Research fields

Choose the field first, then follow the right path.

Not every researcher starts from the same place. Some verify images, some inspect domains, some check social media claims. This page separates the archive into clear working areas.

OSINT

Open-source research

Research through web pages, archives, official records, news, and public datasets.

OSINT means collecting information from public sources and reporting it in a way that can be checked. This is the main starting point for beginners.

Continue with this field
GEOINT

Location and visual verification

Maps, satellite imagery, terrain, street-level imagery, and fixed visual clues.

GEOINT compares visible location and time clues with maps, satellite imagery, and public geographic sources. The goal is to narrow candidates and write confidence clearly.

Continue with this field
SOCMINT

Social media verification

Public posts, account context, timelines, and claim checks.

SOCMINT reviews social media content by source, date, context, and cross-platform checks. This section is for passive, public, and safe verification.

Continue with this field
CTI

Threat intelligence

IOCs, domains, IPs, hashes, CVEs, and defensive technical indicators.

CTI helps read technical indicators in context and turn them into defensive decisions. The workflows here focus on passive checking, verification, and reporting.

Continue with this field
HUMINT

Source notes and interviews

Consensual interviews, source reliability, note structure, and ethical limits.

In this library, HUMINT does not mean manipulation or contact tactics. It means consent-based interviews, source assessment, evidence judgment, and careful reporting.

Continue with this field
FININT

Financial and blockchain traces

Company records, public filings, crypto wallets, and transaction context.

FININT here means reading financial claims through public records and blockchain data with care. Attribution and ownership claims should always carry confidence levels.

Continue with this field

Short boundary

These fields are for training, verification, defense, and reporting. They are not for doxxing, stalking, harassment, credential hunting, unauthorized access, or targeting private people.