| title | Investigation Cases |
|---|---|
| description | Complete OSINT investigation workflows: case templates, student exercises & examples. Learn evidence collection, profiling & reporting with hands-on practice. |
This directory contains investigation case files demonstrating complete OSINT investigation workflows from intake to reporting.
BEFORE YOU START ANY INVESTIGATION - READ THIS CAREFULLY:
- ✅ Get written authorization from instructor/supervisor BEFORE starting
- ✅ Only use publicly available information (no hacking, no unauthorized access)
- ✅ Use fictional/dummy data for practice exercises
- ❌ NEVER attempt to hack, access, or "test" systems without explicit written permission
- ❌ NEVER contact subjects directly (no social engineering, no pretexting)
- ❌ NEVER use information for personal purposes or gain
- ✅ Report illegal content (CSAM, violence, threats) to authorities immediately
- ✅ Respect privacy and data protection laws (GDPR, CCPA, etc.)
- ✅ Maintain confidentiality of case information
- ❌ NEVER investigate real people without proper authorization
- ❌ NEVER share case data outside your authorized team/class
- ❌ NEVER investigate friends, family, classmates, or ex-partners
- Don't investigate friends/family - Serious ethical violation, potential legal issues
- Don't use personal social media accounts - OPSEC failure, compromises investigation
- Don't skip documentation - Evidence without proper logging is inadmissible
- Don't assume data is accurate - Always verify from multiple sources
- Don't work alone on sensitive cases - Use buddy system, debrief with instructor
- Don't let curiosity override ethics - Just because you can doesn't mean you should
IF IN DOUBT, ASK YOUR INSTRUCTOR FIRST. IT'S BETTER TO ASK THAN TO VIOLATE LAW/ETHICS.
Cases provide end-to-end investigation examples showing:
- Proper case structure and organization
- Evidence collection and chain of custody
- Entity profiling and link analysis
- Timeline reconstruction
- Final reporting and disclosure
Step 1: Learn the Basics (1-2 hours)
- Read Legal & Ethics SOP - MANDATORY
- Review OPSEC Planning - Protect yourself
- Study the Glossary - Learn key terminology
- Review the Investigation Workflow Diagram
Step 2: Review an Example (2-3 hours)
- Open 2025-001-Example-Investigation
- Read through each file to understand the structure
- Note how evidence is documented and organized
- Study the subject profiling techniques used
Step 3: Practice with Exercises (3-5 hours each)
- Start with Exercise 01: Username Investigation
- Progress to Exercise 02: Domain Analysis
- Complete Exercise 03: Social Media Timeline
Step 4: Your First Real Case (8-12 hours)
- Get written authorization from your instructor
- Copy the Case-Template folder
- Fill out each section step-by-step
- Use the Case Completion Checklist
- Submit for review
| Level | Duration | Best For | Example |
|---|---|---|---|
| 📗 Beginner | 8-12 hours | First investigation | Single username across 2-3 platforms |
| 📙 Intermediate | 15-25 hours | Building skills | Multi-platform investigation with timeline |
| 📕 Advanced | 30-50+ hours | Experienced students | Complex case with blockchain/infrastructure |
Week 1: Theory + Example Review
├─ Read all SOPs (Legal, OPSEC, Collection)
├─ Study 2025-001-Example-Investigation
└─ Complete Glossary review
Week 2-3: Guided Exercises
├─ Exercise 01 (Username Investigation)
├─ Exercise 02 (Domain Analysis)
└─ Exercise 03 (Social Media Timeline)
Week 4-6: First Independent Case
├─ Get authorization
├─ Select subject (with instructor approval)
├─ Complete investigation
└─ Submit final report
Cases/
├── README.md # This file
├── Glossary.md # OSINT terminology definitions
├── Investigation-Workflow.md # Visual workflow guide
├── Case-Template/ # Empty case template for new investigations
│ └── Case-Completion-Checklist.md # How to know when you're done
├── Student-Exercises/ # Hands-on practice assignments
│ ├── Exercise-01-Username-Investigation/
│ ├── Exercise-02-Domain-Analysis/
│ └── Exercise-03-Social-Media-Timeline/
└── [YYYY-NNN-Case-Name]/ # Individual case folders
├── README.md # Case overview and quick links
├── 00-Case-Overview.md # Detailed case summary
