Glossary
OSINT terms, plain English.
Reference glossary for investigators, journalists, and diligence teams. 56 terms.
— A
- Adverse media
- Negative news coverage about a subject — accusations, indictments, regulatory actions, controversies. Standard component of due-diligence reports. Tracelight scans 80,000+ news sources for adverse-media signals.
- Alias
- An alternate identity or username used by a subject. Often the key signal for resolving cross-platform identity in OSINT investigations.
- Audit log
- Immutable record of who did what, when. In Tracelight, every report viewer + download + admin action is logged for the workspace's retention window.
— B
- Background check
- Pre-employment or pre-engagement screening of an individual's history. Regulated by the FCRA in the US when used for employment decisions.
- Beneficial owner
- The natural person who ultimately owns or controls a corporate entity, often hidden behind layers of shell companies. Tracelight's corporate-registry workers surface beneficial-owner data where it's been disclosed.
- BIN
- Bank Identification Number — the first 6-8 digits of a credit card, identifying the issuing institution. Useful in fraud investigations for pattern detection.
- Breach corpus
- Aggregated dataset of leaked credentials and PII from breached services. HIBP, Dehashed, IntelX, and BreachDirectory are major aggregators Tracelight queries.
— C
- Chain of custody
- Documented trail showing how evidence was collected, handled, and preserved from discovery to presentation. Tracelight's citation appendix is a chain-of-custody substitute for OSINT findings.
- Citation appendix
- Section of a Tracelight report listing every claim with a link to the evidence row that supports it, which links to the raw API response. The mechanism that makes the report defensible.
- Claim mill
- Insurance fraud pattern where the same identifiers (address, phone, email, doctor, attorney) recur across many supposedly unrelated claims. Tracelight's cross-case intelligence catches these.
- Confidence score
- Per-evidence-row metric estimating how reliable a finding is, typically based on the source worker's signal quality. Aggregated by Tracelight into 'verified by N sources' badges.
- Consent capture
- Recording the subject's permission to be investigated, with timestamp + supporting evidence. Required by FCRA before generating an employment-screening report.
- Cross-platform identity correlation
- Confirming that handles on Twitter, LinkedIn, GitHub, Reddit, Telegram, etc. all belong to the same person. Tracelight's username probe is the primary tool.
— D
- Dark web
- Web content accessible only through Tor or similar privacy networks. Often hosts breach indices, marketplaces, and forums of investigative interest.
- Daubert challenge
- Motion to exclude expert testimony as scientifically unreliable. Pattern-of-testimony research is a key input.
- Digital footprint
- The aggregate of a subject's online presence — accounts, posts, purchases, registrations. Distinct from real-time location data.
- DKIM
- DomainKeys Identified Mail — cryptographic signature on outbound email proving it was sent by the claimed domain. Required for reliable Resend deliverability from trytracelight.com.
- DMARC
- Domain-based Message Authentication, Reporting + Conformance — policy telling receivers what to do with email that fails SPF or DKIM. Start at p=none, tighten to p=reject.
- Dox / Doxxing
- Publishing an individual's private identifying information online, often maliciously. OSINT investigators must distinguish their professional work from doxxing — Tracelight's audit log + consent capture help establish that distinction.
- DSAR
- Data Subject Access Request — under GDPR, an individual's right to request all data a controller holds on them. Tracelight provides per-subject JSON export endpoints.
- Dual-use data
- Information that's legal to collect for legitimate purposes but harmful if misused (e.g. address history). FCRA + state privacy laws govern permissible purposes.
— E
- Enrichment
- Process of adding context to an identifier by querying multiple data sources. A Tracelight enrichment run executes 32 OSINT workers against a single subject in parallel.
- Evidence row
- Single discrete finding stored in Tracelight — source, finding type, summary, confidence, observed date, raw API response. Building block of every report.
— F
- FCRA
- Fair Credit Reporting Act (US) — regulates the use of consumer reports in employment, housing, credit, and insurance decisions. Imposes consent + notice + adverse-action requirements.
— G
- Geo-tagging
- Embedding location coordinates in social-media posts, photos, or other content. Useful for surveillance deployment + skip tracing.
— H
- HIBP
- Have I Been Pwned — Troy Hunt's breach-aggregation service. The single most-impactful OSINT source for email-based breach lookups.
- HMAC
- Hash-based Message Authentication Code — cryptographic signature on a webhook payload proving it came from Tracelight. Verify with X-Tracelight-Signature header.
