9 Ways to Catch a Cheating Spouse and One Way to Stop the Hunt Before It Begins

Jerry Nelson
Nov 3 · 4 min read

The CIA acknowledges the value of OSINT because information does not have to be secret to be valuable.

There is a trove of endless information available on anyone, anywhere, and anytime.

Just a portion of the type of data findable by OSINT includes:

OSINT comes from data which is already widely available, including

  • The Internet,
  • Traditional mass media such as television and radios,
  • Trade Journals
  • Photos, and
  • Social Media

The challenge is in identifying relevant, reliable sources from the immense array of data publicly available. For anyone who knows how to access the knowledge, and leverage it, a new tailored knowledge can be created on the fly.

Cheating Spouses

It’s very easy to cheat now with the spread of technology, but it’s also made it easier to nab a cheater and make that person accountable for their actions.

Cheating spouses aren’t the only ones who may be monitoring your online presence. There are spurious employers, charlatanic colleges, and nosy neighbors.

Here is a list of (mostly) free resources to find OSINT and better gather the source of information already used to gather intelligence by suspicious spouses, law enforcement and government bureaucrats.

Spokeo was founded in 2006 as a social network aggregator and has since grown into a leading people search engine. Whether you’re looking for family members, classmates or former Army buddies, Spokeo makes it easy to find and connect people.

The Harvester

The goal of The Harvester is to collect emails, subdomains, hosts, employee names, and more from a variety of public sources such as search engines, and computer databases.

Shodan can help the user find which devices are connected to the web, their location and who is making use of them.

Maltego is an interactive information retrieval tool that producees focused graphs for link analysis. The tool is useful for online investigations for spotting relationships between bits of information from a variety of sources found online.

Hoovers is also an online B2B solution which uses Dun & Bradstreet data for faster acquisition of B2B leads.

FoxOne Scanner

FoxOne is a free OSINT tool and works as a Non-Invasive and Non-Detectable Server Reconnaissance Scanner. As it skips around API limitations and currently detects over 6,000 vulnerable server paths/files — FoxOne never touches the target server.

TinEye is an image search tool, but operates in exactly the opposite manner of Google Image Search which returns results based on keywords. TinEye searches based on image.

Google Hacking DB

Originally built by Johnny Long of Hackers for Charity, The Google Hacking Database (GHDB) is an established and recognized source for querying the ever-widening reach of the Google search engine. In the GHDB, you will find search terms for files containing usernames, vulnerable servers, and even files containing passwords.

Social Mention

Social Mention is a simple and useful piece of software which monitors and tracks social media use. Track on any topic and find out who is talking about your company, or mentioning you by name.

Over to You

If you have others you use, please comment below and we will add them to the list for a follow-up blog.

The Solution

GrapheneOS. While GrapheneOS can’t claw back the treasure trove of information already available freely, it can help you to stop adding to the growing pile.

The Takeaway

GrapheneOS wants to help the security community test real malware. That is why we have added a download to this story.

This download contains an advanced malware called “anubis 2.5” It is an advanced banking trojan, keylogger.

Anubis is capable of stealing SMS messages, photos, videos, contacts, email accounts, calendar events, and browser history from Chrome and Samsung Internet Browser.

It is also able to do screen captures, record audio and spy on the target, and disable Google Play Protect, locking the device’s screen, and encrypting files.

Anubis is an Android banking trojan that targets Android users through malicious apps that are available in the Google Play Store. This trojan steals login credentials and financial information from banking apps in infected Android devices.

This download is for testing purposes only, and for learning about malware how this works. We are not responsible for device damage, but we want the community to realize the world is changing and malware for phones is becoming a serious matter.

GrapheneOS Contact Info

For more information, contact with GrapheneOS:

Business inquiries : Abdoul Rasnab co-founder abdoul.rasnab@gmail.com

Developer inquiries : Daniel Micay founder danielmicay@gmail.com

Phone Number + 31 6 87 93 97 14

Website: GrapheneOS.org

Jerry Nelson is an American freelance writer living the expat life in Argentina. You can find him at any of hundreds of sidewalk cafes and hire him through Fiverr, join the quarter-million who follow him on Twitter or contact him at jandrewnelson2@gmail.com


Originally published at https://www.linkedin.com.

Jerry Nelson

Written by

I am an American freelance writer living the expat life in Argentina. Hire me through Fiverr.com/jandrewnelson

Slush Pile

A “slush pile” is the black hole of editors and publishers. It’s the void into which go forgotten manuscripts. Medium’s slush file is for every author who ever submitted a story, only to see it set lonely and forgotten — and not making money.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade