Case 2025-001: Example Investigation

⚠️ IMPORTANT: This is a DUMMY CASE for demonstration purposes only. All data is fictional.

Difficulty: 📕 Advanced (comprehensive reference case) Best For: Understanding complete investigation structure Time to Review: 2-3 hours



Case Summary

Case Number: 2025-001 Status: 🟢 Active (Example) Type: Social Media Fraud / Cryptocurrency Scam Priority: Medium Estimated Loss: 150,000 USD

Threat Actor: “Alex Morgan” (pseudonym)

  • Twitter: @crypto_scammer_example
  • Telegram: @crypto_alex_official
  • Instagram: @crypto.alex.trades (suspended)

Key Findings:

  • Impersonation of verified crypto influencer
  • Phishing website (crypto-presale-exclusive[.]com) - now taken down
  • 50+ victims identified
  • Funds laundered through Tornado Cash mixer

Directory Structure

2025-001-Example-Investigation/
│
├── 00-Case-Overview.md           ← Start here
├── 01-Subject-Profiles.md         ← Threat actor details
├── 02-Collection-Log.md           ← Evidence tracking
├── README.md                      ← This file
│
├── 03-Evidence/                   ← All collected evidence
│   ├── screenshots/
│   │   ├── twitter/
│   │   ├── instagram/
│   │   └── telegram/
│   ├── domains/
│   │   ├── whois-crypto-presale.txt
│   │   └── dns-history.json
│   ├── social-media/
│   │   └── instagram-archive.html
│   ├── blockchain/
│   │   ├── wallet-txlist.json
│   │   └── tx-graph.png
│   ├── victim-reports/
│   │   ├── victim-001-dm.png
│   │   └── interviews/
│   └── network/
│       └── passive-dns.json
│
├── 04-Reports/                    ← Investigation reports
│   ├── final-report.md (pending)
│   ├── executive-summary.pdf (pending)
│   └── evidence-package.zip (pending)
│
└── 05-Admin/                      ← Case administration
    ├── engagement-letter.pdf
    ├── evidence-hashes.txt
    ├── chain-of-custody.pdf
    └── case-notes.md

How to Use This Case

For Training/Learning

This dummy case demonstrates:

  1. Proper case file structure for OSINT investigations
  2. Evidence collection and documentation best practices
  3. Subject profiling techniques for social media threat actors
  4. Timeline reconstruction from digital evidence
  5. Legal and ethical considerations throughout investigation

As a Template

You can use this case as a template for real investigations:

  1. Copy the directory structure
  2. Replace dummy data with real evidence
  3. Follow the same documentation format
  4. Maintain chain of custody and hashing procedures
  5. Reference appropriate SOPs from the vault

SOPs Referenced in This Case

This example case demonstrates the application of these SOPs:

Legal & Ethics:

Operational Security:

Platform-Specific:

Technical Analysis:

Documentation:


Investigation Timeline

DateMilestone
2024-11-28Fake Twitter account created
2024-12-15Phishing domain registered
2024-12-20First victim deposits funds
2025-01-10Investigation initiated
2025-01-12Instagram account suspended
2025-01-13Phishing domain taken down
2025-01-15Case file created

Key Evidence Highlights

Digital Footprint

  • 3 social media accounts across Twitter, Instagram, Telegram
  • 1 phishing domain (now suspended)
  • 52 blockchain transactions totaling 87.3 ETH
  • 15 victim statements with supporting evidence

Attribution Indicators

  • Timezone: UTC+3 (Eastern Europe suspected)
  • Language: Non-native English speaker
  • Infrastructure: Tor, ProtonMail, Cloudflare (anonymity-focused)
  • Technical skill: Medium (can clone websites, use privacy tools)

Financial Impact

  • Victim count: 50+ identified
  • Total stolen: ~$150,000 USD equivalent
  • Recovery potential: Low (funds laundered through mixer)

Next Steps (If This Were Real)

  1. Complete victim interviews (5 pending)
  2. Prepare evidence package for law enforcement
  3. File IC3 report (FBI Internet Crime Complaint Center)
  4. Coordinate with platforms for additional account takedowns
  5. Monitor for rebranding (suspect likely to create new personas)

Learning Objectives

After reviewing this case, you should understand:

✅ How to structure and organize an OSINT investigation ✅ Proper evidence collection and documentation procedures ✅ Building comprehensive subject profiles from public data ✅ Blockchain analysis for cryptocurrency fraud investigations ✅ Legal and ethical boundaries in OSINT work ✅ Timeline reconstruction from multiple data sources ✅ Preparing evidence for law enforcement handoff


Disclaimer

This is a fictional case created for training purposes.

  • All names, handles, addresses, and transaction hashes are invented
  • The threat actor “Alex Morgan” does not exist
  • No real individuals were harmed or defrauded
  • Domain names and IP addresses are examples only
  • Any resemblance to real persons or cases is coincidental

Do not attempt to contact or investigate any entities mentioned in this case.


Questions or Feedback?

This example case is part of the OSINT & Security Reference Library.

For more information:


Case Created: 2025-01-15 Last Updated: 2025-01-15 Status: 📚 Training Material Classification: UNCLASSIFIED / EXAMPLE