New — OSINT & Cyber Investigations Division

Open Source Intelligence

A Florida-licensed private investigation agency offering worldwide OSINT and cyber investigations — for attorneys, businesses, and private clients anywhere your case takes us. Headquartered in Miami; cases handled globally.

We help you find the answers you need — from digital footprint mapping and dark-web breach monitoring to cyber-fraud cases, online stalking investigations, and court-ready OSINT reports.

A 1800135
FDACS Licensed
15+ YRS
Investigative Experience
WORLDWIDE
Cases Handled Globally
24 / 7
Case Intake
100%
Client Confidentiality
Worldwide Reach

Cases Handled From Miami To Anywhere.

OSINT is a desk discipline — the work travels at the speed of network. We have handled investigations across North America, the Caribbean, Latin America, Europe, the Middle East, Africa, Asia, and Oceania. Where physical surveillance is needed alongside the OSINT pass, we coordinate with vetted local investigators in the destination jurisdiction.

MIAMI HQ
8
Continents covered
EN / ES
Working languages
24 / 7
Cross-timezone intake
Per-jurisdiction legality review

Note: physical surveillance, in-person interviews, and service of process require licensure in the local jurisdiction. For those, we coordinate with a vetted partner network of locally-licensed investigators rather than working unlicensed. The OSINT investigation runs out of Miami; the field work is done by people who can lawfully do it where the case lives.

Live OSINT Demo

Watch An OSINT Scan In Action

Simulated demo. We do not store or query your input.' data-es-html='Escriba cualquier nombre público, correo, usuario o teléfono — le mostraremos exactamente lo que un investigador OSINT ve en los primeros 60 segundos. Demo simulada. No almacenamos ni consultamos su entrada.'> Type any public name, email, username, or phone number — we'll show you exactly what an OSINT investigator sees in the first 60 seconds. Simulated demo. We do not store or query your input.

No real data is queried — this is a visual simulation. Try a sample →

osint-engine — live trace
# Awaiting target. Enter a name, email, or username above to begin.
0
Sources scanned
0
Signal matches
0
Cross-verified
Risk score

Breach Exposure

    Social Footprint

      Geolocation Hits

        Dark-Web Mentions

          This is what we'd find in 60 seconds. Imagine a full 72-hour case.

          What Is OSINT

          Open Source Intelligence, Explained

          Open source intelligence (OSINT) is the practice of collecting and analyzing information from publicly available sources to produce verified, actionable findings. It is the discipline that powers modern investigative journalism, federal counter-terrorism work, corporate due diligence, and a growing share of civil and criminal cases.

          At Miami Private Investigations, our OSINT division applies this same discipline to private clients, attorneys, and businesses. We mine social media intelligence (SOCMINT), public records, court filings, breach databases, dark web marketplaces, geolocation metadata, cryptocurrency ledgers, and 40+ other open source categories — each finding source-cited, timestamped, and analyst-verified before it reaches your report.

          The result: faster timelines, court-admissible documentation, and answers traditional surveillance simply cannot reach. Whether you need a romance-scam unmask, an asset trace, a missing-person reconstruction, or a corporate background check, OSINT lets us deliver in days what used to take weeks.

          Who We Serve

          OSINT & Cyber Investigations For

          Tailored open source intelligence delivered in a format you can actually use — whether you're a family in distress, an attorney building a case, or a business protecting its assets.

          Private Clients

          Infidelity, missing persons, romance fraud, online stalking, child safety, family disputes — handled with absolute discretion.

          Click here for more info

          Attorneys

          Pre-deposition profiling, asset searches, witness backgrounds, court-ready digital evidence with chain-of-custody documentation.

          Click here for more info

          Business Owners

          Executive vetting, breach monitoring, employee fraud, vendor due diligence, dark-web exposure of company credentials.

          Click here for more info
          Red Flags

          Patterns You Shouldn't Ignore

          Most clients arrive after a specific moment — a story that didn't add up, a number that came out of nowhere, a profile photo that felt off. Below are eight scenarios that we see most often. If any of them sound like your situation, the OSINT signals to investigate are usually already public.

