership patterns
- Following the flow of illicit transactions
- Monitoring exchange platforms for suspicious activity
- Using public blockchain data for forensic analysis
- Monitoring darknet forums for threats
- Anonymity and Encryption Techniques in OSINT
- Tools for browsing and analyzing the dark web
- Legal challenges of dark web investigations
- Analyzing media sources for credibility
- Reverse image search to verify image authenticity
- Using fact-checking platforms to cross-reference claims
- Machine learning tools for detecting false information
- Monitoring underground forums for data breaches
- Gathering intelligence on potential attackers
- Tracking phishing campaigns through social engineering
- Mapping an organization’s digital footprint for vulnerabilities
- Open-source tools for maritime tracking
- Satellite imagery for vessel identification
- Analyzing shipping route data for trends
- Cross-referencing with customs and trade data
- Identifying private and military aircraft
- Open-source flight tracking platforms (e.g., Flightradar24)
- Analyzing flight paths and altitudes
- Cross-referencing aviation incident reports
- Cross-referencing public records with media reports
- Geospatial data in investigative journalism
- Finding whistleblowers through digital footprints
- Ethical considerations in OSINT for journalism
- Detecting patterns in follower networks
- Reverse-engineering social media APIs for verification
- Identifying common bot behaviors
- Cross-referencing with known fake account lists
- Tools for analyzing satellite data
- Using satellite images for environmental monitoring
- Cross-referencing satellite data with historical events
- Identifying changes in topography over time
- Searching for deleted social media posts
- Cross-referencing archived web pages with current data
- Tools for identifying dead links and finding alternatives
- Scraping and storing data from expired pages
- Techniques for reducing personal digital footprints
- Scrubbing metadata to protect privacy
- Protecting against data breaches through OSINT awareness
- Tracking your digital footprint using OSINT
- Identifying altered or photoshopped images
- Tracking image reuse across the Internet
- Cross-referencing image metadata for additional context
- Using reverse image search to locate individuals
- Identifying default credentials in IoT devices
- Vulnerability scanning for common IoT exploits
- Cross-referencing IoT devices with known vulnerabilities
- IoT security best practices for OSINT analysts
- Crafting convincing pretexts based on OSINT
- Investigating corporate structure for social engineering targets
- Techniques for impersonating trustworthy sources
- Preventing social engineering attacks through OSINT awareness
- Monitoring campaign donations and funding sources
- Identifying political influencers and their networks
- Analyzing sentiment around political candidates
- Cross-referencing campaign claims with public data
- Monitoring enemy movements through open data sources
- Cross-referencing satellite images for military analysis
- Social media as a tool for intelligence operations
- OSINT tools used in modern warfare
- Tracking fraudulent financial transactions
- Cross-referencing fraudster details with public records
- Analyzing scam email patterns
- Using OSINT for fraud prevention in financial institutions
- Tracking domain name ownership history
- Cross-referencing DNS records for server locations
- Tools for monitoring domain changes over time
- Investigating domain parking and typosquatting
- Cross-referencing credential leaks with password managers
- Tools for automated breach detection (e.g., HaveIBeenPwned)
- Protecting personal accounts from credential leaks
- Investigating credential stuffing attacks
- Monitoring cryptocurrency transactions for fraud
- Investigating Ponzi schemes and investment fraud
- Cross-referencing financial filings for irregularities
- Analyzing public stock records for insider trading
- Monitoring social media for calls for help
- Open-source mapping tools for aid logistics
- Identifying high-risk areas through public data
- Cross-referencing satellite imagery for humanitarian efforts
- Scraping government websites for legal filings
- Cross-referencing voter registration databases
- Monitoring public procurement data for fraud
- Government transparency portals for OSINT
- Using blockchain explorers for Bitcoin transactions
- Cross-referencing wallet addresses with known criminals
- Tools for tracking cryptocurrency flows (e.g., Chainalysis)
- Analyzing wallet clusters for money laundering
- Identifying exposed API keys or credentials in code
- Monitoring repository changes for security vulnerabilities
- Investigating developers’ public profiles for associations
- Tracking open-source projects for security risks
- Tracking protests and movements through live data
- Analyzing public live feeds (e.g., traffic cameras)
- Cross-referencing event data with geolocation services
- Using AI to detect real-time events from multiple sources
- Monitoring abusive content across forums
- Investigating cyberbullying cases through digital footprints
- Cross-referencing multiple accounts linked to harassment
