Targeted Reconnaissance Projects
Deep-dive OSINT over 2–4 weeks focused on your organization, executive team, or specific concern. You get a detailed report, an executive brief, and a prioritized remediation roadmap.
Boutique OSINT & Reconnaissance
Deep, human-led reconnaissance that shows you exactly how exposed you really are—before an attacker does. Clear, confidential intelligence and a concrete remediation plan.
We’re a boutique practice. We work with a small number of clients who need clarity and discretion.
Every engagement is custom-scoped, but most clients come to us for one of three things:
Deep-dive OSINT over 2–4 weeks focused on your organization, executive team, or specific concern. You get a detailed report, an executive brief, and a prioritized remediation roadmap.
We quietly monitor your external footprint, breached data, and changing exposure over time. You get scheduled sweeps, rapid alerts for critical issues, and direct access for ad-hoc questions.
Pre-M&A recon, executive protection OSINT, competitor or insider risk analysis, and other complex scenarios where nuance and discretion matter more than speed.
Not sure where you fit? Book a short intro call and we’ll tell you if we’re the right partner—or not.
01 — Scoping & Threat Model
We start with a 45–60 minute call to understand your business, concerns, and risk tolerance. We define scope, assets, and communication channels.
02 — Active Reconnaissance
Over the next 2–3 weeks, we perform deep OSINT collection and analysis across your defined scope—validating findings manually and dropping anything that’s just noise.
03 — Analysis & Reporting
We synthesize everything into a clear threat narrative: what’s exposed, how it could be used against you, and what matters most. You get both an executive summary and a technical appendix.
04 — Debrief & Support
We walk you through the findings, answer questions, and help you prioritize a 30/60/90-day remediation plan. Optional follow-up validation confirms that fixes worked.
You’re not buying another security tool. You’re buying a clear understanding of where you’re exposed and what to do about it.
We don’t sell logins. We deliver a narrative: what’s exposed, how it can be used, and the shortest path to fix it.
We correlate leaks, assets, executives, vendors, and history to build a coherent story an attacker could follow.
We cap active engagements so every client gets senior-level attention throughout scoping, recon, analysis, and delivery.
If you want “10,000 alerts,” there are plenty of platforms. If you want three pages that actually matter, that’s what we do.
Not every situation requires a full reconnaissance engagement. Some individuals and teams want to better understand exposure, adversarial thinking, and defensive posture without commissioning a custom investigation.
For those cases, we offer a small number of carefully designed educational programs. They’re structured explanations of how exposure is identified, prioritized, and reduced—based on the same mental models used in our client work.
A conceptual program on adversarial reasoning, OSINT pattern recognition, and narrative construction. Designed for professionals who want to understand how exposure is interpreted—not just where data exists.
A practical program focused on minimizing correlation risk, passive data leakage, and unnecessary exposure—without attempting to “disappear” online.
Explains how attackers, scammers, and competitors profile organizations using publicly available data—and where most small companies unintentionally expose themselves.
A safety-focused program on how family data becomes discoverable, how children’s digital footprints form, and how to reduce exposure without fear-driven restrictions.
Educational programs are not a replacement for a reconnaissance engagement where real risk exists. In some cases, completing a program helps clients better understand why a custom engagement is necessary—and what questions to ask.
Every scope is different, but most projects fall into these ranges.
From $5,000 for small environments to $15,000+ for complex, multi-entity scopes.
From $3,000/month, with quarterly sweeps, ad-hoc OSINT requests, and direct access.
Pre-M&A, executive protection, and high-stakes projects are scoped individually and typically start around $10,000.
If your budget is unclear, we’ll scope around what matters most and tell you honestly if we’re not a fit.
A typical engagement produces a 50–100+ page report. Here’s the high-level structure:
Want to see a redacted example? Mention it on your consult call and we’ll share a sanitized outline.
We focus on your external attack surface: domains, subdomains, cloud exposure, leaked credentials, code repositories, vendor relationships, executive OSINT, and social engineering vectors. We don’t run intrusive scans against your systems without explicit permission.
Our work is strictly reconnaissance and open-source intelligence. We behave like a careful adversary would—but without crossing legal or ethical lines. We do not disrupt systems or attempt exploitation as part of standard engagements.
You get a written report, an executive summary, and a live debrief call. The report includes evidence, context, risk ratings, and prioritized remediation recommendations. Your internal team, MSP, or vCISO can work directly from our findings.
Yes. Many clients bring us in to complement their existing providers. We’re happy to brief your internal team, MSP, or vCISO and help them translate findings into action.
Extremely. We sign NDAs, restrict access to your data, and use encrypted channels for sensitive communication. We don’t reuse your data in other contexts.
Start with a short, confidential call. We’ll ask a few questions about your goals, make a recommendation, and only suggest an engagement if it clearly makes sense.
If you’re responsible for protecting an organization, an executive team, or a sensitive transaction, you deserve a clear picture of your exposure.
Book a confidential consultNo hard sell. If we’re not the right fit, we’ll tell you and point you somewhere better.