OBSERVA emblem

OBSERVA

Legal OSINT, not surveillance

OBSERVA converts dual-use topics into defensive awareness, detection indicators, mitigation guidance, legal warnings and non-executable checklists. It does not provide exploit execution, stealth, bypass, credential theft or unauthorized scanning.

OSINT Verification Workflow

1Define scope, purpose, legal basis and stop conditions
2Select lawful public sources and document source reliability
3Capture URLs, timestamps, screenshots and context
4Score confidence by corroboration, recency and provenance
5Minimize personal data and avoid doxxing or harassment
6Separate facts, assumptions and open questions
7Export a reviewable evidence packet

OSINT

Legal OSINT workflow

Plan, capture, evaluate and verify publicly available information within lawful scope.

Defensive use

Support investigations, brand protection, fraud triage and evidence preservation.

Potential indicators

  • - Source provenance
  • - Capture timestamp
  • - Corroboration count
  • - Contradictory evidence

Mitigation direction

  • - Define scope
  • - Avoid doxxing
  • - Use confidence ratings
  • - Preserve source URLs

No evasion, sock-puppet abuse, harassment, scraping against terms or private-data collection.

Authorized use only

SpiderFoot

An OSINT automation platform that can aggregate public signals about domains, IPs, emails and organizations.

Asset discovery, exposure review and lead generation for authorized investigations.

Safe use cases

  • - Owned-domain exposure review
  • - Brand monitoring
  • - Internal asset inventory validation

What not to do

  • - Do not target third parties without permission
  • - Do not run broad scans
  • - Do not collect sensitive personal data without basis

Legal boundary: Use only on assets, data and investigations you own or are explicitly authorized to assess.

Data sensitivity: May aggregate personal, breach-adjacent or infrastructure metadata; handle as sensitive investigation data.

OBSERVA integration: Represent findings as mock graph nodes, evidence leads and confidence-rated observations.

Authorized use only

Maltego

A link-analysis and graph visualization platform for entities and relationships.

Visualize relationships between assets, organizations, domains and evidence items.

Safe use cases

  • - Case mapping
  • - Source corroboration
  • - Vendor or domain relationship review

What not to do

  • - Do not use to stalk or dox people
  • - Do not enrich private individuals without lawful purpose

Legal boundary: Use only on assets, data and investigations you own or are explicitly authorized to assess.

Data sensitivity: Graphs can reveal sensitive relationships and must be access-controlled.

OBSERVA integration: Map OBSERVA knowledge nodes and evidence items into a local relationship matrix.

Authorized use only

theHarvester

An OSINT utility often used to discover public email, host and domain references.

Review owned organizational exposure and update security awareness or contact hygiene.

Safe use cases

  • - Owned-domain contact exposure
  • - Phishing surface review
  • - Public footprint inventory

What not to do

  • - Do not harvest third-party identities for abuse
  • - Do not combine with phishing workflows

Legal boundary: Use only on assets, data and investigations you own or are explicitly authorized to assess.

Data sensitivity: Email and people data are personal data; minimize and protect it.

OBSERVA integration: Show as a legal OSINT source type with confidence and minimization controls.

Authorized use only

Recon-ng

A modular reconnaissance framework used in OSINT and security assessments.

Teach workflow structure, source tracking and authorized-scope discipline.

Safe use cases

  • - Lab-only OSINT education
  • - Owned asset inventory
  • - Methodology training

What not to do

  • - Do not automate reconnaissance against unauthorized targets
  • - Do not evade rate limits or terms

Legal boundary: Use only on assets, data and investigations you own or are explicitly authorized to assess.

Data sensitivity: Outputs may contain personal or infrastructure metadata.

OBSERVA integration: Convert modules into non-executable checklist concepts.

Authorized use only

Obsidian

A local-first knowledge management tool.

Maintain case notes, research maps and decision logs.

Safe use cases

  • - Incident notes
  • - Learning library
  • - Evidence index
  • - Decision journal

What not to do

  • - Do not store secrets unencrypted
  • - Do not mix personal data without purpose

Legal boundary: Keep sensitive notes encrypted, access-controlled and retention-bound.

Data sensitivity: Notes may contain personal data, legal analysis or incident evidence.

OBSERVA integration: Use OBSERVA exports as structured notes for a local vault.

Authorized use only

OSINT Framework

A curated directory of public-source research resources.

Plan lawful source selection and compare source reliability.

Safe use cases

  • - Collection planning
  • - Source evaluation
  • - Training

What not to do

  • - Do not use sources to harass, dox or bypass privacy controls

Legal boundary: Use only on assets, data and investigations you own or are explicitly authorized to assess.

Data sensitivity: Source lists can lead to personal data; apply minimization.

OBSERVA integration: Map source types into the OSINT workflow hub.

OSINT Investigation

Lawful public-source research with verification and evidence preservation.

medium
1

Define scope

Write purpose, sources, boundaries and stop conditions.

Evidence: Scope note

2

Legality check

Confirm lawful basis, minimization and terms constraints.

Evidence: Legal review note

3

Capture sources

Save URLs, timestamps, screenshots and context.

Evidence: Evidence capture packet

4

Score confidence

Rate source quality, corroboration and recency.

Evidence: Verification matrix

5

Avoid harm

Do not dox, harass or publish sensitive personal data.

Evidence: Redaction log

Escalate when

  • - Threat to safety
  • - Potential criminal evidence
  • - Sensitive personal data