OSINT Portfolio Case Study

Digital Footprint Exposure:
"Miss Wednesday"

A simulated investigation demonstrating how publicly available information can be aggregated to build a detailed personal profile, without any hacking or illegal access.

Case Profile

To demonstrate how publicly available information can be aggregated to construct a detailed personal profile, this project uses a fully fictional subject. No real individuals were researched or identified. All names, details and scenarios are invented for educational purposes.

Subject Overview

πŸ‘©
NameMiss Wednesday (fictional)
πŸŽ‚
Age34 years old
πŸ”΄
LocationBallito area, Durban, KZN
🏫
OccupationPrimary school teacher
πŸ‹οΈ
Side BusinessFitness influencer
πŸ‘§
ChildrenTwo (ages 6 & 10), local private school
Platforms Active On4+LinkedIn, Instagram, TikTok, Facebook
Public Profile TypeHighConsistent social media posts
Estimated Exposure LevelSevereMultiple categories of sensitive data

Why This Subject Is Interesting

Miss Wednesday is not a celebrity or public official; she is an ordinary professional. However, her dual role as a teacher and social media influencer increases her digital footprint beyond what she may recognise. This makes her profile particularly vulnerable to OSINT analysis, where publicly available information can be used to reconstruct patterns of identity, behaviour, and risk.

The goal of this case study is not to expose or exploit; it is to illustrate how the accumulation of small, seemingly harmless details creates a comprehensive and potentially dangerous profile.

Simulated OSINT Collection

The following information was gathered from publicly available sources through simulated passive reconnaissance. No hacking or unauthorised access was used.

πŸ’Ό Professional Information

πŸ”—

LinkedIn profile publicly lists employer (school name) and job title

Source: LinkedIn Β· Risk: Enables targeted phishing via guessed work email
πŸ“§

Common school email formats (e.g. firstname.surname@school.co.za) can be inferred from employer name

Source: LinkedIn + Google Β· Risk: Direct vector for phishing and impersonation

πŸ“± Social Media Activity

πŸ“ Location Indicators

🏠

Location tags and check-ins identify home neighbourhood (Ballito), preferred gym, and school vicinity

Source: Instagram / Facebook Β· Risk: Physical tracking and stalking
πŸ—ΊοΈ

Background details in photos; street signs, distinctive buildings, recognisable intersections; allow map-based triangulation of home address

Source: Any visual content Β· Risk: Precise home or workplace location
⏰

Consistent posting times reveal routine: when she leaves home, arrives at work, trains at the gym

Source: Post timestamps Β· Risk: Predictable schedule enables physical ambush or burglary

πŸ” Personal Data Exposure

🏦

Comments on posts or bio links hint at banking institution (e.g. SnapScan logo, specific payment handle)

Source: Instagram bio / comment sections Β· Risk: Targeted financial scams and smishing
πŸ“ž

Contact number or WhatsApp Business link sometimes included for gym enquiries

Source: Instagram bio / Facebook page Β· Risk: Direct contact vector for scammers
πŸ”‘

Repeated username across platforms makes cross-referencing trivial

Source: Google search / Namechk-style lookup Β· Risk: Aggregation of all data into one profile

Risk Analysis

The table below maps each piece of exposed information to its realistic threat scenario. None of these risks require sophisticated technical skill; only patience, observation, and the ability to connect dots across platforms.

← scroll to see more β†’

Exposed InformationPotential ThreatMethodSeverity
Work email formatSpear-phishing attack targeting school accountCrafted email impersonating a parent or adminHigh
Children's school nameSocial engineering via impersonation callCaller poses as teacher or school officialHigh
Banking institution hintFinancial scam (fake SMS / email alert)Smishing or vishing using real bank nameHigh
Home neighbourhoodStalking or physical surveillanceLocation tag analysis + photo background mappingHigh
Daily routine & scheduleBurglary when home is predictably emptyTimestamp analysis of postsHigh
Gym location & check-insPhysical approach or harassmentCross-referencing location tags with scheduleMed
Contact number (gym)Direct scam calls / WhatsApp phishingCold contact using personal detail as lureMed
Repeated usernamesFull cross-platform profile aggregationSimple username search across platformsMed
Photo backgroundsGeolocation of home or regular locationsReverse image search + Google Street ViewLow–Med
Work email formatHigh
Spear-phishing attack targeting school account
Crafted email impersonating a parent or admin
Children's school nameHigh
Social engineering via impersonation call
Caller poses as teacher or school official
Banking institution hintHigh
Financial scam (fake SMS / email alert)
Smishing or vishing using real bank name
Home neighbourhoodHigh
Stalking or physical surveillance
Location tag analysis + photo background mapping
Daily routine & scheduleHigh
Burglary when home is predictably empty
Timestamp analysis of posts
Gym location & check-insMed
Physical approach or harassment
Cross-referencing location tags with schedule
Contact number (gym)Med
Direct scam calls / WhatsApp phishing
Cold contact using personal detail as lure
Repeated usernamesMed
Full cross-platform profile aggregation
Simple username search across platforms
Photo backgroundsLow–Med
Geolocation of home or regular locations
Reverse image search + Google Street View