          Romance & Online Dating

          "They refuse to video chat or send a fresh photo on request."
          Reverse-image search across the public web; cross-platform identity resolution; voice-note metadata if you have one; Telegram/WhatsApp username trail.
          "Money has been requested for an emergency, customs fee, or short-term loan."
          Crypto-wallet trace if funds went on-chain; wire-transfer destination analysis; cross-victim pattern check on the persona's photos and writing style.

          Family, Custody & Divorce

          "Their spending pattern changed once a litigation date was set."
          Sec-of-state filings under spouse and known relatives; UCC-1 financing trace; out-of-state real-estate index; FinCEN beneficial-ownership walk on any new entities.
          "They claim to be home with the kids on weekends — their socials suggest otherwise."
          EXIF GPS extraction on publicly posted photos; geo-tagged check-in cadence; third-party tags by friends; dating-app distance pings if applicable.

          Business, Hires & Vendors

          "The credentials in their pitch deck don't match anything we can verify."
          LinkedIn role-history walk; employer corroboration via SEC EDGAR or board filings; education-registrar verification; cross-jurisdiction professional-license check.
          "The vendor we're about to sign has a recent name change in state filings."
          Predecessor entity history; litigation index on prior names; sanctions / OFAC screen on principals; UCC-1 lien check; news-archive sweep for pre-rebrand controversies.

          Online Threats & Impersonation

          "Anonymous threats from a burner account that knows specific personal details."
          Account-creation OPSEC analysis; reused profile photos cross-matched to prior accounts; writing-style fingerprinting; metadata leakage on any uploaded media.
          "A lookalike domain is sending phishing or fake invoices to your customers."
          WHOIS history; hosting / SSL-cert lineage; content-cluster analysis against known phishing kits; Wayback-archived prior versions; operator attribution via reused infrastructure.

          Recognize one of these? The first conversation is free, confidential, and 20 minutes.

          Service Catalog

          What Our OSINT Division Delivers

          Seven open source intelligence service lines, each backed by AI-assisted OSINT analysis and traditional investigative tradecraft. Every case reviewed by a licensed investigator before any report leaves the building.

          Subject Profile & Case File

          From a single starting datum (name, email, phone, address, photo, alias), we assemble a verified subject profile: aliases, social handles, associates, known addresses, employers, vehicles, online activity, and time-correlated location patterns.

          Digital Footprint Mapping

          A virtual representation of a subject's digital existence — accounts, devices, network behavior, app usage signals, and inferred location history. We can place a digital fingerprint at a specific location and time, with corroborating evidence.

          Threat & Tip Triage

          For attorneys, schools, churches, and HOAs: we score anonymous tips, threats, and stalking complaints across an 8-point severity framework so you know which ones need urgent action and which are likely empty.

          Dark Web & Breach Monitoring

          24/7 surveillance of surface, deep, and dark web sources. We tell you when your name, your business, your client's credentials, or your private data appears on a breach dump or marketplace — with real-time alerts.

          Reputation & Vetting

          Discreet pre-engagement screening for executives, business partners, romantic prospects, recruits, contractors, or tenants. Initial deep-dive in days, optional ongoing monthly monitoring with alerts on new mentions.

          Real-Time Operations Desk

          For urgent matters — missing persons, runaway minors, fugitive location, abducted children — we operate a live ops desk that runs continuous queries and pushes new leads to your phone as they surface.

          GPS Metadata & Location Intelligence

          Every photo a subject posts can carry hidden EXIF GPS coordinates — the camera, the lens, the timestamp, and the latitude/longitude where the shot was taken. We extract that metadata from public images, social-media posts, and dating-app profiles to place a subject at a specific spot at a specific time. Cross-correlated with check-ins, geo-tagged stories, and inferred movement patterns, we can reconstruct a multi-week location history without ever interacting with the subject.

          Common Cases

          What Clients Hire Us To Investigate

          Every case is reviewed for legality and proportionality before any work begins. We do not accept stalking, harassment, or unlawful surveillance work — full stop.

