Digital Investigations & Ethical Security

Sherlock Holmes with a laptop — I might take your case if it sparks my interest

👤 About Me

I'm an ethical hacker with a background in offensive cyber operations, OSINT, and digital forensics. I've trained privately in military and physical security, giving me knowledge beyond the keyboard. I was born in a country plagued by real crime and corruption — I've seen how ugly the world can be, and I've adapted to it.

My work is deeply private, strategic, and puzzle-driven. I don't do this for money or reputation — I do it for the love of the challenge. Think of me like Sherlock Holmes with a laptop — I won't take every case, but I might take yours if it sparks my interest.

I also develop and use my own self-written, local AI tools to help with investigations:

  • They never connect to the cloud
  • They don't send anything anywhere
  • Your data never leaves my local environment

And let's be honest: I've seen things. No matter how dark your situation is, I don't judge.

"Ist nicht mein Bier."

When I'm done, your data is deleted. Clean and simple.

Professional investigator at work

🧩 Services I Offer (All Free) — Explained

1. OSINT & Digital Research

I investigate using open-source intelligence: from social media, metadata, emails, usernames, forums, and document trails — to everything that can be found online legally.

✅ Use cases:

  • Finding missing persons (especially when law enforcement deprioritizes adult disappearances)
  • Tracking online stalkers, scammers, or digital footprints
  • Investigating suspicious online events, patterns, or anonymous actors

2. Dark Web OSINT (Strictly Ethical)

I explore the dark web using controlled tools and methods — for intelligence, not interaction.

✅ Use cases:

  • Locating leaked personal data, credentials, or mentions
  • Verifying if you're being targeted or impersonated anonymously
  • Investigating identity theft
OSINT and dark web research

🚫 What I do NOT do:

  • Interact with CSAM, human trafficking, weapons, or other illegal content
  • Infiltrate or tamper with marketplaces, forums, or networks
  • Interfere with law enforcement work

If I encounter illegal material, I halt the case and notify the client to go to the proper authorities.

3. Digital Forensics (With Consent Only)

I analyze phones, computers, logs, and behavioral data — legally and safely.

✅ Use cases:

  • Suspicious app behavior
  • Hidden/deleted files
  • Spying suspicion on personal devices
  • Metadata analysis and log investigation

🔒 I require explicit consent from the legal owner or custodian before touching any device.

Digital forensics and analysis

4. Friendly Second Opinion / PI-Style Investigation

I act as a friendly, unofficial digital private investigator. I give second opinions, review claims, or help you verify digital truths.

✅ Use cases:

  • Someone sent you something shady and you're not sure what it is
  • You want someone neutral to dig into a strange digital event
  • You just need clarity on a digital issue no one else takes seriously

5. Physical Investigations (Legal + Ethical)

I conduct real-world, physical investigations when it supports a case — and only within the law.

✅ Use cases:

  • Checking if a location or asset is compromised
  • Real-world verification of digital leads
  • Physical surveillance in public or legal-access areas
PI-style and physical investigation

🚫 Limits:

  • I do not infiltrate secured buildings or trespass
  • I do not impersonate law enforcement or officials
  • I never interfere with police investigations
  • I only operate in places the public is legally allowed to be in

Occasionally, I may meet in person, depending on the case and location.

Ethical boundaries and limits

⚖️ Legal, Ethical & Privacy Rules (Strictly Enforced)

❌ I DO NOT:

  • Hack without full, documented consent
  • Engage with illegal content or groups
  • Bypass physical or digital security without permission
  • Spy on people illegally
  • Take payment or commissions
  • Share your data with third parties

✅ I DO:

  • Work alone, for free, and for interest
  • Use my own AI and air-gapped tooling for OPSEC
  • Keep your identity and case confidential
  • Delete your data completely after a case
  • Recommend police involvement when serious crimes are found
Legal framework and privacy protection

💬 Contact Form

I only accept cases that are ethical, legal, and interesting. I may not respond to every request.

Contact and communication