πŸ”‘ Key Insight

No single data point here is alarming in isolation. A school name, a gym check-in, a payment handle; individually these seem trivial. The danger lies in aggregation: when combined, they form a profile precise enough to enable real-world harm. This is the core principle of OSINT threat analysis.

Exposure Overview

High Severity Risks5Requiring immediate attention
Medium Severity Risks3Significant but less immediate
Data Categories Exposed4Professional, location, personal, family
Platforms Contributing4+LinkedIn, Instagram, TikTok, Facebook

Risk Distribution by Category

Exposure Severity by Risk Type

Protection Recommendations

Most of the risks identified in this case study are preventable without abandoning social media entirely. The following practices significantly reduce the attack surface available to a potential threat actor.

πŸ”’

Account Privacy

  • Set personal accounts to private
  • Separate personal and business profiles
  • Audit follower lists regularly
  • Restrict who can see tagged photos
πŸ“

Location Awareness

  • Disable automatic location tagging
  • Post check-ins after leaving, not on arrival
  • Be aware of background details in photos
  • Avoid establishing predictable schedules
πŸ‘¨β€πŸ‘©β€πŸ‘§

Family Protection

  • Never share children's school name publicly
  • Avoid posting identifiable school uniforms
  • Limit photos of children to trusted contacts
  • Don't post pickup/dropoff routines
🧹

Digital Hygiene

  • Use unique usernames per platform
  • Remove contact details from public bios
  • Use a business email for public enquiries
  • Regularly Google yourself
🏦

Financial Safety

  • Avoid referencing your bank publicly
  • Use a separate payment link for business
  • Be cautious of unsolicited contacts citing personal details
🧠

Mindset Shift

  • Ask: "What could someone infer from this post?"
  • Think in patterns, not just single posts
  • Assume a motivated stranger may be watching
  • Visibility is not the same as safety

Quick-Reference Protection Checklist

← scroll to see more β†’

ActionPlatformDifficultyImpact
Switch to private accountInstagram, TikTokEasyHigh
Remove location from bioAll platformsEasyMed
Disable photo geo-taggingPhone settingsEasyHigh
Change username consistencyAll platformsModerateMed
Audit tagged photosFacebook, InstagramModerateMed
Separate business/personal profilesInstagram, FacebookModerateHigh

Conclusion

"The risk lies not in a single post, but in the accumulation and connection of small details over time."

This case study demonstrates how an ordinary, non-famous individual with an active social media presence can become the subject of a detailed intelligence profile, built entirely from public, freely accessible information. No accounts were compromised. No illegal tools were used. Only observation, cross-referencing, and pattern recognition.

Miss Wednesday is not unusual. Millions of people share the same digital behaviours: fitness check-ins, family milestones, workplace updates, relationship posts. Each one is harmless in isolation. Collectively, they paint a picture detailed enough to enable phishing, scamming, stalking, and social engineering.

The principles explored here are fundamental to both offensive OSINT (how investigators or threat actors build profiles) and defensive OSINT (how individuals and organisations reduce their exposure). Understanding one requires understanding the other.

πŸ•΅οΈ
OSINT requires no hacking, only observation
🧩
Aggregation of data is more dangerous than any single detail
πŸ‘Ά
Children and family are collateral exposure risks
πŸ“…
Routine and predictability are vulnerabilities
πŸ›‘οΈ
Privacy is a habit, not a setting