1. OSINT Investigation Report (PDF)
– Clear, structured findings based on your request (person, company, wallet, domain, threat actor, etc.)
– Verified sources, links, screenshots, and summary of key intelligence
2. Evidence Package
– Screenshots, archived pages, metadata, or blockchain data (when applicable)
– Source links and archived copies for verification or legal use
3. Risk or Exposure Assessment
– Summary of digital risks or anomalies (e.g., fake profiles, leaks, darknet mentions, impersonation)
– Risk classification (Low / Medium / High) with justification
4. OSINT Source Map (optional)
– Diagram or list of connected profiles, identifiers, infrastructure, and digital traces (when relevant)
5. Recommendations & Next Steps
– Guidance on what to do with the intelligence (report, block, secure, trace further, etc.)
– Optional follow-up questions (Q&A via email or 30-min consultation, if included)