LodgeOSINT · Workflows

Investigation frameworks.

Repeatable, documented methodology for OSINT work. A framework tells you what to do, in what order, and — critically — when to stop. These are the patterns I return to for every investigation, regardless of starting data.

← Hub Tools Guides Workflows Ethics Contact
Core Framework

The Universal Investigation Protocol

Every OSINT investigation I run, regardless of starting data or complexity, goes through this sequence. The order matters — it establishes a record of progressive discovery and prevents scope creep.

01

Define the question in plain language

Write a single sentence: what specific claim are you trying to verify or refute? Not a topic — a question with a yes/no or specific answer. This sentence is the investigation's scope boundary.

🔒 ethics checkpoint — purpose must be defensive, journalistic, or protective
02

Inventory the starting data

List exactly what you have before you begin: domain name, email address, username, image, phone number, name. Each data type has a specific pivot chain. Knowing what you have determines which tools open first.

03

Open a documentation file immediately

Timestamped markdown file, before any tool is run. Every piece of evidence gets an entry: what you found, where you found it, the exact URL, and the date/time retrieved. OSINT evidence degrades. If you don't capture it now, it may be gone.

04

Work the pivot chain from starting data

Each data type has a natural pivot sequence — domain → WHOIS → IP → hosting history → related domains. Follow the chain systematically. Document every pivot. Do not skip steps because they seem unlikely to yield results.

🔒 ethics checkpoint — is every data source genuinely public?
05

Answer the original question — or document why you can't

Return to the sentence you wrote in step 01. Can you answer it with the evidence collected? If yes — stop, write the summary, preserve the documentation. If no after reasonable effort — "insufficient public evidence to conclude" is a legitimate and honest finding.

Scenario-Specific Workflows

Common investigation patterns.

Starting data: Domain name

Website Ownership Investigation

Tracing who controls a website when registration is anonymized. The pivot chain: WHOIS → IP history → certificate records → reverse WHOIS → hosting history → Wayback Machine → related domains.

ViewDNS.infoCensys Wayback MachineDNSDumpster
Starting data: Email address

Email-Based Identity Pivot

Building a picture from a single email address. The pivot chain: breach check → linked account discovery → username enumeration → social platform cross-reference → domain ownership if it's a custom domain.

HaveIBeenPwnedEpieos SherlockBlackbird
Starting data: Image or video

Visual Media Verification

Confirming the origin, date, and authenticity of a photograph or video. The pipeline: multi-engine reverse image search → EXIF extraction → ELA analysis → geolocation from visual context → timeline check against known events.

InVIDYandex Images FotoForensicsGoogle Earth Pro
Starting data: Your own name or email

Personal Footprint Audit

Running the same investigation against yourself that someone else could run. The self-audit pipeline: Google operators → social platform enumeration → data broker scan → people-search opt-out → ongoing monitoring setup.

Google advanced operatorsSherlock IntelTechniquesGoogle Alerts