Evidence Collection Log - Case 2025-001

Case: Example OSINT Investigation Lead Investigator: [Your Name] Collection Period: 2025-01-10 to 2025-01-15 SOP Reference: sop-collection-log


Collection Summary

CategoryItemsStatus
Screenshots23✅ Complete
WHOIS Records4✅ Complete
Blockchain Data8✅ Complete
Social Media Archives5✅ Complete
Victim Reports15🔄 Ongoing
Network Logs7✅ Complete
TOTAL6295% Complete

Evidence Items

E001: Twitter/X Profile - @crypto_scammer_example

Collection Date: 2025-01-10 14:23 UTC Collector: [Your Name] Method: Manual screenshot + archive.today

Item IDDescriptionFormatHash (SHA-256)
E001-01Profile screenshot (full page)PNGa1b2c3d4e5f6…
E001-02Profile bio close-upPNGb2c3d4e5f6g7…
E001-03Follower list (page 1)PNGc3d4e5f6g7h8…
E001-04Following list (page 1)PNGd4e5f6g7h8i9…
E001-05Tweet timeline archiveHTMLe5f6g7h8i9j0…
E001-06Archive.today snapshotURLN/A

Files Location: 03-Evidence/screenshots/twitter/

Archive URLs:

Tool:

# Screenshot command
firefox --screenshot profile-full.png https://twitter.com/crypto_scammer_example
 
# Archive command
curl -X POST https://archive.ph/submit/ -d "url=https://twitter.com/crypto_scammer_example"

Notes:

  • Account still active as of collection time
  • Captured before potential suspension
  • Multiple archive services used for redundancy

E002: WHOIS Records - Phishing Domain

Collection Date: 2025-01-10 15:47 UTC Collector: [Your Name] Method: WHOIS lookup + historical WHOIS

Item IDDescriptionFormatHash (SHA-256)
E002-01Current WHOIS (crypto-presale-exclusive.com)TXTf6g7h8i9j0k1…
E002-02Historical WHOIS (Dec 15, 2024)TXTg7h8i9j0k1l2…
E002-03DNS records (A, MX, TXT)JSONh8i9j0k1l2m3…
E002-04SSL certificate detailsPEMi9j0k1l2m3n4…

Files Location: 03-Evidence/domains/

Commands Used:

# WHOIS lookup
whois crypto-presale-exclusive.com > whois-crypto-presale.txt
 
# DNS records
dig crypto-presale-exclusive.com ANY +noall +answer > dns-records.txt
 
# SSL certificate
echo | openssl s_client -connect crypto-presale-exclusive.com:443 2>/dev/null | openssl x509 -text > ssl-cert.txt
 
# Historical WHOIS
curl "https://whoishistory.whoisxmlapi.com/api/v1?apiKey=KEY&domainName=crypto-presale-exclusive.com" > whois-history.json

Key Findings:

  • Registrant email: alex.crypto.trades@protonmail.com
  • Privacy protection enabled (contact details hidden)
  • Registered December 15, 2024 (3 weeks before investigation)
  • Hosted on Cloudflare (origin IP hidden)

E003: Victim Direct Messages

Collection Date: 2025-01-11 09:15 UTC Collector: [Your Name] Method: Victim-provided screenshots (with consent)

Item IDDescriptionFormatHash (SHA-256)
E003-01Victim 1 DM conversation (full)PNGj0k1l2m3n4o5…
E003-02Victim 2 DM conversationPNGk1l2m3n4o5p6…
E003-03Victim 3 DM conversationPNGl2m3n4o5p6q7…
E003-04Victim 4 DM conversationPNGm3n4o5p6q7r8…
E003-05Victim 5 DM conversationPNGn4o5p6q7r8s9…
E003-15Victim 15 DM conversationPNGx8y9z0a1b2c3…

Files Location: 03-Evidence/victim-reports/

Collection Process:

  1. Victim contacted investigator via client referral
  2. Consent form signed (allowing use of screenshots)
  3. Victim provided unedited screenshots via encrypted email
  4. Screenshots verified for authenticity (EXIF data, metadata)
  5. Victim identity redacted in documentation (privacy protection)

Common Message Pattern:

"Hey [Name]! 👋 I noticed you follow @RealCryptoGuru.
We're running an exclusive presale for early supporters.
Only 10 spots left - ending tonight!