- Protecting victims’ privacy while gathering OSINT evidence
- Monitoring traffic cameras for movement patterns
- Using drones for open-source surveillance
- Cross-referencing surveillance data with social media activity
- Analyzing CCTV footage with AI for pattern recognition
- Text mining for trends and sentiment analysis
- Social network analysis using graph theory
- Using APIs for structured data extraction
- Automating data mining with machine learning algorithms
- Tracking online forums for extremist activity
- Identifying funding sources for terrorist groups
- Analyzing open-source intelligence in conflict zones
- Cross-referencing terrorist group connections with public data
- Identifying patterns of disinformation spread on social media
- Tools for tracking state-sponsored misinformation
- Cross-referencing media articles with independent sources
- Analyzing bot networks for disinformation campaigns
- Cross-referencing phone numbers with social media profiles
- Identifying location and service providers from phone numbers
- Investigating spoofed or VoIP numbers
- Tracking SMS phishing (smishing) campaigns using OSINT
- Identifying organized efforts to manipulate public opinion
- Tracking comment patterns across multiple news platforms
- Cross-referencing commenters’ digital footprints
- Monitoring comment bots and automated responses
- Analyzing historical court rulings for legal trends
- Cross-referencing legal records with news reports
- Monitoring ongoing legal cases using OSINT tools
- Investigating company lawsuits for financial risk analysis
- Analyzing market trends and competitor data
- Cross-referencing employee activities with public records
- Identifying geopolitical risks using OSINT
- Using OSINT for brand reputation management
- Using public SEC filings for financial analysis
- Identifying insider trading activities
- Analyzing financial news for market trends
- Monitoring mergers and acquisitions through public data
- Identifying key influencers in activism networks
- Tracking fundraising efforts for activist causes
- Investigating the impact of activism on public policy
- Analyzing online movements for disinformation or infiltration
- Identifying illicit cryptocurrency activities
- Investigating decentralized exchanges using OSINT
- Cross-referencing wallets with known criminal organizations
- Analyzing smart contracts on public blockchains
- Identifying unpatched security flaws in web applications
- Tools for scanning websites (e.g., OWASP ZAP, Burp Suite)
- Cross-referencing vulnerabilities with threat intelligence
- Monitoring websites for signs of breaches or defacement
- Cross-referencing public leaks with internal employee data
- Investigating the financial activities of employees for fraud
- Tracking digital footprints within the corporate network
- Analyzing insider threats using behavioral OSINT data
- Tracking state-sponsored media for diplomatic messaging
- Cross-referencing public statements with government actions
- Investigating diplomatic cables and leaks
- Monitoring geopolitical trends using open-source tools
- Cross-referencing social media with known travel itineraries
- Monitoring travel booking platforms for open data leaks
- Analyzing hotel reviews for intelligence gathering
- Using flight number tracking for real-time travel monitoring
- Investigating API vulnerabilities for data leakage
- Monitoring public API endpoints for sensitive data
- Scraping public datasets from API sources (e.g., weather, finance)
- Automating OSINT tasks with API integrations
- Investigating threats to public utilities (e.g., water, energy)
- Cross-referencing public data on infrastructure locations
- Using satellite imagery for infrastructure monitoring
- Tracking cybersecurity incidents in critical infrastructure sectors
- Analyzing public transportation usage patterns
- Cross-referencing traffic incidents with public safety data
- Using traffic cameras for monitoring movement patterns
- Investigating transportation infrastructure through open data
- AI-based tools for social media monitoring
- Predictive analytics in OSINT investigations
- Training AI models with open-source data
- Using AI to detect anomalies in large datasets
- Investigating the ethics of facial recognition in OSINT
- Cross-referencing social media profiles with facial recognition
- Using facial recognition for missing person cases
- Tracking criminals using open-source facial recognition tools
- Cross-referencing satellite imagery for environmental change
- Scraping weather data from public APIs
- Monitoring scientific reports and open data on climate change
- Using geospatial tools for environmental risk assessments
- Using geolocation data to track trafficking routes
- Cross-referencing social media with missing person databases
- Monitoring dark web sites for trafficking information
- Investigating financial transactions linked to trafficking
- Predictive analytics for threat detection
- AI tools for automating OSINT data analysis
- Using machine learning to detect patterns in social media
- Cross-referencing AI-driven OSINT with human analysis
- Removing personal information from public databases
