
OSINT and Digital Intelligence Investigations: The Truth is Online
Beyond a simple search engine. We analyse the web, social media and the deep web to find evidence, hidden assets and crucial reputational information
Every online activity leaves a trace. Arcadia Company conducts professional OSINT investigations to collect, analyse and correlate data from open sources, transforming fragments of web information into strategic evidence. It is not just a simple search engine search, but a complex activity of Digital Intelligence that scans the deep web, social media and international public databases to identify hidden assets or verify the real reputation of individuals and companies.
Thanks to our advanced technologies, we can reconstruct a subject's digital footprint with extreme precision. This activity is essential in both civil and criminal contexts: from verifying the solvency of a debtor flaunting wealth on social mediaWe specialise in the identification of authors of online defamation campaigns. We operate strategically from Milan, providing technical reports with legal value, ready to be presented in court as certain and unalterable evidence.
What is Open Source Intelligence used for?
OSINT is a cross-cutting tool that finds application in numerous investigative scenarios, both corporate and private
- Due Diligence and Reputation: Before a merger or in the case of an important hire, we verify the subject's real reputation, their background, and any hidden issues (e.g. debts, non-evident bankruptcies, risky associations).
- Asset Tracing (Debt Recovery): Often the debtors They hide their assets but flaunt them on social media. By analysing photos and tags, we can locate vehicles, boats or properties not directly registered to the subject but used by them.
- Cyber-Investigation: Identification of online defamation authors, corporate fake news or fake profiles that damage the brand's image.
OSINT and Dismissal for Just Cause
Social media have become a primary source of evidence in employment cases. Case law (e.g. Tribunal of Busto Arsizio, case no. 62/2018 or Cass. Civ. no. 16381/2014) has confirmed the legitimacy of dismissal when an employee:
- Criticises or denigrates the company and its products publicly (reputation damage).
- Insults or threatens colleagues and superiors through posts or comments.
- Posts photos of him on vacation or doing other jobs while he is illness or permit 104.
Our team crystallises these digital evidence, making them unalterable and usable in court, preventing the employee from deleting them once discovered.
Case Studies
OSINT and Digital Intelligence Investigations to Expose a Defamatory Network
Sector: Corporate Intelligence and Digital Security | Location: Internet Network / Milan
1. The Problem (Anonymous Defamation Campaign and Data Breach)
A multinational company approached our agency to tackle a sudden and violent defamatory campaign that appeared online. False accounts on industry forums and social networks were publishing internal confidential documents and targeted negative reviews aimed at destroying the company's reputation online reputation of the brand. The objective was to rely on experts in digital intelligence to identify the anonymous authors of data breach business and block information sabotage.
2. Investigative Strategy (Open Source Intelligence and Forensic Analysis)
Our team of analysts has begun a complex operation to Open Source Intelligence (OSINT), scouring the web on the surface and in depth to reconstruct the digital footprint of the attackers.
- Social Media Intelligence Analysis: Advanced monitoring of social networks to map the network of fake profiles, analyzing linguistic metadata, posting times and recurring interactions.
- Search in the Deep and Dark Web: Investigations into underground forums and unindexed markets to verify the presence of compromised or hacker-sold corporate databases.
- Tracking and Network Analysis: Use of techniques of cyber security investigative to cross-reference the registration data of anonymous domains and trace back to the real digital identity of the creators of defamatory websites.
3. Results and Evidence Collected
The OSINT investigations have enabled the connection of the faint traces left online by the perpetrators, uncovering a genuine espionage and unfair competition operation
- The extraction of metadata (EXIF) from some documents published online has revealed GPS coordinates and system tags that are unmistakably linked to the offices of a well-known competing company.
- The cross-referencing of data showed that the leak of information had originated from a former employee of our client, who had carried out a massive download of confidential files just hours before resigning and moving to a competitor.
- It has been proven that the infrastructure of fake reviewers was managed by a foreign agency, secretly paid by a competitor to orchestrate defamation.
4. Legal Conclusion (Content Removal and Damage Compensation)
We have delivered to the management and legal team of the company a Certified Investigation Dossierincluding forensic acquisition of web pages (valid in court even if the posts are later deleted by the authors).
- Outcome: Based on the irrefutable digital evidence produced by our private investigation agencythe lawyers have filed a formal complaint for aggravated defamationunfair competition and theft of trade secrets.
- Brand Protection: The court has issued a precautionary injunction ordering the immediate shutdown of the defamatory websites and profiles. The client has thus restored their corporate image and initiated a legal process to obtain a multi-million-pound compensation from the rival company.
The Cycle of Digital Intelligence
We don't just search for data, we search for answers. Here's how we turn the web's chaos into an organised dossier.
Data Collection (Harvesting)
We use crawlers and proprietary software to map the digital presence of the subject on search engines, social networks, forums, public databases and international registers.
Filtering and Analysis
This is the critical phase. Our analysts filter out irrelevant or false information (fake news/homonyms) to isolate only the certain and relevant data for the investigation's objective.
Connecting the Dots
We connect the dots: a phone number on an ad, a tag in a photo, an online review. This is often where the hidden truth emerges.
Forensic Report
We produce an investigative dossier that is not just a list of links, but a logical and evidentiary reconstruction of the facts, ready for legal use.
Questions on OSINT and Web Investigations
Clarifications on legality, privacy and differences with hacking.
Is OSINT activity legal?
Absolutely yes. OSINT is based solely on the collection of information from 'Open Sources', i.e., data accessible to the public (even if difficult to find). We do not violate private accounts nor commit unauthorised access.
Can you access someone's private Facebook profile?
No, that would be a crime (hacking). However, OSINT often allows you to obtain the same information by analysing what the subject (or their friends/family) publishes online, or by cross-referencing data from other platforms.
Are evidence collected from social media valid in court?
Yes, but they must be acquired correctly. A simple screenshot is not enough (it is easily falsifiable). We use forensic acquisition techniques that guarantee the integrity and authenticity of the digital evidence.
Can you uncover who is behind a fake profile?
Often yes. Through cross-analysis of timestamps, writing style, partial email recovery, shared photos, and friendship networks, it is possible to trace the real identity of the author with a high degree of probability.
You might be interested in the following articles
Get a free investigative consultation
Don't stay in doubt. Speak with an experienced investigator and receive a personalised action plan immediately.
Office in Milan, Operating throughout Italy
Our private investigation agency is strategically located in Sesto San Giovanni, in the province of Milan. From here, we coordinate investigations throughout the national territory, ensuring a swift and direct response in the main provinces of Lombardy and Northern Italy.



