OSINT Case Study Index

Purpose

This index aggregates canonical open-source investigation cases from across the vault and organizes them by domain and methodology type. It functions both as a navigation node — routing the practitioner from any documented case to the methodology notes that produced it — and as a practitioner reference for understanding what open-source methods have produced in documented, real-world investigations with verifiable evidentiary, legal, or geopolitical outcomes. Each entry connects an empirical case to the technique stack that delivered it, allowing reverse-engineering of methods from outcomes and forward application of methods to new targets.

Case Study Matrix

Conflict Attribution / War Crimes

CaseYearDomainPrimary Method(s)Key OutcomeVault Reference
MH17 (Malaysia Airlines Flight 17 attribution)2014–2019Conflict attributionOSINT, GEOINT, social media geolocation, vehicle tracking (Buk TELAR convoy)Dutch JIT indictment; GRU 53rd Anti-Aircraft Brigade identified as launch unitOSINT for Human Rights
Salisbury/Skripal attack (GRU operatives identified)2018State actor attributionPassport database + flight records + hotel data + social media”Boshirov/Petrov” identified as GRU Col. Anatoliy Chepiga and Dr. Alexander MishkinCounterintelligence, Double Agents, Advanced Persistent Threats
Syria chemical weapons documentation2013–2019War crimes documentationSatellite imagery, video geolocation, weapons identification (munitions remnants)Multiple ICC/OPCW proceedings supported; Khan Shaykhun and Douma attributionOSINT for Human Rights
Anwar Raslan conviction (Syria torture)2022Universal jurisdictionSocial media identification, Caesar files, OSINT corroboration of witness testimonyFirst criminal conviction worldwide for Syrian state torture (Koblenz Higher Regional Court)OSINT for Human Rights, OSINT for Legal Proceedings
Xinjiang detention facilities2017–2020Systematic human rightsSatellite change detection, Chinese-language document research, survivor corroborationDocumentation of 380+ facilities; inputs to UN OHCHR inquiry and parliamentary findingsOSINT for Human Rights, GEOINT

Conflict Monitoring / ISR

CaseYearDomainPrimary Method(s)Key OutcomeVault Reference
Russian pre-invasion force buildup (Ukraine)2021–2022Indications and WarningCommercial satellite (Planet/Maxar), ADS-B/AIS tracking, social media monitoring (TikTok convoy videos)Successful strategic warning with unprecedented public intelligence release by US/UK governmentsIndications and Warning, Intelligence, Surveillance, and Reconnaissance, GEOINT Workflow Guide
Wagner Group in Africa / mercenary tracking2019–2023Non-state actor trackingSocial media, satellite imagery, aircraft registration, payment recordsWagner presence systematically documented in Libya, Mali, CAR, SudanPattern of Life Analysis, GEOINT

Financial / Corporate Investigation

CaseYearDomainPrimary Method(s)Key OutcomeVault Reference
Panama Papers2016Beneficial ownershipLeaked document analysis + corporate registry cross-referencing + OSINT corroboration140 political figures exposed; Mossack Fonseca operating model documentedCorporate OSINT and Due Diligence, Entity Resolution Methodology
Pandora Papers2021Beneficial ownershipSame methodology at larger scale (11.9M documents, 14 offshore providers)330 politicians across 91 countries; multiple resignations and investigationsCorporate OSINT and Due Diligence, Financial Intelligence
Russia sanctions evasion (post-2022)2022–2024Supply chain / sanctionsCustoms manifest analysis, component teardowns, import/export database cross-referencingWestern semiconductors traced to Russian military equipment via third-country transhipmentCorporate OSINT and Due Diligence

Cyber Attribution

CaseYearDomainPrimary Method(s)Key OutcomeVault Reference
NotPetya attribution (Sandworm/GRU)2017APT attributionMalware analysis, infrastructure pivoting, code comparison, false-flag deconstructionFirst public attribution of a nation-state destructive cyberattack; US/UK/NL coordinated statementsAdvanced Persistent Threats, Cyber Threat Intelligence, Attribution
SolarWinds / Sunburst (SVR attribution)2020APT attributionSupply-chain compromise analysis, C2 infrastructure analysis, TTP clusteringAttribution to SVR (APT29/Cozy Bear) via MITRE ATT&CK TTP cluster and infrastructure overlapAdvanced Persistent Threats, Cyber Threat Intelligence
Navalny poisoning (FSB team identified)2020State actor attributionPhone record analysis, flight records, OSINT on FSB personnelFSB Kriminalistika Institute team identified by name (Bellingcat/Insider/Der Spiegel)Counterintelligence, Advanced Persistent Threats

Surveillance Technology / Spyware

CaseYearDomainPrimary Method(s)Key OutcomeVault Reference
Pegasus/NSO Group exposure2016–2021Surveillance technology trackingInfected-device forensics, network scanning (Citizen Lab methodology), victim mappingNSO Pegasus documented in 50+ countries; multiple governments implicated; US Commerce blacklistAdvanced Persistent Threats, Counter-OSINT Methodology
FinFisher/FinSpy tracking2012–2020Surveillance technologyNetwork scanning, export tracking, binary analysisCommercial surveillance tool documented in authoritarian contexts; insolvency 2022Counter-OSINT Methodology

Methodology Cross-Reference

The following table inverts the matrix above, mapping each core method to the canonical cases that exemplify it. This view supports practitioner navigation from technique to documented application.

MethodCanonical Cases
Satellite imagery / change detectionXinjiang, Ukraine buildup, Syria chemical weapons, Wagner in Africa
Social media geolocationMH17, Syria chemical weapons, Salisbury
Corporate registry / beneficial ownershipPanama Papers, Pandora Papers, Russia sanctions evasion
Malware / infrastructure analysisNotPetya, SolarWinds, Navalny, Pegasus
Phone / flight record analysisNavalny poisoning, Salisbury
Document cross-referencingAnwar Raslan, Panama Papers, Xinjiang
AIS/ADS-B trackingUkraine buildup, sanctions evasion shipping

Vault Navigation

Deep methodology notes that produced — or could reproduce — results in the cases above:

OSINT for Human Rights, OSINT for Legal Proceedings, Geolocation Methodology, GEOINT Workflow Guide, Pattern of Life Analysis, Entity Resolution Methodology, Network Analysis Methodology, Link Analysis, Disinformation Detection Methodology, Cyber Threat Intelligence, Advanced Persistent Threats, Counter-OSINT Methodology, POI Profiling Methodology, Corporate OSINT and Due Diligence, Crypto Tracing Tools Guide, Dark Web Methodology.

Each case in the matrix above can be back-traced to one or more of these methodology nodes. Conversely, each methodology node should — where possible — cite at least one case from this index as a documented application precedent. This bidirectional linking is the structural mechanism that converts the vault from a glossary into a working reference for live investigations.

Key Connections

OSINT, OSINT for Human Rights, OSINT for Legal Proceedings, Attribution, Geolocation Methodology, Entity Resolution Methodology, Pattern of Life Analysis, Advanced Persistent Threats, Cyber Threat Intelligence, Corporate OSINT and Due Diligence, Counterintelligence, Indications and Warning, OSINT Community Ecosystem.