          01

          Infidelity & Family

          Discreet documentation of conduct relevant to divorce, custody, or post-marital settlements. Court-ready reports when needed.

          02

          Skip Tracing

          Locating debtors, lost relatives, witnesses, missing heirs, or service-of-process subjects across the U.S. and abroad.

          03

          Civil & Pre-Litigation

          Asset searches, witness background, pre-deposition profiling, and supporting evidence for attorneys preparing trial.

          04

          Cyber Fraud & Romance Scams

          Identifying who is actually behind a fake online identity, recovering communication histories, tracing crypto and wire transfers.

          05

          Missing Persons

          Last-known location reconstruction from digital signals, social-media activity timeline, and ground-team coordination.

          06

          Corporate Due Diligence

          Vetting executives, partners, M&A targets, large vendors, and high-trust hires before commitments are signed.

          07

          Threats & Stalking Cases

          Identifying anonymous threat senders, harassers, or stalkers, and packaging the evidence for a restraining order.

          08

          Insurance Investigations

          Workers' comp claim verification, surveillance-resistant cyber profiling, and behavior-pattern documentation.

          09

          GPS & Photo-Metadata Geolocation

          Extract EXIF GPS coordinates from publicly posted photos to place a subject at a specific location and time. Used in custody, infidelity, asset-search, and fugitive-recovery cases where the subject is digitally active but physically evasive.

          Subject Types

          Who (And What) We Investigate

          Use cases describe the scenario; subject types describe the target. Some cases involve a single named individual; others are an anonymous persona, a corporate shell, a crypto wallet, or a domain whose human owner you need to identify. Our toolchain adapts to the kind of subject — the methodology stays the same.

          Named individuals

          A real-world identity is known; the question is what they have done, where they have been, who they are connected to, or where they are now. Skip-trace, vetting, and asset-search work most often starts here.

          Anonymous online personas

          A username, a burner email, a throwaway Instagram, or a Telegram handle behind a threat or a scam. The goal is to map the persona to a real person — using OPSEC failures, photo metadata, writing style, and cross-platform pattern matching.

          Business entities & beneficial owners

          A corporation, LLC, partnership, or trust — and the human or humans actually behind it. Sec-of-state walks, FinCEN BOI checks, UCC-1 financing traces, and cross-jurisdiction holding-company chains are routine here.

          Missing or hiding persons

          A subject who has either disappeared or actively gone off-grid. Last-known address rarely the current one; we work back from digital signals, geo-tagged content, fitness apps, and platform-specific check-in cadence to narrow on the present.

          Email addresses, phone numbers, usernames

          A single identifier with no real-world name attached. Reverse-resolution across breach data, public registrations, social-platform exposure, and dating-app distance signals usually surfaces a candidate identity within hours.

          Cryptocurrency wallets & addresses

          A wallet address connected to a romance-scam loss, a ransomware payment, or an undisclosed asset. On-chain clustering, exchange-attribution research, and OFAC sanctioned-wallet screening map the wallet back toward a custody point.

          Domains, websites & online infrastructure

          A scam site, a lookalike domain, a fake-news outlet, or a phishing page. WHOIS history, hosting attribution, SSL-cert lineage, content-cluster analysis, and Wayback-archived prior versions usually identify the operator.

          Subjects abroad & cross-border matters

          A subject living in a different country, a counterparty in another jurisdiction, or an asset held offshore. We coordinate per-jurisdiction legality, work in English and Spanish natively, and partner with locally-licensed investigators where physical work is required.

          Recent Cases (Anonymized)

          Real Outcomes, Real Timelines

          A look at how recent OSINT matters actually played out. All identifying details are redacted; case types, timelines, and outcomes are accurate.

          Romance Scam 11 days · civil-recovery referral

          "He" was a 34-year-old in Lagos, not a 47-year-old offshore engineer.

          Client lost $87,000 over six months to a man she'd met on a dating app who claimed to be working on an oil rig. We unmasked the actual person behind the persona, documented the scam network, and produced a civil-recovery package.

