FRONTLINEPRIVACY
Threat

Social media OSINT

Open-source intel pulls from your public posts, bios, and connections to triangulate where you live and work.

Run a free scan. No signup.

What this is

OSINT — open-source intelligence — is the discipline of stitching together public information to identify a person, their home, their schedule, and their family. Most of the data is from social media. Some of it is from data brokers, public records, and other open sources.

The skill is in the stitching. A photo of your back porch with a recognizable cross-street. A check-in at your gym. A tagged post at your kid's baseball game. A LinkedIn entry showing your employer. A Facebook profile listing your spouse. None of these alone is identifying. Together, they triangulate.

Why first responders catch this more

You don't need to post anything specific to be vulnerable. A handful of innocuous posts over months adds up. Anyone willing to spend an hour can usually triangulate.

For undercover and federal LE, social-media exposure can compromise more than home safety. Old college tags, a sibling's family photos including you, a high-school reunion post — any of it can connect a current cover identity back to a real one.

What we sweep that prevents the chain

We don't operate your social accounts. That part is on you — lock down what you control: privacy settings, location tagging, removal of geotagged photos, removal of tags by family members.

What we do handle is the broker side. Even when someone has done the OSINT work to identify you, the home address still usually comes from a broker page. We close that loop. Standard opt-outs across 200+ broker sites, re-checked every two weeks.