How Friend Overlap Analysis Reveals Hidden Accounts, Alternate Personas, and Social Graph Secrets

How Friend Overlap Analysis Reveals Hidden Accounts, Alternate Personas, and Social Graph Secrets

How Friend Overlap Analysis Reveals Hidden Accounts, Alternate Personas, and Social Graph SecretsKirby
Published on: 23/04/2026

In the world of open-source intelligence, the most powerful insights rarely come from what is explicitly visible. Instead, they emerge from patterns, connections, overlaps, and relationships that most people never think to analyze.

Analysis
Why We Created the Applied Investigations Spring Cohort | Tool Evaluation Cohort

Why We Created the Applied Investigations Spring Cohort | Tool Evaluation Cohort

Written By Kirby Plessas
Published on: 15/03/2026

Investigators today operate in an environment defined by rapid technological change. The number of available OSINT platforms, analytical tools, and data sources continues to expand at an unprecedented rate. While this growth presents new opportunities, it also introduces a practical challenge: how to systematically evaluate and integrate tools into investigative workflows. Many investigators rely on a core set of tools that they have used for years, while others adopt new platforms based on peer recommendations, conference demonstrations, or vendor marketing. In both cases, organizations often lack a structured methodology for assessing tools, comparing capabilities, and determining how they fit within existing investigative processes. We created this cohort to address that gap.

Analysis
From Telegram to Discord: How Crypto Scams Funnel Victims Step by Step

From Telegram to Discord: How Crypto Scams Funnel Victims Step by Step

From Telegram to Discord: How Crypto Scams Funnel Victims Step by StepKirby
Published on: 18/12/2025

Cryptocurrency scams rarely start with “Send me money.” Instead, they unfold as a carefully staged social funnel, designed to build trust, create urgency, and isolate victims before the financial hit occurs. One of the most common modern patterns is the Telegram → Discord pipeline. Understanding this flow is crucial for identifying red flags early, before significant losses occur. Don’t be locked into Telegram or Discord though, the idea is that a more public and accessible channel is the lure to a more private space.

Analysis