- Scrubbing metadata from images and documents
- Monitoring your digital footprint with OSINT tools
- Preventing identity theft by reducing digital exposure
- Investigating public datasets for research papers
- Cross-referencing academic publications with public data
- Identifying trends in academic citations
- Using OSINT tools for large-scale research data collection
- Monitoring forums for planned attacks
- Investigating hacktivist group structure and leadership
- Cross-referencing hacktivist activity with public breaches
- Analyzing trends in hacktivist targeting
- Cross-referencing donations with corporate interests
- Monitoring political lobbying activities
- Investigating foreign influence on political donations
- Using OSINT to expose dark money in politics
- Cross-referencing user profiles with review history
- Tools for scraping and analyzing review data
- Investigating fake comments on news and social media
- Identifying paid review schemes through digital footprints
- Cross-referencing health trends with public news reports
- Monitoring social media for disease outbreaks
- Analyzing public health databases for demographic risks
- Investigating pharmaceutical trials using open data
- Cross-referencing wildlife product sales with public reports
- Investigating transportation routes for wildlife smuggling
- Using satellite imagery for identifying trafficking hotspots
- Collaborating with NGOs using OSINT tools for wildlife protection
- Cross-referencing fake news with legitimate media sources
- Investigating domain registration details of fake news outlets
- Identifying patterns in fake news distribution networks
- Tools for automatically detecting fake news articles
- Scraping forums and social media for criminal activity
- Cross-referencing criminal group members with public records
- Using geolocation tools for tracking criminal operations
- Monitoring law enforcement reports for criminal patterns
- Cross-referencing art sales with known stolen property
- Monitoring online auctions for stolen items
- Investigating the provenance of suspicious art sales
- Collaborating with art historians using OSINT tools
- Scraping financial records for signs of money laundering
- Cross-referencing criminal leaders with known public activities
- Using geospatial data to monitor organized crime territories
- Monitoring court records for organized crime cases
- Cross-referencing financial scams with public databases
- Monitoring scam warning forums and blogs
- Investigating fraudulent companies through corporate records
- Analyzing email patterns for phishing and fraud campaigns
- Monitoring international trade data for compliance breaches
- Scraping public financial records for sanctions violations
- Cross-referencing sanctioned entities with corporate filings
- Analyzing global supply chains for sanctions circumvention
- Scraping financial records for suspicious transactions
- Monitoring extremist forums for fundraising activities
- Cross-referencing public records with known terrorist organizations
- Identifying Money Laundering Operations linked to terrorism
- Monitoring recruitment activity in specific industries
- Cross-referencing job listings with corporate data
- Investigating fraudulent job postings for phishing schemes
- Analyzing recruitment patterns for corporate espionage
- Cross-referencing patents with company filings
- Monitoring patent disputes in legal records
- Investigating the ownership history of patents
- Identifying trends in patent applications by industry
- Monitoring public tenders for corporate bidding patterns
- Cross-referencing procurement contracts with financial records
- Investigating Contract Fraud Through Public Data
- Using OSINT tools to analyze procurement trends
- Cross-referencing shipping data with known smuggling routes
- Investigating cargo theft through public transport data
- Using geospatial tools for container tracking
- Scraping customs data for illegal shipment detection
- Scraping environmental impact assessments for trends
- Cross-referencing satellite data with environmental destruction
- Investigating corporations for environmental violations
- Monitoring public environmental protest movements
- Monitoring aircraft movements for suspicious activities
- Cross-referencing flight paths with known travel routes
- Investigating private jet movements for financial crimes
- Scraping public flight schedules for trend analysis
- Scraping dark web markets for drug sales
- Cross-referencing drug arrests with public records
- Using geolocation data to track trafficking routes
- Investigating financial transactions linked to drug trafficking
- Investigating state-sponsored media campaigns
- Scraping public records for lobbying activities
- Cross-referencing political donations with corporate interests
- Analyzing patterns of political influence through public data
- Cross-referencing real estate sales with financial records
- Monitoring property sales for money laundering
- Investigating rental scams using public listings
- Analyzing trends in real estate investment using open data
- Monitoring real-time protest activity through open data
- Cross-referencing protest leaders with public records