Check it out: crypto-presale-exclusive[.]com/vip

This is not financial advice, but this could be life-changing 🚀
Let me know if you have questions!"

Notes:

  • All messages follow similar template
  • Personalized with victim’s name (scraped from profile)
  • Urgency tactics consistent across all victims
  • Link always directs to phishing domain

E004: Blockchain Transaction Data

Collection Date: 2025-01-12 11:33 UTC Collector: [Your Name] Method: Etherscan API + manual verification

Item IDDescriptionFormatHash (SHA-256)
E004-01Primary wallet transaction historyJSONo5p6q7r8s9t0…
E004-02Transaction graph visualizationPNGp6q7r8s9t0u1…
E004-03Victim 1 transaction (2.5 ETH)JSONq7r8s9t0u1v2…
E004-04Victim 2 transaction (1.8 ETH)JSONr8s9t0u1v2w3…
E004-05Mixer transaction (Tornado Cash)JSONs9t0u1v2w3x4…
E004-06Exchange deposit addressesCSVt0u1v2w3x4y5…
E004-07Wallet balance historyCSVu1v2w3x4y5z6…
E004-08Smart contract interactionsJSONv2w3x4y5z6a7…

Files Location: 03-Evidence/blockchain/

Primary Wallet Analysis:

Address: 0x1234abcd5678ef90abcd1234ef567890abcd1234
Network: Ethereum Mainnet
First Transaction: 2024-12-20 18:45:32 UTC
Last Transaction: 2025-01-10 03:21:17 UTC
Total Inbound: 87.3 ETH
Total Outbound: 87.3 ETH
Current Balance: 0 ETH
Transaction Count: 104

Data Collection Commands:

# Etherscan API (get transaction list)
curl "https://api.etherscan.io/api?module=account&action=txlist&address=0x1234abcd5678ef90abcd1234ef567890abcd1234&apikey=YOUR_API_KEY" > wallet-txlist.json
 
# Get token transfers
curl "https://api.etherscan.io/api?module=account&action=tokentx&address=0x1234abcd5678ef90abcd1234ef567890abcd1234&apikey=YOUR_API_KEY" > wallet-tokens.json
 
# Get internal transactions
curl "https://api.etherscan.io/api?module=account&action=txlistinternal&address=0x1234abcd5678ef90abcd1234ef567890abcd1234&apikey=YOUR_API_KEY" > wallet-internal.json

Key Transactions:

Tx Hash: 0xabc123def456... | From: Victim 1 | Amount: 2.5 ETH | Date: 2024-12-20
Tx Hash: 0xdef456ghi789... | From: Victim 2 | Amount: 1.8 ETH | Date: 2024-12-22
Tx Hash: 0xghi789jkl012... | To: Mixer    | Amount: 87.3 ETH | Date: 2024-12-29

Analysis:

  • Funds received from 52 unique addresses (victims)
  • All funds immediately forwarded to secondary wallet
  • Secondary wallet sends to Tornado Cash mixer
  • Post-mixer trail goes cold (privacy protocol works as intended)

E005: Instagram Profile Archive

Collection Date: 2025-01-10 16:52 UTC (before suspension) Collector: [Your Name] Method: Manual archive + Instaloader tool

Item IDDescriptionFormatHash (SHA-256)
E005-01Profile screenshotPNGw3x4y5z6a7b8…
E005-02All posts archive (23 images)ZIPx4y5z6a7b8c9…
E005-03Bio and link historyTXTy5z6a7b8c9d0…
E005-04Follower/following listJSONz6a7b8c9d0e1…
E005-05Stories archive (7 items)ZIPa7b8c9d0e1f2…

Files Location: 03-Evidence/social-media/instagram/

Collection Tool:

# Instaloader (open-source Instagram scraper)
instaloader profile crypto.alex.trades --login YOUR_ACCOUNT --dirname-pattern=03-Evidence/social-media/instagram
 
# Download profile picture
instaloader --profile-pic-only crypto.alex.trades
 
# Download all posts
instaloader --no-videos --no-profile-pic crypto.alex.trades

Account Status:

  • Collected: 2025-01-10 16:52 UTC
  • Suspended: 2025-01-12 08:15 UTC (confirmed via platform notification)
  • Reason: Terms of Service violation (suspected impersonation/fraud)

