INHOPE | Webinar Recap: The use of OSINT in the fight against CSAM
Article
Events & Campaigns

Webinar Recap: The use of OSINT in the fight against CSAM

The 2023 Expert Insights season came to a close. During the last webinar of this season, attendees witnessed a fascinating presentation on the value of open-source intelligence (OSINT) in supporting and advancing law enforcement investigations. Maike Borst, a digital specialist at the Dutch National Police outlined various different approaches to using OSINT to identify locations, victims or offenders.


OSINT involves using publicly available data to gather information about an individual, location or organisation. It is a vital component of law enforcement’s investigation process utilised to investigate cases of child sexual abuse and exploitation. After working in various divisions within the Dutch Police, Maike founded a special team focused on solving crimes using OSINT techniques.

She also introduced regular OSINT hackathons, during which police officers with advanced digital skills and OSINT investigators work together on a longtime investigation to solve a case. This could for example include locating a missing person. Maike explained, that these hackathons can be incredibly useful not only to advance investigations and solve both older and new cases but can also be valuable for police officers who want to learn more about OSINT to get familiarised with common OSINT techniques. Especially in cases that seem to have reached a point of no further leads, OSINT can help to think outside the box and uncover new angles that were previously hidden.

How OSINT can advance investigations

During her presentation, Maike Borst took attendees on a deep dive through five investigation cases, which were advanced or solved with the use of OSINT. She explained that in combination with police data, OSINT can be extremely valuable in identifying bad actors, or the potential whereabouts of missing persons. The specific details of these cases have to remain confidential, but we are able to provide a brief overview of the most important takeaways from each case.

Case One: Identification
In the first case outlined by Maike, OSINT was used to identify offenders through metadata in digital files. So-called EXIF data, which is associated with image or video files and contains information about the device, and sometimes its location can be useful in identifying potential offenders. Maike explained, that it is usually a combination of OSINT and police data that helps to identify offenders.

Case Two: Geolocation
Various OSINT methods can be used to determine the location of a person in an image or video. Maike outlined that it can be helpful to identify distinct objects or locations visible in the image. Landmarks, local brands, or foreign languages can all be indicators of the location. Reverse Google image search can be a helpful tool in identifying items or places.

Case Three: Victim Statement
Maike explained, that even for cases in which no technology was involved, OSINT can be a useful tool in identifying offenders. Sometimes just as much as a victim statement can help pinpoint specific characteristics of the offender which can then be found through OSINT techniques.

Case Four: Usernames
Many people use usernames to disguise their identity online. Even though usernames might seem entirely anonymous, internet searches with various browsers like Google. Bing, Yandex, DuckDuckGo, Ask, Wow and more can help identify linked accounts, more information about the username origin or other information that could be useful in identifying the person behind the account. Maike emphasised the importance of not giving up in cases where the original account is deleted. “Bad actors will always try to create a new account or start over if their original account was deleted – don’t stop looking if the account is gone."

Case Five: Something Old
Even in cases where very old technology has been used e.g. film photography, VHS video etc. OSINT can be a useful tool in identifying locations or victims. People or places visible in old photographs, for instance, might have created social media accounts or shared other traceable information online. Maike emphasised how in any case, regardless of how old OSINT might be a useful tool in advancing investigations.


All the cases Maike outlined in her presentation pointed towards one conclusion: combining OSINT with police information offers opportunities for amazing breakthroughs in both old and new investigations and can save victims' lives.
But the police alone, cannot do everything on their own. Collecting data and information in the form of reports is critical in advancing their work and collaboration both with hotlines, online platforms and hosting providers are crucial. If you want to contribute to keeping children safe online you can visit Europol's website to help them recognise objects to advance investigations. Trace an object here.


We must continue to raise awareness of the importance of public reporting and encourage anyone who comes across harmful material online to immediately report it to their local hotline. Click here to find your national hotline.

Webinar Recap: The use of OSINT in the fight against CSAM
26.05.2023
'

OSINT involves using publicly available data to gather information about an individual, location or organisation.

'

Recommended articles

A Recap of the European Virtual Forum 2024

The 2024 European Virtual Forum under the theme ‘A Network of trusted flaggers’ created a space for discussion, knowledge-sharing and best practices around the implementation status (...)

A Recap of the European Virtual Forum 2024

Webinar: How the misuse of generative AI mirrors established predatory behaviour

Discover the unsettling parallels between the misuse of generative AI and traditional predatory tactics in our upcoming webinar with Henry Adams, Danielle Williams and Irina Novozhilova (...)

Webinar: How the misuse of generative AI mirrors established predatory behaviour

Webinar Recap: How Predators Online hide in Plain Sight

Over 200 participants joined our latest webinar to learn from Trust and Safety expert David Hunter, how to recognise and uncover threat actor networks online.

Webinar Recap: How Predators Online hide in Plain Sight

Webinar: Understanding User Safety in the Gaming World

As technology continues to evolve, the gaming industry remains a dominant force, shaping our digital landscape. But with great impact comes great responsibility. So how can online gaming (...)

Webinar: Understanding User Safety in the Gaming World

Webinar Recap: How AI is being abused to create CSAM

During our second webinar of the season, we were joined by ‘Alex’ from the Internet Watch Foundation as well as 400+ attendees curious to learn about the evolving threat of AI misuse (...)

Webinar Recap: How AI is being abused to create CSAM

Webinar Recap: INHOPE Annual Report 2023

INHOPE recently launched its Annual Report 2023, outlining the current landscape of child online safety. INHOPE Project Manager Abby Roberts, and Head of Technology and Innovation Kalina (...)

Webinar Recap: INHOPE Annual Report 2023

Webinar: How Predators Online hide in Plain Sight

Where do perpetrators communicate with each other online? While you might believe that these interactions mainly take place on the dark web, this isn't always the case. Often, conversati (...)

Webinar: How Predators Online hide in Plain Sight

Webinar: The INHOPE Annual Report 2023

2023 marked a year of rapid growth and progress for the INHOPE network. We expanded our Secretariat team and board, forged new partnerships, and welcomed several hotlines into our global (...)

Webinar: The INHOPE Annual Report 2023

Webinar Recap: User Empowerment within the Metaverse

Elyse Lee, Head of Policy and Engagement at ZEPETO kicked off our 2024 Expert Insights Webinar series to provide a unique insight into how ZEPETO fosters safety by educating and empoweri (...)

Webinar Recap: User Empowerment within the Metaverse

Webinar: How AI is being abused to create CSAM

Artificial intelligence (AI) has opened doors for both opportunities and challenges in the online child protection landscape. It can offer many advantages in aiding hotlines in the ident (...)

Webinar: How AI is being abused to create CSAM