          1. Day 1Intake + legality review. Reverse-image search on profile photos returns 4 unrelated identities — classic catfish signature.
          2. Day 3Triangulated voice-note metadata + Telegram username trail to a real Lagos resident; cross-referenced via local birth records.
          3. Day 7Crypto trace placed $43k of the funds in a known scam-cluster wallet; identified 6 other victims with matching patterns.
          4. Day 11Court-ready package delivered to client's civil-recovery attorney; FBI IC3 referral filed.
          Custody / Photo Metadata 5 days · evidence for hearing

          "I was home with the kids that weekend" — EXIF GPS said otherwise.

          Custody matter where one parent claimed exclusive caregiver responsibility on weekends. Their Instagram photos — uploaded without metadata stripped — placed them at three different bars and a club, dozens of miles from the children.

          1. Day 1Intake + scope. Identified public social handles across 4 platforms.
          2. Day 2Pulled EXIF GPS from 38 photos spanning 7 weekends; geo-plotted with timestamps.
          3. Day 3Cross-correlated geo-tagged stories + check-ins from third-party tags by friends.
          4. Day 5Delivered timestamped report with map exhibits; deposition support offered.
          Threat Triage 36 hours · police referral

          An anonymous threat against a Coral Gables physician — identified in 36 hours.

          Physician received specific, escalating anonymous threats via email and a burner Instagram account. We triangulated breadcrumbs the sender thought were untraceable, mapped them to a real person, and packaged the evidence for Coral Gables PD.

          1. Hour 48-point severity scoring: assessed as medium-high; escalated to live ops.
          2. Hour 12Burner-account creation pattern + a single re-used profile photo cross-matched to a previous account with the real-name attached.
          3. Hour 24Confirmed identity via three independent OSINT sources; verified subject lives in Miami-Dade.
          4. Hour 36Evidence package delivered to client's counsel; police report filed by client with our investigator named as witness.
          Asset Search 8 days · judgment-recovery support

          A "broke" judgment debtor with $1.4M in undisclosed real estate.

          Attorney client had a Florida judgment that the debtor swore he could not pay. OSINT pass surfaced three out-of-state LLCs in his wife's maiden name holding properties totaling $1.4M — all bought after the litigation began.

          1. Day 1Intake; identified known aliases, spouses, and prior business filings.
          2. Day 3SunBiz + cross-state Sec-of-State sweep found 3 LLCs registered under spouse's maiden name within the litigation window.
          3. Day 5County deed records confirmed properties in NC, GA, FL; UCC filings traced the financing.
          4. Day 8Asset report with citations delivered; attorney filed motion for supplementary proceedings.

          Cases are real and recent. Identifying details (names, dates, amounts within tier, locations narrower than county) have been changed to protect client confidentiality. We do not share specifics of an open matter, even anonymized, without written consent.

          The Line We Won't Cross

          Licensed. Lawful. Limited On Purpose.

          OSINT is powerful. That's exactly why it can be misused. We turn away cases every month that we are technically able to take but ethically and legally won't. If you are looking for the boundary — this is it.

          We Will NOT

          • Stalk, harass, or surveil any person who has not given lawful subject status (per Florida statute).
          • Take a case where the apparent client is the actual abuser. We screen for domestic-violence and coercive-control patterns at intake and decline outright.
          • Bypass platform privacy controls, scrape behind-login data, or access password-protected accounts. OSINT means open source — the second it stops being open, we stop.
          • Work for foreign governments, hostile intelligence services, or anyone whose case purpose we cannot independently verify.
          • Conduct investigations to enable retaliation against journalists, witnesses, whistleblowers, or protected sources.
          • Buy or use data from breaches, leaks, or marketplaces in a way that re-victimizes the people whose data is in them. We use breach data only to alert the affected party.
          • Misrepresent ourselves, the case, or the client to extract information from third parties (no pretexting, no impersonation).