├── 01-Subject-Profiles.md # Entity dossiers
├── 02-Collection-Log.md # Evidence tracking
├── 03-Evidence/ # All collected evidence
├── 04-Reports/ # Investigation reports
└── 05-Admin/ # Administrative files
- 📕 2025-001-Example-Investigation - Social media fraud / cryptocurrency scam investigation
- Difficulty: Advanced (comprehensive example)
- Type: Social media fraud, financial crime
- Demonstrates: Platform OSINT, blockchain analysis, multi-source evidence collection
- Best For: Reference material, understanding complete case structure
- Time to Review: 2-3 hours
-
📗 Exercise-01-Username-Investigation - Track a username across platforms
- Difficulty: Beginner
- Time: 3-5 hours
- Skills: Username enumeration, platform identification, basic profiling
-
📗 Exercise-02-Domain-Analysis - Investigate a suspicious domain
- Difficulty: Beginner
- Time: 3-5 hours
- Skills: WHOIS lookups, DNS analysis, SSL certificate investigation
-
📙 Exercise-03-Social-Media-Timeline - Reconstruct timeline from social media
- Difficulty: Intermediate
- Time: 5-8 hours
- Skills: Timeline analysis, content correlation, evidence documentation
- Case-Template - Empty case structure for starting new investigations
- Includes Case Completion Checklist
- Contains blank Subject Profiles template with prompts for entity profiling
Before starting any investigation:
- Read Legal & Ethics SOP - REQUIRED
- Review OPSEC Planning
- Obtain proper authorization
- Set up isolated investigation environment
# Copy template structure
cp -r Cases/Case-Template Cases/YYYY-NNN-Case-Name
# Example: 2025-002-Domain-Investigation
cp -r Cases/Case-Template Cases/2025-002-Domain-InvestigationFollow this workflow:
- 00-Case-Overview.md - Document case details, scope, objectives
- 01-Subject-Profiles.md - Build entity dossiers using Entity Dossier SOP
- 02-Collection-Log.md - Track all evidence using Collection Log SOP
- 03-Evidence/ - Store all collected materials with SHA-256 hashes
- 04-Reports/ - Compile findings using Reporting SOP
- 05-Admin/ - Maintain authorization, chain of custody, case notes
Choose platform-specific SOPs based on investigation type:
Format: YYYY-NNN-Brief-Description
- YYYY - Year (e.g., 2025)
- NNN - Sequential case number (001, 002, 003...)
- Brief-Description - Short kebab-case description (e.g., Domain-Investigation)
Examples:
2025-001-Example-Investigation2025-002-Twitter-Impersonation2025-003-Phishing-Domain-Analysis
Use these status indicators in case README files:
- 🟢 Active - Investigation in progress
- 🟡 On Hold - Paused pending additional information
- 🔴 Closed - Investigation complete
- 📚 Example - Training/demonstration case (dummy data)
- Immediate Hashing - Calculate SHA-256 for all collected evidence
- Multiple Formats - Capture HTML, screenshots, and WARC archives
- Chain of Custody - Document every transfer and access
- Secure Storage - Use encrypted volumes (AES-256)
- Regular Verification - Check file integrity weekly
03-Evidence/
├── screenshots/ # All screenshots (organized by source)
├── domains/ # WHOIS, DNS, certificate data
├── social-media/ # Platform exports and archives
├── blockchain/ # Transaction data, wallet info
├── images/ # Photos, profile pictures (with EXIF)
├── documents/ # PDFs, emails, text files
├── network/ # Network scan results, passive DNS
└── victim-reports/ # Victim statements and communications
CRITICAL REMINDERS:
- ✅ Only investigate with proper authorization
- ✅ Stay within legal boundaries (no unauthorized access)
- ✅ Respect Terms of Service (document violations if necessary)
- ✅ Maintain chain of custody for legal admissibility
- ✅ Escalate sensitive content immediately (CSAM, violence)
- ❌ Never fabricate evidence
- ❌ Never use obtained information for personal gain
- ❌ Never share case data without authorization
See Legal & Ethics SOP for complete guidelines.
When investigation concludes:
- Internal Report - Summary for organization/client
- Evidence Package - Organized evidence with chain of custody
- Law Enforcement Referral - If criminal activity identified (see Escalation SOP)
- Platform Reporting - ToS violations reported to platforms
Follow Reporting & Disclosure SOP.
Last Updated: 2025-10-12 Maintainer: gl0bal01