fbpx

Computer Search – Open source

Computer search and open sourcing became more recurrent since the development of new information and communication technologies.

Open source searches are, as the name suggests, information collected from an open source. This means that the intelligence is visible to all.

However, it is important not to misinterpret it so as not to fall under the law.

Computer research called OSINT (Open Intelligent Source) is one of the investigative techniques available to the private investigator. The private investigator is looking for useful and visible data about a natural or legal person.

To do this, the Prometheus Group provides you with one or more private detectives specializing in OSINT research. The investigations carried out are then the subject of a detailed report and admissible before the competent courts.

Ouragency has a team of computer scientists of answering your problem.

Prometheus Group - address search

We search for Malwares, Rootkit, Backdoor for our clients to look for possible traces of intrusions into a computer system. It is therefore a question of securing the computer network.

Insome cases, in this case adultery, we carry out a thorough inspection of the computer system.

From the analysis of newspapers and history to computer monitoring on possible dating sites through the extraction of hard drives, Divorce 2.0 has for some time been recognized by the competent courts.

Ourteam is also able to trace the IP addresses of malicious users.

Our Agency also conducts so-called “vulnerability” audits to advocate a new network architecture or a complete rewrite of the security process. At the end of our investigations, a detailed report is provided.

Détective privé - Recherches informatiques

The definition of the OSINT survey!

The OSINT or “Open Source Intelligence” or “Open Source Information.”

The information is therefore accessible and not classified. The OSINT survey collects valuable information.

There are four main parts that cut out the information:

  • Open Source Data (OSD):
    First-impression data (photos, recording or letter)
  • Open Source Information (OSIF): Editorial data
  • Open Source Intelligence (OSINT): It is a matter of processing data left open, broadcast to a select audience and responding to a specific request
  • Validated OSINT (OSINT-V): This is to process high-security data not accessible to private investigators

How do I use OSINT ?

Computer searches known as OSINT are generally used to:

  • Detect fraud, scams
  • Updating bleaching networks
  • Connecting individuals and corporations

The OSINT investigation and the private investigator !

The private investigator’s job is primarily to gather information to:

  • Establish the link between individuals (physical or moral)
  • Re-trace a person’s past to hide it
  • Search for people or backgrounds
  • Establishing a person’s profile
  • Check the presence of a person at a T moment thanks to social networks

The Open Source Investigation is useful for the private investigator in the following investigations:

  • Scam
  • Insurance fraud
  • Traffic of influence
  • Solvency and wealth surveys
  • Fraudulent insolvency organization
  • Against criminal investigation
The appointment
The strategy
The mission
The report

The appointment is made by a licensed private investigator of the Prometheus Group:

  • On videoconferencing
  • By phone
  • In the premises of the Prometheus Group
  • In a place of circumstance

This appointment is neither paid nor time-limited.

The private investigator will take the time necessary to listen to you in order to gather all the information necessary to put in place a strategy tailored to your needs.

The strategy will be offered to you based on the information received,the type of mission and the location where it should be carried out.

However, the strategy will be:

  • Adapted to the mission
  • Budgeted according to your needs and possibilities
  • No final extra cost (unless you expressly request to continue the mission)

This strategy will be offered to you via a mission mandate containing different otpions.

Once the proposed warrant has been duly signed, the private investigator assigned to your investigation will work with you to:

  • A mission schedule (modified according to events)
  • A location tracking (without you)

Then the mission will be carried out in accordance with the laws in force. During the mission, the private investigator responsible for carrying out the mission will keep you informed of the progress of the mission.

An investigation report will be provided at the end of the mission.

That will be:

  • Objective (findings of what the detective sees)
  • Detailed and detailed
  • Productable before the competent courts if necessary

Find out more!

What is an open source survey?

Open source is defined by open information, that is, information that everyone can find, collect freely, without having any particular access. An open source survey is then conducted to search for all the information for a specific purpose (a person, an object, a place, an event, …), this survey will be carried out on all media accessible to the public.

Can you hack into a computer?

A detective is subject to the same laws as any citizen, he is forbidden to hack a computer. If he does this, he risks heavy penalties and puts his business at risk.

Can you hack into a cell phone?

Mobile phone hacking is not part of a detective’s skill. The latter cannot and forbidden to carry out any kind of computer hacking.

Is it legal to retrieve my wife's mobile phone password? my husband?

When people are married, they have various obligations due to marriage. But individuals still keep a private life, so having the password of the laptop without consent and using it to search can be considered an invasion of privacy. That is, it is legally prohibited. The person may be prosecuted civilly for invasion of privacy or violation of correspondence. But she can also be criminally prosecuted for stealing login credentials.

How do I trace an IP address?

Reassembling an IP address requires solid computer skills and is not possible by anyone. In theory, it would be necessary to be able to use “illegal” software in order to be able to reassemble the information emitted by the IP address. Only Internet Service Providers (ISPs) have IP addresses that are generally not searchable.

Find the anonymous email sender?

Finding the sender of an anonymous email also requires solid computer knowledge and is not possible by anyone. This manipulation is very complicated if not impossible. You then have to contact a professional in this area, which is also illegal.

Can you intervene in cyber-harassment?

It is difficult to intervene in cyber-harassment. What you need to do for a victim of cyber-harassment is to talk to their loved ones or an anti-cyber harassment association, to take screenshots of the harassment evidence, go to the police station to file a complaint and lock their accounts on the networks.