          We Always Will

          • Review every intake for legality and proportionality before quoting.
          • Refuse the case if anything about the request feels off — and refund any deposit if a red flag emerges mid-case.
          • Cite every finding to its public source so it can be independently verified — and replayed in court if needed.
          • Hold every case file under the same chain-of-custody standard whether you're a Fortune-500 GC or a family in distress.
          • Deliver reports directly to the named principal, encrypted in transit and at rest — never email lists, never the wider cloud.
          • Refer matters to law enforcement or the appropriate regulator the moment a case crosses into a crime in progress.
          • Stand behind our work — our licensed investigators are available for deposition and trial testimony.
          A 1800135
          Florida FDACS License — verifiable at the Florida Department of Agriculture & Consumer Services. Investigations conducted under Chapter 493, Florida Statutes.
          OSINT Methodology

          The 7-Step OSINT Intelligence Cycle

          We follow the established OSINT intelligence cycle — the same seven-stage structure used in professional intelligence work, adapted for civil, family, and litigation cases.

          1

          Data Coverage

          Open Source Intelligence Coverage

          We mine signals across 50+ source categories. Every one is publicly accessible — that's what makes it OSINT, and what makes the findings admissible.

          Social MediaMeta, X, TikTok, LinkedIn, Reddit, Telegram
          Public RecordsFL court, FBI, OFAC, SEC, USPTO
          Dark WebTor, I2P, paste sites, breach forums
          Domain & DNSWHOIS, hosting, SSL, subdomain intel
          GeolocationEXIF, geo-tagged posts, satellite imagery
          Email & BreachHIBP, Dehashed, paste-site dumps
          TelephonyPhone reverse, carrier lookup, SMS records
          Corporate FilingsSunBiz, Sec of State, Companies House
          Facial & ImageReverse image search, biometric match
          Crypto & BlockchainWallet tracing, on-chain flow analysis
          News & ArchivesWayback, news APIs, academic, podcasts
          People SearchAggregators, voter rolls, alumni networks
          Why OSINT

          Traditional PI Work vs OSINT-Augmented

          Most PI firms still rely on tail surveillance and database subscriptions. We do all of that — plus an entire layer of OSINT analysis that closes a meaningful share of cases before a single foot hits the ground.

          Traditional Investigation

          • Days or weeks of tail surveillance to confirm a single fact
          • Limited to publicly licensable databases (LexisNexis, TLO)
          • Manual social-media scrolling, no archival capture
          • No dark-web visibility — misses breach data, fraud forums
          • One investigator's bandwidth = one timeline at a time
          • Findings depend on the investigator's note-taking

          OSINT-Augmented Cases

          • Same answer often surfaces in 2–3 days via digital signals
          • Access to 50+ open source categories beyond standard PI databases
          • Automated social capture across 8+ platforms with timestamps
          • Dark-web, breach-dump, and crypto trace included
          • Parallel analysts can run 5 timelines simultaneously
          • Every finding source-cited and replayable in court
          Already Tried Googling Them?

          Consumer Background-Check Sites vs A Licensed Investigation

          Most clients show up after trying TruthFinder, BeenVerified, Spokeo, or Intelius first. Those sites are aggregator subscriptions — useful as a starting point, but they share a set of structural limits that quickly become deal-breakers in any real matter.

          What you actually need
          Consumer Background-Check Sites
          Licensed PI With OSINT Division
          Confirm a subject is the person you think they are
          Cached aggregator data, often stale by months or years; common-name collisions are routine; no investigator to disambiguate.
          Live cross-platform identity resolution: aliases, social handles, employer signals, address history, photo cross-match — verified across three independent sources.
          Find someone who is hiding or has moved
          Last-known addresses from purchased data; no way to confirm currency; no skip-trace expertise.
          Skip-trace methodology: digital-footprint timeline, geo-tagged content, EXIF GPS pulls, social check-in cadence, fitness-app routes, dating-app distance pings — narrowed to current location.
          Find what they did NOT disclose
          Limited to what aggregators happen to have ingested; no dark-web, no breach data, no crypto traces, no foreign court records, no archived deleted content.
          50+ source categories including dark web, breach data, crypto blockchains, foreign court indices, archived deleted social posts, and image-metadata pulls the subject probably forgot existed.
          Use the findings in a court, dispute, or insurance claim
          Boilerplate disclaimers explicitly state the reports cannot be used for FCRA-covered or court purposes. No source attribution, no chain of custody, no testimony.
          Citation-anchored narrative report. Every finding sourced and timestamped. Chain-of-custody documented. Licensed investigators available for deposition and trial testimony.
          Understand WHAT the findings mean
          Raw data dump with no analyst layer. You decide what is signal vs noise — usually after wasting hours on dead ends.
          Findings reviewed by a licensed investigator before the report ships. Confidence ratings on every finding. Narrative explains what each signal means for your specific question.
          Liability if the report is wrong
          Sites disclaim all liability in their ToS. If their data ends a marriage, a hiring decision, or a relationship — that is on you.
          We carry professional liability insurance. Findings are warranted as accurate to the cited public sources at the time of report. We stand behind our work in deposition and at trial.