— I
- ICAC
- Internet Crimes Against Children — federal task-force structure for investigating child exploitation cases. A specialized OSINT vertical Tracelight does not target.
- Identifier
- Any piece of data that can be associated with a subject — name, email, phone, IP, domain, username, photo. Inputs to Tracelight enrichment.
— L
- Litigation hold
- Legal obligation to preserve evidence relevant to anticipated or pending litigation. Tracelight's snapshot-evidence model satisfies most reasonable-preservation requirements.
— M
- Maltego
- Long-established desktop graph-OSINT tool. Strong on graph visualization, weak on hosting and onboarding speed. See /vs/maltego for comparison.
- Monitor
- Continuous re-enrichment job that fires alerts when a subject's profile changes (new breach, sanctions hit, dark-web mention). Tracelight monitors run on configurable cadence.
— O
- OFAC
- Office of Foreign Assets Control (US Treasury) — administers sanctions lists. Tracelight checks every subject against OFAC, EU, UK, and UN sanctions data.
- OpenCorporates
- Open dataset of corporate registry data from 130+ jurisdictions. Tracelight uses it for beneficial-ownership + corporate-relationship discovery.
- OSINT
- Open-Source Intelligence — gathering and analyzing publicly available information. Distinct from HUMINT (human sources), SIGINT (signals), and proprietary database intelligence.
— P
- PACER
- Public Access to Court Electronic Records — US federal court record system. Primary source for federal litigation history.
- Patterns of life
- Recurring behaviors a subject exhibits — when they post online, where they connect from, what their typical week looks like. Tracelight surfaces these via the activity heatmap.
- Permissible purpose
- FCRA-defined set of allowable uses for a consumer report — employment, credit, insurance, housing. Using a report outside permissible purpose triggers statutory damages.
- PII
- Personally Identifiable Information — data that can identify a specific individual. Subject to GDPR, CCPA, and state privacy laws.
- Pivot
- Following a new identifier discovered in one evidence row to enrich a subject's profile further. Tracelight's auto-pivot extracts surfaced identifiers and re-enriches them.
— R
- Reverse image search
- Finding the source or other instances of an image. Useful for identifying staged photos in fraud investigations or verifying source-supplied images in journalism.
- Risk score
- Composite 0-100 metric per Tracelight subject, derived from sanctions hits + breach exposure + adverse media + court records + cross-case overlap.
- RLS
- Row-Level Security — Postgres feature that filters rows visible to a given query based on a policy. Tracelight uses RLS to enforce workspace isolation at the database level.
— S
- Sherlock
- Open-source tool for finding usernames across social platforms. Tracelight's username worker is Sherlock-style with quality-of-life improvements (timeout, retry, content sanity check).
- Skip tracing
- Workflow for finding people who have moved or gone off the grid. See /use-cases/skip-tracing for a detailed playbook.
- SOC 2
- AICPA audit standard for service organizations. Type I = controls exist, Type II = controls operated effectively over a 6-12 month period. On Tracelight's roadmap.
- Source URL
- Direct link to the original data source for an evidence row. Tracelight stores source URLs whenever the upstream API exposes them, enabling click-through verification.
- SPF
- Sender Policy Framework — DNS TXT record listing IPs/services authorized to send email for a domain. Required for Resend deliverability from trytracelight.com.
- Subject
- The person, organization, or entity being investigated in a Tracelight case. Identified by one or more identifiers (email, phone, name, etc.).
- Surface web
- The publicly indexed web — what Google sees. Distinct from deep web (behind login walls) and dark web (Tor / I2P).
— T
- TLS
- Transport Layer Security — protocol securing in-transit data. Tracelight terminates connections with TLS 1.3 (1.2 minimum) at Vercel's edge.
— U
- Username probe
- Querying multiple social platforms with the same username to find which accounts exist. Tracelight's worker covers 30+ platforms.
— V
- Verification (multi-source)
- Confirming a finding by getting the same answer from independent OSINT sources. Tracelight badges any evidence-row finding type produced by 2+ workers as 'verified by N sources'.
— W
- Wayback Machine
- Internet Archive's archived web snapshot system. Useful for retrieving deleted social posts or inspecting how a website looked at a specific date.
- WHOIS
- Public registry record for a domain — registrant, contact, registration date, nameservers. Tracelight's domain worker queries WHOIS as part of every domain enrichment.
- Workspace
- Tracelight's tenant unit. Each workspace has its own cases, subjects, evidence, monitors, alerts, billing, and team — fully isolated from other workspaces by RLS.
Term you wish was here?
Email product@trytracelight.com. We add to this glossary regularly.