- Analyzing protest movements for disinformation or violence
- Investigating government response to protests using OSINT
- Scraping financial news for market trends
- Cross-referencing stock movements with company filings
- Investigating insider trading through open data
- Analyzing market volatility with public financial data
- Monitoring public datasets using API access
- Investigating API vulnerabilities for data exposure
- Automating OSINT tasks with API integrations
- Cross-referencing public APIs with other OSINT sources
- Monitoring extremist forums for organizing activities
- Cross-referencing hate groups with public data
- Using AI to detect hate speech patterns online
- Investigating online harassment campaigns through OSINT
- Detecting fake or biased reviews on consumer platforms
- Cross-referencing user profiles with review activity
- Investigating review fraud schemes using public data
- Analyzing sentiment trends in product reviews using OSINT
- Scraping arms trade databases for suspicious transactions
- Investigating arms trafficking routes through public data
- Cross-referencing arms sales with international sanctions
- Analyzing arms smuggling patterns using OSINT tools
- Investigating website domain registration details
- Cross-referencing fraudulent sites with public warnings
- Monitoring social media for reports of online scams
- Analyzing fraudulent website patterns using OSINT
- Cross-referencing product listings with known illegal goods
- Investigating online marketplaces for counterfeit items
- Monitoring online platforms for money laundering through goods
- Using OSINT tools to track sellers of illegal products
- Investigating public trade reports for economic analysis
- Cross-referencing trade data with shipping information
- Monitoring global supply chains for trade disruptions
- Analyzing trade agreements and tariffs through public data
- Cross-referencing government activities with public records
- Investigating public officials through government transparency portals
- Scraping public hearings and legislative data for analysis
- Using transparency data for investigative journalism
- Monitoring property sales for money laundering
- Scraping real estate listings for trends in the housing market
- Cross-referencing property owners with corporate filings
- Analyzing property transactions linked to political corruption
- Cross-referencing public cryptocurrency addresses with known heists
- Using blockchain analysis tools to track stolen funds
- Investigating thefts on decentralized exchanges
- Analyzing cryptocurrency mixing services for theft obfuscation
- Monitoring social media for disease outbreaks
- Investigating pharmaceutical companies through clinical trial data
- Cross-referencing health trends with government data
- Analyzing public health policies through open data sources
- Scraping shipping data for supply chain disruptions
- Investigating supply chain cyberattacks through public records
- Cross-referencing supply chain entities with financial filings
- Analyzing global supply chains for geopolitical risks
- Investigating fake accounts and bots in election campaigns
- Cross-referencing political ads with campaign finance records
- Scraping social media for voter manipulation schemes
- Using sentiment analysis to track public opinion during elections
- Monitoring governments for surveillance activities
- Investigating public statements on digital rights violations
- Cross-referencing censorship activities with geopolitical tensions
- Analyzing trends in internet shutdowns using OSINT tools
- Cross-referencing corporate filings with tax authorities
- Investigating offshore tax havens through public data
- Monitoring social media for extravagant spending patterns
- Analyzing patterns of tax evasion in public databases
- Monitoring public procurement data for irregularities
- Cross-referencing political activities with financial disclosures
- Investigating public officials using open-source data
- Analyzing whistleblower reports through OSINT tools
- Scraping dark web marketplaces for illicit goods
- Cross-referencing dark web data with public records
- Investigating anonymity techniques used on the dark web
- Analyzing trends in dark web activity using OSINT tools
- Scraping financial records for links to known shell entities
- Investigating tax evasion schemes involving shell companies
- Monitoring offshore accounts linked to shell corporations
- Using OSINT tools to track the true owners of shell companies
2. Geolocation Tracking from Images
-
- Analyzing EXIF metadata in images
3. Metadata Extraction from Files
-
- Extracting metadata from documents (PDF, Word, etc.)
4. OSINT Tools for Social Media Monitoring
-
- Open-source tools for Twitter scraping (e.g., Twint)
5. Web Scraping Techniques for OSINT
-
- Scraping using Python and BeautifulSoup
6. OSINT in Law Enforcement
-
- Gathering evidence from public online forums
7. Analyzing Publicly Available Databases
-
- Public voting records and political affiliation
8. Corporate Espionage using OSINT
-
- Investigating competitors' public-facing documents
9. Tracking Cryptocurrency Transactions
-
- Blockchain explorers for Bitcoin, Ethereum, etc.