          TruthFinder, BeenVerified, Spokeo, and Intelius are independent commercial services and are referenced for comparison purposes only. We have no affiliation with them.

          What You Actually Receive

          A Court-Ready Report. Every Claim Cited.

          Click through a redacted preview of a real Tracelight deliverable. Cover page, executive summary, citation appendix, and chain-of-custody footer — the same structure every case file ships with.

          MPI
          Miami Private Investigations OSINT & Cyber Investigations Division
          CONFIDENTIAL — CLIENT EYES ONLY
          OSINT INVESTIGATION REPORT

          Subject Profile & Asset Search

          Case IDMPI-2026-0518-A
          Subject (redacted)▒▒▒▒▒▒▒▒ ▒. ▒▒▒▒▒▒
          Engagement typePre-litigation asset trace
          Date generated2026-05-18 14:22 UTC
          Report versionv3 — final
          Lead investigator▒▒▒▒▒▒▒▒, FDACS A1800135
          Content hash (SHA-256)
          a4f9d2c7e1b8c5a6d3e9f7a1b2c4d6e8f9a0b1c2d3e4f5a6b7c8d9e0f1a2b3c4
          If this hash does not match the report you received, the document has been altered.
          Citation-anchored
          Every claim in the narrative footnotes to a public source — verifiable independently.
          #
          Content-hashed
          SHA-256 fingerprint on every final report. If the file changes, the hash no longer matches.
          Court-replayable
          Investigator available for deposition; chain of custody documented from intake to delivery.
          How We Work

          From Intake To Deliverable In Days

          A four-step engagement process designed for attorneys, families, and businesses who need real answers fast — without compromising chain-of-custody.

          01

          Confidential Intake

          Free 20-minute consultation. We assess the case, confirm legality, and quote a fixed fee or retainer.

          02

          Multi-Source Analysis

          Our analyst team runs subject across surface, deep, and dark web sources — with three layers of verification on every finding.

          03

          Investigator Review

          Every machine-generated lead reviewed by a licensed investigator before it lands in your report. Nothing ships unverified.

          04

          Court-Ready Report

          Narrative report with sources, timestamps, and chain-of-custody. Courier, encrypted email, or in-person briefing.

          What You're Actually Signing Up For

          What An Engagement With Us Actually Looks Like

          The Process section above is the high-level shape. Below is the practical detail — what the free intake call covers, what the engagement letter spells out, how we bill, how updates flow, and what you actually receive at the end. No surprises after you sign.

          Privacy By Default

          Your Case Never Leaves The Building

          Confidentiality is not a marketing line; it is the operating discipline. Below is the actual chain of custody every case file follows from intake to final delivery.

          1. 1

            Intake

            Submission arrives over HTTPS into a workspace-isolated intake queue. Only the case-intake principals can see it. Nothing is forwarded, CC'd, or auto-routed to a shared inbox.

          2. 2

            Legality + scope screen

            A licensed investigator runs the legality, proportionality, and ethics screen. If the case crosses any of the lines listed in the ethics manifesto, we decline immediately and refund any deposit before any work begins.

          3. 3

            Engagement letter

            Signed engagement defines scope, deliverable, timeline, and confidentiality terms. NDA executed by default — we sign yours, or use ours, whichever you prefer. Engagement files are then locked into the case workspace.

