For Public

    For Public

    Personal Digital Footprint

    Red Team OSINT – Simulation of an Attack on Your Digital Identity

    Most people believe that the information that can be found about them online is limited to search engine results, social media, and public registries. The reality, however, is significantly more complex.

    There is often much more information available in public sources than individuals realize. This information is frequently scattered across hundreds of sources – in archives, historical databases, discussion forums, older registries, or other hard-to-access locations that are not commonly indexed by search engines, or that exist as digital traces created many years ago. Individually, these pieces of information may seem insignificant – but when properly connected, they can form a highly accurate profile of a specific individual. The result is a comprehensive digital identity that may provide potential attackers with access to a broader range of attack vectors targeting that individual.

    This is precisely the principle behind OSINT (Open Source Intelligence) – the systematic collection, analysis, and correlation of both visible and hidden information from publicly available sources.

    This service simulates a situation in which a technically skilled and highly motivated individual takes a focused interest in you and has sufficient time, knowledge, and resources to gather as much information as possible.

    Simulation of a real attack on your person

    Within this service, I approach the analysis with the same mindset as a real attacker.

    This includes:

    • systematic collection of information across a wide range of sources, with emphasis on less-known, hidden, or hard-to-access sources
    • in-depth analysis of historical digital traces
    • correlation of seemingly unrelated information
    • identification of sensitive data
    • analysis of potential misuse scenarios

    The objective is not only to determine what information exists about you, but primarily how it could be used against you.

    Deep OSINT investigation

    The core of the service consists of 24 hours of pure analytical work (3 mandays) dedicated exclusively to gathering and analyzing information about a specific individual.

    During this time, I systematically:

    • conduct an in-depth collection of information about the individual with the goal of achieving maximum depth
    • analyze not only current digital traces, but also historical data, which often serve as the key to uncovering current information that would otherwise be extremely difficult, if not nearly impossible, to obtain
    • apply specialized methods, procedures, and techniques to uncover hidden information
    • identify connections between individual data points
    • thoroughly verify the findings
    • reconstruct potential information chains that could be exploited in an attack

    The limit of 3 working days is set to ensure that the service realistically simulates an attack while remaining financially accessible.

    It is important to understand that a real attacker may dedicate significantly more time to such analysis. However, due to experience, specialized methods, and a focused approach, it is often possible to uncover within these three days information that an inexperienced individual would take weeks to find.

    If necessary, the scope of the analysis can be extended individually with additional days of investigation.

    Only legal sources

    The investigation is conducted exclusively using publicly available sources.

    This means:

    • no accounts are breached
    • no individuals from your surroundings are contacted
    • no illegal methods are used

    If, during the analysis, historical data breaches involving credentials are identified, you will be informed in the final report. Verification of the validity of login credentials is always performed by the client.

    Who this service is for

    This service is particularly suitable for individuals who require a higher level of control over their privacy and information security. It also enables a deeper understanding of one’s digital identity and what information about them may be publicly accessible.

    Typical clients include, for example:

    • politicians and public figures
    • managers and company owners
    • key employees in strategic organizations
    • individuals working in sensitive or high-risk sectors
    • investors or entrepreneurs
    • individuals for whom privacy protection is a key priority
    • people who are or have been targets of attacks or extortion

    Why someone may become a target

    A common assumption is: “There is nothing of value to take from me.”

    In practice, however, individuals may become targets for a wide range of reasons. The motivation of an attacker is not always financial gain. In some cases, it may involve obtaining sensitive information, damaging reputation, gaining access to another target individual or organization, or it may stem from personal conflict, past disputes, or an intent to cause harm.

    An attack on an individual may take forms such as:

    • social engineering and fraud-based attacks
    • identity theft
    • targeting a person due to their connections to others who may be the primary target
    • attempts at extortion
    • competitive intelligence or business conflict
    • targeted attacks on a company through its employees
    • stalking or personal conflicts
    • media or reputational attacks

    What the client receives

    The output of the service is a detailed analytical report, which includes:

    • an overview of identified information
    • a summary of all relevant information that could be obtained about the individual
    • identification of sensitive data

    Special emphasis is placed on information that may represent a security risk, such as:

    • personal data
    • identification of locations associated with the individual, such as residence, regular movement, or frequently visited places
    • contact information
    • historical digital traces and personal background
    • personal interests
    • hidden personal or business activities
    • hidden assets
    • connections to other individuals, particularly those representing potential security or reputational risks
    • family connections (only with proper consent for personal data processing)
    • sensitive or compromising information

    Analysis of potential attack vectors

    Based on the identified information, I determine possible scenarios in which an attacker could exploit this data.

    Recommendations for data removal

    The process of removing information from the internet is highly complex. Companies specializing in “data removal” often eliminate only basic and easily accessible information, as systematic identification and removal of even seemingly insignificant data is extremely time-consuming. However, these minor traces can often enable attackers to uncover more critical information or build chains leading to sensitive data. This service therefore highlights even seemingly insignificant data points, along with recommendations on how to safely remove them and an explanation of how they may lead to more serious risks, thereby significantly reducing potential security threats.

    The report includes recommendations on which information should be removed or have its availability minimized. The actual removal of data is not part of this service; however, I can provide follow-up consultation on how to achieve these changes.

    Discretion and confidentiality

    It should be expected that such an in-depth analysis will almost always uncover sensitive or private information. All identified data is handled with maximum discretion and delivered exclusively to the client through secure and encrypted communication. Confidentiality and data handling are contractually secured to ensure full protection of privacy and information integrity.

    Option for deeper investigation

    A sophisticated attacker typically does not rely solely on OSINT. In practice, they often use additional intelligence disciplines such as HUMINT (human intelligence), offline operational activities, or targeted social engineering. If the client is interested in a deeper security analysis, further phases of investigation can be arranged individually. These services are always handled on a case-by-case basis.

    Cooperation

    How cooperation works

    1. 1The client contacts me via email.
    2. 2This is followed by a free in-person meeting where we discuss the details of the investigation.
    3. 3We discuss the scope of work, time requirements, and conditions of cooperation.
    4. 4If cooperation is initiated, it begins with signing a cooperation agreement, a confidentiality agreement, and documents related to the processing of personal data. The starting point of the investigation is only the individual’s first name, last name, and visual appearance. No additional information from the contract or communication with the client is used, in order to ensure that the investigation realistically reflects real-world conditions.
    5. 5The investigation is then initiated.
    6. 6Within the agreed timeframe, the client receives a final analytical report delivered securely.
    7. 7If requested, a personal consultation may be conducted to explain the findings and recommend further steps. Based on the results, I can also propose individual security measures and assist with establishing a long-term strategy for future protection.

    Service pricing

    The price for this service is: CZK 80,000 (the company is not a VAT payer)

    The price includes:

    • 24 hours of comprehensive OSINT investigation and analytical work
    • preparation of a detailed final report
    • secure and encrypted delivery of results
    • final consultation meeting to explain findings and recommendations

    If the client requires a longer investigation, analysis of additional individuals (e.g., family members), or an extension of the service, the terms are handled individually.

    Contact

    If you are interested in this service, do not hesitate to contact me.