10. Dark Web OSINT Investigations
-
- Dark web marketplaces and hidden services
11. Fake News and Misinformation Detection
-
- Identifying bots and fake accounts spreading disinformation
12. OSINT for Cybersecurity Threat Hunting
-
- Identifying exposed assets and credentials
13. Tracking Shipping and Marine Traffic
-
- Using AIS data to monitor ship movements
14. OSINT for Tracking Air Traffic (ADS-B)
-
- Using ADS-B data to track commercial flights
15. OSINT and Open Data for Journalism
-
- Using open-source tools for investigative reporting
16. Identifying Fake Social Media Accounts
-
- Analyzing account creation dates and activity levels
17. Publicly Available Satellite Imagery Analysis
-
- Free satellite imagery platforms (e.g., Google Earth)
18. Searching Hidden or Archived Web Pages
-
- Using the Wayback Machine for archived websites
19. OSINT and Personal Data Privacy
-
- How OSINT is used to identify personal information
20. Reverse Image Search Techniques
-
- Using tools like TinEye and Google Image Search
21. Finding Vulnerable IoT Devices
-
- Shodan search for publicly exposed devices
22. Social Engineering using OSINT
-
- Gathering personal data for phishing attacks
23. Political Campaign Monitoring using OSINT
-
- Tracking social media campaigns and political ads
24. OSINT in Military and Intelligence Agencies
-
- Using OSINT for battlefield intelligence gathering
25. Investigating Online Fraud
-
- Identifying fake e-commerce websites
26. Searching for Domain Information (WHOIS, DNS)
-
- WHOIS lookups for domain registration details
27. Finding Leaked Credentials Online
-
- Monitoring forums and websites for breached data
28. OSINT for Investigating Financial Crime
-
- Tracking offshore bank accounts and shell companies
29. OSINT and Humanitarian Aid
-
- Using OSINT for disaster response coordination
30. Government Databases for OSINT
-
- Accessing public financial records and contracts
31. Tracking Bitcoin Wallet Activity
-
- Identifying suspicious wallet activities
32. Analyzing Code Repositories (e.g., GitHub) for Vulnerabilities
-
- Scraping public GitHub repositories for sensitive data
33. Monitoring Real-time Events using OSINT
-
- Real-time social media monitoring (e.g., breaking news)
34. Investigating Online Harassment
-
- Identifying harassers on social media platforms
35. Open Source Surveillance with OSINT
-
- Gathering surveillance data from publicly available webcams
36. Data Mining Techniques for OSINT
-
- Web scraping for large-scale data collection
37. OSINT and Counterterrorism
-
- Monitoring radicalization trends on social media
38. Online Disinformation Campaigns
-
- Detecting organized disinformation efforts
39. Tracking Phone Numbers (OSINT for Telecom)
-
- Investigating phone numbers with public lookup services
40. Analyzing Public Comments on News Websites
-
- Scraping comments for sentiment analysis
41. Publicly Available Court Records and Legal Data
-
- Accessing public legal filings (e.g., PACER)
42. OSINT in Risk Assessment for Corporations
-
- Monitoring supply chains for potential disruptions
43. Monitoring Financial Markets using OSINT
-
- Tracking stock prices and trading patterns
44. OSINT and Activism Movements
-
- Monitoring social media for activist group organizations
45. Analyzing Cryptocurrency Blockchains
-
- Tools for analyzing Bitcoin, Ethereum, and altcoin transactions
46. Web Application Vulnerability Identification
-
- Investigating websites for publicly exposed vulnerabilities
47. OSINT for Insider Threat Detection
-
- Monitoring employee social media for signs of discontent
48. OSINT in International Diplomacy
-
- Monitoring international political developments via OSINT
49. Tracking Travel Itineraries and Passenger Data
-
- Investigating flight data for passenger tracking
50. Analysis of Public APIs for OSINT
-
- Using public APIs to extract structured data
51. OSINT in Protecting Critical Infrastructure
-
- Monitoring SCADA and ICS systems for vulnerabilities
52. Publicly Available Transportation and Traffic Data
-
- Scraping real-time traffic data from public platforms
53. OSINT and AI for Pattern Recognition
-
- Machine learning tools for identifying OSINT patterns
54. Facial Recognition Tools for OSINT
-
- Publicly available facial recognition software (e.g., Clearview AI)
55. Monitoring Climate Change Data using OSINT
-
- Publicly available climate databases for analysis
56. OSINT in Human Trafficking Investigations
-
- Scraping online forums and classifieds for trafficking activity