          4. 4

            Encrypted at rest, US-hosted

            Case files live on encrypted storage on US-based infrastructure. Per-case encryption keys; access requires named-investigator authentication; every read and write is audit-logged with timestamp and user ID.

          5. 5

            Investigation phase

            OSINT collection, processing, and cross-verification proceed inside the case workspace. Working notes, screenshots, and intermediate findings stay scoped to the case file. No content is shared across cases or used to enrich any aggregate dataset.

          6. 6

            Lead-investigator review

            Every machine-generated lead and analyst-derived finding gets a final review by a licensed investigator. Two findings of every ten typically get downgraded to leads in this pass. Nothing ships unless it carries the investigator's sign-off.

          7. 7

            Sealed delivery

            Final report is hashed (SHA-256), sealed, and delivered to the named principal only. Encrypted email, encrypted courier link, or in-person briefing — your choice. Never CC'd to anyone, never posted to a shared link, never indexable.

          8. 8

            Drafts shredded, retention applied

            After delivery, working drafts and intermediate files are securely deleted. Only the sealed final report remains, retained per the workspace data-retention policy and your engagement letter. You can request earlier purge in writing at any time.

          A 1800135
          FDACS Licensed (FL)
          SHA-256
          Tamper-evident report seal
          US
          Encrypted, US-hosted infrastructure
          Professional liability insured

          Need an NDA in your form before any case discussion? Send it with the intake; we counter-sign within hours. We will not discuss case specifics until the NDA is mutual.

          Ready To Start A Case?

          Tell us a few details — we'll review confidentially and reply within one business day with next steps and a fixed quote.

          Submissions go directly to our case intake team. We do not share details with third parties.
          FAQ

          Frequently Asked Questions

          What is open source intelligence (OSINT)?

          Open source intelligence (OSINT) is the systematic collection and analysis of information from publicly available sources — social media, public records, news, dark web marketplaces, breach dumps, court filings, business registrations, geolocation data, and more — to produce actionable intelligence. Our OSINT investigators turn scattered public signals into a cohesive, court-ready narrative report.

          What does an OSINT investigator do?

          An OSINT investigator gathers and analyzes publicly available digital evidence from open sources, social media, dark web marketplaces, breach dumps, public records, and device-level signals to identify subjects, build profiles, locate persons, and document fraud or harassment. Findings are delivered in a court-ready narrative report with full source citations and chain-of-custody.

          Do you handle OSINT investigations outside the United States?

          Yes. OSINT is a desk discipline — we conduct investigations using publicly available digital sources from our Miami headquarters and deliver case findings to clients worldwide. We have handled cross-border romance-scam recoveries, international asset searches, executive due diligence on overseas subjects, and source vetting for journalists working in multiple jurisdictions. Where physical surveillance is needed alongside OSINT, we coordinate with vetted local investigators licensed in the relevant country or state.

          Is hiring an OSINT private investigator legal?

          Yes — open source intelligence is, by definition, gathered from publicly available sources, which is legal in all U.S. states and most jurisdictions worldwide. We operate under FDACS License A1800135 (State of Florida) and only work on legal investigations. We do not perform stalking, harassment, unauthorized surveillance, or any work prohibited by Florida statute or the destination jurisdiction. Every intake includes a legality review for the case's specific facts and the jurisdictions involved.

          Can OSINT find someone's location?

          Often, yes — through digital footprint mapping, social-media timeline reconstruction, EXIF GPS coordinates embedded in publicly posted photos, geo-tagged check-ins, breach data, and inferred device-location signals. A single photo posted to Instagram, a dating app, a real-estate listing, or a personal blog can carry latitude/longitude precise to within a few meters. Effectiveness depends on the subject's digital hygiene — many platforms strip metadata on upload, but plenty don't. We disclose realistic odds before any work begins.

          How does GPS metadata in photos help locate or connect a subject?

