Research

 

Open-Source Intelligence (OSINT)

Collection and analysis of data and other bits of information that are publicly available on the web, in print and other media. I can also send FOIA requests for you.

Social Media Analysis

Analysis of a subject’s social media accounts, both publicly known and hidden/secret profiles. In some cases, interaction with a subject can be conducted using sock puppet (undercover) accounts.

Dark/Deep Web Research

Research and evidence collection within the Dark Web (a.k.a. Darknet), as well as the Deep Web.

Historical Research

Examples include the manufacturing, history and chronological ownership of antiques, fine art, and other objects. The history of structures and land property. Finding unknown/unmarked graves of ancestors.


TRAINING

Investigating Outbreaks of Psychogenic Illness

Shooting Reconstruction

Investigating Sexual Violence

Fingerprint Identification

Visual Documentation of Crime Scenes

Bloodstain Documentation and Collection Methods

Cold Case Research - Missing and Unidentified Persons (National Institute of Justice)

SKILLS

TLOxp

LexisNexis

Thomson Reuters CLEAR

Enformion Tracers

Palantir

i2 Analyst's Notebook

Azure Data Explorer

Accurint Crime Analysis

Tableau

Westlaw

Python for Data Analysis

Magnet VERAKEY

Kaseware Geospatial Analysis


Past Projects

  • In-depth investigation into the financing of illicit activities using new technologies (i.e. untraceable cryptocurrency transactions in the dark web, or employing hawala-style money laundering schemes via cash/banking apps and prepaid cash cards)

  • Political use of social media, particularly as a means of propaganda and psychological warfare

  • Analysis of human trafficking logistical patterns and research on clandestine victim detention locations as well as “mobile” or “pop-up” brothels

  • Human rights violations and war crimes reports

  • Post-incident reports (e.g. military engagements; terrorist attacks; criminal offenses towards civilians by military and paramilitary units)

  • Development and proliferation of emerging military technologies. My research concentrated mostly on WMDs, arms trafficking, cross-border gun-running (small arms trade and smuggling), black market sales, and the practice of illicit gunsmithing (development of customized illegal weaponry for criminal or terrorist groups)

  • All-source conflict analysis, profiling and mapping


 

Photo, Video and Audio Analysis

  • Inspecting digital and print photographs for fakery, anomalies, manipulations, and edits (e.g., Photohop, general heavy editing, AI-generated images, “deep-fake” app edits, enhancement app filters)

  • Finding or estimating the date, time, and location in which the visual media was recorded

  • Investigating the source of the visual media and chain of custody

  • Image enhancement (e.g., lightening, contrasting, sharpness, close-up of sections, etc.)

  • Frame-by-frame analysis of video footage

  • Enhancing any audio in the footage and investigating what each distinct sound is and where it came from

  • Removing white noise and other background noise. Enhance background sounds to be sharper and clearer.

  • Possible sound identification, (e.g., TV show playing in the background or distinguishing a firecracker from a gunshot.

  • Spectrogram analysis

  • Speech and voice analysis

  • Possible voice and speaker identification

  • Audio authentication (i.e. testing possible AI-generated audio)

 

Case Study

Before and after photo enhancement of CCTV frame.


If you need assistance with any kind of research, please let me know by sending me a message.