Content Analysis:

  • 23 posts total (all stolen from other accounts)
  • 7 stories showing fake “profit screenshots”
  • Link in bio: crypto-presale-exclusive[.]com (phishing)
  • Comments disabled on all posts (avoiding scrutiny)

E006: Telegram Channel Archive

Collection Date: 2025-01-11 13:28 UTC Collector: [Your Name] Method: Telegram export + manual screenshots

Item IDDescriptionFormatHash (SHA-256)
E006-01Channel profile screenshotPNGb8c9d0e1f2g3…
E006-02Full message history exportJSONc9d0e1f2g3h4…
E006-03Member list (47 users)JSONd0e1f2g3h4i5…
E006-04Media files archiveZIPe1f2g3h4i5j6…
E006-05Pinned messagesPNGf2g3h4i5j6k7…

Files Location: 03-Evidence/social-media/telegram/

Channel Information:

Username: @crypto_alex_official
Title: "VIP Crypto Presale - Alex Morgan"
Description: "Exclusive presale opportunities | Early access | VIP only 🚀"
Members: 47
Created: 2024-11-28 (same day as Twitter account)

Export Command:

# Telegram Desktop: Settings → Advanced → Export Chat History
# Format: JSON + media
# Time period: All time

Message Patterns:

  • Daily posts about “limited presale opportunities”
  • DMs sent to new members with phishing links
  • Fake urgency (“last chance”, “ending tonight”)
  • No actual crypto discussion (pure sales pitch)

E007: Network/IP Intelligence

Collection Date: 2025-01-12 10:15 UTC Collector: [Your Name] Method: Passive DNS, Shodan, IP intelligence APIs

Item IDDescriptionFormatHash (SHA-256)
E007-01Tor exit node logs (public)JSONg3h4i5j6k7l8…
E007-02Cloudflare CDN analysisJSONh4i5j6k7l8m9…
E007-03Passive DNS historyCSVi5j6k7l8m9n0…
E007-04IP geolocation dataJSONj6k7l8m9n0o1…
E007-05Server fingerprint (Shodan)JSONk7l8m9n0o1p2…
E007-06SSL/TLS certificate chainPEMl8m9n0o1p2q3…
E007-07HTTP headers analysisTXTm9n0o1p2q3r4…

Files Location: 03-Evidence/network/

IP Address Analysis:

Primary IP: 185.220.101.42
Type: Tor Exit Node
Location: Frankfurt, Germany (exit node, not true location)
ISP: Anonymous (Tor network)
First Observed: 2024-12-05
Last Observed: 2025-01-10

Website Hosting:

IP: 104.21.45.123 (Cloudflare CDN)
Origin Server: Unknown (protected by Cloudflare)
HTTP Server: nginx/1.21.6
SSL: Let's Encrypt (free certificate)

Collection Commands:

# Passive DNS lookup
curl "https://api.securitytrails.com/v1/domain/crypto-presale-exclusive.com/history/dns" \
  -H "APIKEY: YOUR_KEY" > passive-dns.json
 
# Shodan IP lookup
shodan host 104.21.45.123 > shodan-ip.json
 
# SSL certificate
echo | openssl s_client -connect crypto-presale-exclusive.com:443 -showcerts 2>/dev/null > ssl-chain.pem
 
# HTTP headers
curl -I https://crypto-presale-exclusive.com > http-headers.txt

E008-E015: Victim Interview Statements

Collection Dates: 2025-01-11 to 2025-01-14 Collector: [Your Name] Method: Structured interviews (consent obtained)

Item IDVictimLoss AmountInterview DateFormatHash
E008V0012.5 ETH2025-01-11PDFn0o1p2q3r4s5…
E009V0021.8 ETH2025-01-11PDFo1p2q3r4s5t6…
E010V0033.2 ETH2025-01-12PDFp2q3r4s5t6u7…
E011V0040.9 ETH2025-01-12PDFq3r4s5t6u7v8…
E012V0052.1 ETH2025-01-13PDFr4s5t6u7v8w9…
E013V0061.5 ETH2025-01-13PDFs5t6u7v8w9x0…
E014V0074.0 ETH2025-01-14PDFt6u7v8w9x0y1…
E015V0082.7 ETH2025-01-14PDFu7v8w9x0y1z2…

Files Location: 03-Evidence/victim-reports/interviews/

Interview Structure:

  1. Consent and privacy notice
  2. Background (how they discovered account)
  3. Communication timeline
  4. Financial transaction details
  5. Supporting evidence (screenshots, transaction hashes)
  6. Impact statement

Common Themes:

  • All victims found account via Twitter
  • Most received unsolicited DM
  • All trusted account due to stolen profile picture
  • Urgency tactics influenced decision-making
  • None verified account authenticity before sending funds

Evidence Integrity

Hash Verification

All evidence files have been hashed using SHA-256 for integrity verification:

# Generate hash manifest
find 03-Evidence/ -type f -exec sha256sum {} \; > evidence-hashes.txt
 
# Verify integrity (run periodically)
sha256sum -c evidence-hashes.txt

Hash Manifest Location: 05-Admin/evidence-hashes.txt


Chain of Custody

Evidence IDCollected ByDate/TimeTransferred ToDate/TimePurpose
E001-E007[Your Name]2025-01-10-12Encrypted storage2025-01-10Secure backup
E001[Your Name]2025-01-10Client (copy)2025-01-13Client review
ALL[Your Name]2025-01-15Evidence package2025-01-15LEO referral prep

Custody Log Location: 05-Admin/chain-of-custody.pdf


Storage & Backup

Primary Storage:

  • Location: Encrypted external SSD (AES-256)
  • Access: Password-protected, 2FA enabled
  • Backup Schedule: Daily incremental, weekly full

Secondary Backup:

  • Location: Encrypted cloud storage (client-provided)
  • Provider: Client’s secure infrastructure
  • Encryption: End-to-end encrypted before upload

Retention Policy:

  • Active case: Indefinite retention
  • Post-case: Retain per client agreement (typically 7 years)
  • Destruction: Secure deletion per NIST SP 800-88

Collection Tools Used

ToolVersionPurposeLicense
Firefox121.0Screenshot captureOpen Source
Archive.todayN/AWeb page archivingFree Service
WHOISCLIDomain registration lookupOpen Source
Etherscan APIv1Blockchain data collectionFree/Commercial
Instaloader4.10Instagram archivingOpen Source
Telegram Desktop4.15Telegram exportOpen Source
OpenSSL3.0.2SSL certificate analysisOpen Source
curl8.5.0HTTP requests/downloadsOpen Source
Shodan APIN/ANetwork intelligenceCommercial

Collection Methodology Compliance

SOPs Followed:

Legal Compliance:

  • ✅ All data collected from publicly accessible sources
  • ✅ No unauthorized access to accounts or systems
  • ✅ Victim consent obtained for private communications
  • ✅ Data handling compliant with GDPR/CCPA

Quality Control:

  • ✅ All evidence timestamped and geotagged (when applicable)
  • ✅ Multiple archive methods used (redundancy)
  • ✅ Hashing performed for integrity verification
  • ✅ Chain of custody documented

Pending Collections

Outstanding Items

ItemDescriptionStatusExpected Date
P001Victim 9-15 interviews🔄 Scheduled2025-01-16
P002Additional blockchain wallet analysis🔄 In progress2025-01-17
P003Historical domain registration data🔄 Awaiting API access2025-01-18
P004Cross-reference with similar scams🔄 Research phase2025-01-20

Collection Notes

Challenges Encountered

Technical:

  • Instagram suspended mid-collection (resolved: used cached data)
  • Cloudflare hiding origin server IP (limitation: cannot determine true host)
  • Tornado Cash mixer preventing transaction tracing (limitation: accepted)

Legal/Ethical:

  • Victim privacy concerns (resolved: anonymization and consent forms)
  • Cross-border jurisdiction questions (resolved: legal counsel consulted)

Operational:

  • Subject using Tor (limitation: cannot trace real IP)
  • ProtonMail refusing disclosure (expected: privacy-focused service)

Lessons Learned

  1. Archive early and often: Instagram suspension highlighted importance of immediate archiving
  2. Multiple sources: Redundant collection methods prevented data loss
  3. Victim engagement: Personal interviews provided valuable context beyond digital evidence
  4. Documentation: Detailed logging essential for legal proceedings

Collection Log Maintained By: [Your Name] Last Updated: 2025-01-15 18:45 UTC Next Review: 2025-01-16 09:00 UTC Status: 🟢 Active Collection