          Most modern phones embed EXIF GPS data into every photo by default. When a subject (or someone in their network) uploads an image to a platform that doesn't strip metadata, that image carries a precise latitude/longitude and a UTC timestamp. We extract that data, plot it on a map, and cross-reference it against other geo-tagged signals (check-ins, geo-tagged stories, fitness-app routes, dating-app distance pings) to build a multi-week movement pattern. In custody, infidelity, asset-search, fugitive, and tenant-fraud cases, GPS metadata frequently places a subject somewhere they've claimed they weren't — or connects two subjects who've claimed not to know each other by showing them in the same place at the same time.

          Do you investigate romance scams and online dating fraud?

          Yes. We unmask the actual person behind a fake online identity, recover communication histories, identify other victims, trace crypto and wire transfers, and produce evidence usable for civil recovery or law enforcement referral.

          What evidence can be used in court?

          Every report includes source citations, timestamps, and chain-of-custody documentation. Our investigators are available for deposition and trial testimony. Reports are prepared with the standards Florida attorneys expect.

          How fast can you start a case?

          Intake submissions are acknowledged within hours during business hours, often sooner. The legality and scope review typically completes within one business day, at which point we either send the engagement letter or decline the case (with any deposit refunded). For urgent matters — missing minors, active threats, fugitive recovery — we operate a real-time ops desk that can be engaged outside business hours; call 305-686-7826 directly for those.

          What if you can't find what I'm looking for?

          OSINT is a probabilistic discipline — some subjects have a heavy digital footprint and surface quickly; others have practiced operational security and surface only after deeper work. We disclose realistic odds before any work begins, and the engagement letter spells out scope and what "no findings" means in dollar terms. If a case turns out to be unworkable for reasons not visible at intake, we will refund the unspent retainer rather than burn it. We do not bill against an empty horizon.

          Can I get updates while the investigation is running?

          Yes. Standard cadence is a written check-in at midpoint and on completion; for longer engagements we add weekly status updates. For real-time matters (missing persons, active threat triage), we push leads to the named principal as they surface, by phone or encrypted message. Updates always go only to the named principal — we do not CC counsel, family members, or third parties without your explicit written authorization.

          What happens after I submit the intake form?

          (1) Auto-acknowledge within minutes confirming we received it. (2) A licensed investigator reviews the request, runs the legality + proportionality screen, and contacts you for a free 20-minute consultation, usually within hours. (3) If we can take the case, we send an engagement letter outlining scope, deliverable, and timeline. (4) If we cannot — wrong fit, scope too narrow, jurisdiction we won't work in, or anything that fails the ethics screen — we tell you that, refund any deposit, and where possible suggest who should take the matter.

          Do I need an attorney to engage you?

          No. Roughly half our caseload is direct from individuals (family, dating, missing persons, fraud-recovery, anonymous-threat triage). The other half is attorney-routed (litigation support, asset search, witness vetting, pre-deposition profiling). The work product is the same regardless of who engages us — the only difference is whether the report is delivered into a privileged work-product envelope or directly to the principal. If you do not have counsel and the matter has a litigation component, we can recommend Florida attorneys who routinely receive our reports.

          What's the typical turnaround on a deliverable?

          Depends on scope. A single-subject digital-footprint or skip-trace report typically lands in 3–7 business days. Threat-triage and missing-persons matters can deliver initial signals within 24–36 hours via the real-time ops desk, with the full report following in days. Multi-subject corporate due diligence, asset traces with cross-border layers, and source vetting for journalism investigations typically run 7–14 business days. Every engagement letter spells out the deliverable date before any work begins; we do not start without an agreed timeline.

          Are there countries or clients you won't work for?

          Yes. We do not accept engagements from foreign governments, hostile intelligence services, or any party operating under U.S. State Department or OFAC sanctions. We do not work for clients whose stated purpose is to enable retaliation against journalists, witnesses, whistleblowers, or protected sources. We will not investigate a subject in a jurisdiction where our work product would be used in proceedings that fall outside U.S. or destination-country due-process standards. Every intake includes a screening pass for these limits, and we decline any case that crosses them — no exceptions, no negotiation.

          Call For A Free Consultation

          305-686-7826
          Call Now Free Consult