How Friend Overlap Analysis Reveals Hidden Accounts, Alternate Personas, and Social Graph Secrets

How Friend Overlap Analysis Reveals Hidden Accounts, Alternate Personas, and Social Graph Secrets

How Friend Overlap Analysis Reveals Hidden Accounts, Alternate Personas, and Social Graph SecretsKirby
Published on: 23/04/2026

In the world of open-source intelligence, the most powerful insights rarely come from what is explicitly visible. Instead, they emerge from patterns, connections, overlaps, and relationships that most people never think to analyze.

Analysis
AI Is Already Inside Your Business, And You’re Probably Not Auditing It

AI Is Already Inside Your Business, And You’re Probably Not Auditing It

AI Is Already Inside Your Business, And You’re Probably Not Auditing ItKirby
Published on: 23/03/2026

There’s a paradox happening. Organizations are debating whether to “adopt AI,” while simultaneously, AI is already embedded in the tools their teams use every day. No announcement. No rollout plan. No big transformation initiative. Just quietly becoming more efficient.

Artificial Intelligence
Why We Created the Applied Investigations Spring Cohort | Tool Evaluation Cohort

Why We Created the Applied Investigations Spring Cohort | Tool Evaluation Cohort

Written By Kirby Plessas
Published on: 15/03/2026

Investigators today operate in an environment defined by rapid technological change. The number of available OSINT platforms, analytical tools, and data sources continues to expand at an unprecedented rate. While this growth presents new opportunities, it also introduces a practical challenge: how to systematically evaluate and integrate tools into investigative workflows. Many investigators rely on a core set of tools that they have used for years, while others adopt new platforms based on peer recommendations, conference demonstrations, or vendor marketing. In both cases, organizations often lack a structured methodology for assessing tools, comparing capabilities, and determining how they fit within existing investigative processes. We created this cohort to address that gap.

Analysis
Why “Always-On” Devices Matter for Privacy and Surveillance

Why “Always-On” Devices Matter for Privacy and Surveillance

Why “Always-On” Devices Matter for Privacy and SurveillanceKirby
Published on: 14/01/2026

Bluetooth tracking is one of the quietest forms of modern surveillance. It’s passive, widespread, largely invisible, no hacking is required, no spyware needs to be installed, and no accounts need to be accessed. In many cases, you don’t even have to *use* your device for it to be tracked. If Bluetooth is enabled, your devices may be broadcasting far more about your presence and movement than you realize.

OPSEC