57. Use of AI and Machine Learning in OSINT
-
- Training machine learning models with open data
58. OSINT for Digital Footprint Reduction
-
- Techniques for Minimizing Your Personal Online Presence
59. OSINT in Academic Research
-
- Using public data sources for academic studies
60. Monitoring Hacktivist Movements
-
- Tracking hacktivist group activity on social media
61. Investigating Political Donations and Funding
-
- Scraping public campaign finance records
62. Tracking Fake Reviews and Comments Online
-
- Detecting fake reviews on e-commerce platforms
63. Monitoring Public Health Data for OSINT
-
- Scraping publicly available epidemiological data
64. Tracking Wildlife Trafficking through OSINT
-
- Monitoring online platforms for illegal wildlife trade
65. Investigating Fake News Websites
-
- Scraping and analyzing content from known fake news sites
66. OSINT for Tracking Criminal Networks
-
- Mapping criminal networks using public data
67. Investigating Stolen Art and Cultural Property
-
- Scraping databases of stolen art (e.g., Interpol Art Theft Database)
68. Tracking Organized Crime through Public Data
-
- Investigating mafia or cartel operations using public records
69. OSINT for Investigating Financial Scams
-
- Scraping websites for scam-related keywords
70. Tracking International Sanctions and Compliance
-
- Investigating companies or individuals on sanctions lists
71. Monitoring Terrorist Financing through OSINT
-
- Investigating public cryptocurrency transactions for terrorism funding
72. Scraping Job Boards and Recruitment Websites
-
- Scraping job boards for hiring trends
73. Using Public Patent Databases for OSINT
-
- Scraping patent filings for technological innovations
74. Tracking Public Procurement Contracts
-
- Scraping government procurement websites for contract details
75. Tracking Shipping Containers and Cargo
-
- Monitoring public shipping manifests for suspicious activity
76. Monitoring OSINT for Environmental Protection
-
- Tracking illegal logging activities through public reports
77. Scraping Airline Data for OSINT
-
- Scraping flight data for passenger tracking
78. OSINT in Tracking Drug Trafficking
-
- Monitoring social media for drug-related activities
79. Tracking Political Influence Operations
-
- Monitoring social media for political manipulation efforts
80. Scraping Real Estate Websites for OSINT
-
- Scraping property listings for ownership details
81. OSINT for Monitoring Protests and Demonstrations
-
- Scraping social media for protest organization
82. Tracking Financial Markets with OSINT
-
- Monitoring public stock trading patterns
83. Using Publicly Available APIs for OSINT
-
- Scraping public APIs for structured data
84. Tracking Online Hate Speech and Extremism
-
- Scraping social media for hate speech keywords
85. Investigating Online Reviews and Consumer Feedback
-
- Scraping e-commerce websites for product reviews
86. Tracking Arms Trafficking through OSINT
-
- Monitoring online platforms for illegal arms sales
87. OSINT for Identifying Fraudulent Websites
-
- Scraping public websites for phishing schemes
88. Monitoring Online Marketplaces for Illegal Goods
-
- Scraping dark web marketplaces for illicit products
89. Tracking Global Trade Data for OSINT
-
- Scraping customs records for international trade trends
90. Scraping Government Transparency Websites
-
- Monitoring government contracts and spending data
91. Tracking Real Estate Transactions using OSINT
-
- Investigating property ownership through public land records
92. OSINT for Investigating Cryptocurrency Theft
-
- Monitoring cryptocurrency wallets for signs of theft
93. Tracking Public Health Trends using OSINT
-
- Scraping public health datasets for epidemiological analysis
94. Using OSINT for Supply Chain Security
-
- Monitoring suppliers and partners through public data
95. Scraping Social Media for Election Campaigns
-
- Monitoring election-related social media activity
96. Tracking Internet Censorship and Surveillance
-
- Scraping reports on global Internet censorship
97. Investigating Tax Evasion using OSINT
-
- Scraping financial records for signs of tax evasion
98. OSINT for Investigating Corruption
-
- Scraping government records for signs of corruption
99. Tracking Dark Web Activity with OSINT
-
- Monitoring dark web forums for criminal activity
100. OSINT for Investigating Shell Companies
-
- Cross-referencing corporate registrations with shell companies
Last updated on