
In the latest episode of the Data Xposure podcast—a series dedicated to exploring the evolving landscape of digital data—host Justin Tolman sat down with Jessica Stutzman, founder of Pangea Research, to bridge a widening gap in the investigative world. While corporate forensic investigators are experts at finding the smoking gun on a hard drive, they often overlook a massive universe of evidence sitting in plain sight.
For the uninitiated, Open Source Intelligence (OSINT) is the collection and analysis of data gathered from public sources—including social media, public records, the deep web, and commercial telemetry—to produce actionable intelligence.
As Justin Tolman notes during the episode, forensic work is often seen as a "cut and dry" world of binary and hex. However, modern corporate threats—from internal fraud to sophisticated IP theft—rarely stay confined to a single company laptop. Corporate investigators need OSINT because the human element of a crime lives online. Without it, you are analyzing the weapon (the computer) while completely ignoring the motive, the movements, and the digital shadow of the person who used it.
Here are five critical insights from their conversation that every corporate cybersecurity and forensic professional should understand.
Rather listen to the pod than read the blog? You can here!
One of the biggest hurdles for traditional forensic examiners is shifting from a static mindset to a fluid one. In forensics, you are looking for a specific file or a timestamp. OSINT, however, is about building what Stutzman calls a "nonfiction narrative." It’s the process of taking fragmented pieces of public information and weaving them into a story that explains the "why" behind the "what."
Stutzman explains that while forensics deals with the technical artifacts, OSINT "puts the person behind the keyboard." For a corporate investigator, this might mean taking an IP address found in a server log and connecting it to a series of social media check-ins or public forum posts. This context transforms a dry technical report into a compelling case that a board of directors or a jury can actually understand.
In the lab, we rely on hashing to ensure our evidence is untampered. In the open-source world, integrity is much harder to prove, leading to what Stutzman describes as a "scary" validation crisis. Many investigators make "subjective judgments"—assuming, for example, that because two names appear on a public document, they must be business partners or spouses.
"If you can't justify it, you can't explain where it came from," Stutzman warns, noting that many automated OSINT tools act as "black boxes" that don't reveal their sources. If an investigator presents a "finding" without being able to show the original provenance—the specific URL, the timestamped HTML source code, or the verified data stream—that evidence can be thrown out as "fruit of the poisonous tree." For corporate teams, this means that using a fancy dashboard isn't enough; you must use tools that capture the "forensic trail" of your online research to ensure your findings hold up in court or during an HR tribunal.
Most companies view OSINT as a reactive tool—something to use after a whistleblower speaks up. However, Tolman and Stutzman discuss how OSINT can be a proactive shield, particularly in mergers, acquisitions, and brand protection. Stutzman shares a striking example of an organization trying to expand into a new country, only to discover through OSINT that another entity had been using their brand name there for years, leaving a trail of "terrible reputation" the company knew nothing about.
By performing "due diligence" OSINT, corporate investigators can identify these landmines before millions of dollars are committed. This extends to executive protection as well; by monitoring the "digital exhaust" of high-level C-suite members, security teams can see what information is being leaked—such as travel patterns or family details—that could be exploited by bad actors for social engineering or physical threats.
The conversation took a deep dive into the "Privacy Paradox" of 2026. While privacy laws like GDPR are making some data harder to find, Artificial Intelligence and Large Language Models (LLMs) are making de-anonymization "insanely quick." Investigators can now use AI to perform semantic analysis at scale—matching the unique writing style, syntax, and "catchphrases" of an anonymous whistleblower or a hacker on a forum to a known public profile, like a LinkedIn page.
"It is going to get easier and easier to de-anonymize people," Stutzman says, noting that this is a double-edged sword. For the investigator, it is a superpower that allows them to unmask internal leakers or external attackers who previously hid behind pseudonyms. However, for the corporation, it means your own employees are now more vulnerable. A bad actor can use the same AI-driven de-anonymization to "dox" your staff or create highly personalized phishing attacks based on their entire online history. This "arms race" means corporate investigators must stay ahead of how LLMs are being used to strip away digital anonymity.
The episode concludes with an encouraging message for those feeling overwhelmed by the technical requirements of the field. While there are many expensive certifications available, Stutzman emphasizes that "you don't have to have money to get into OSINT." In fact, she argues that 99% of organizations value passion and a "specialist network" over a piece of paper.
Being a great OSINT investigator in a corporate environment isn't about knowing everything—it’s about being curious enough to find the person who does. Whether it’s an "art guy" to identify a painting in the background of a photo or a "bomb guy" to identify a pile of wires, the best investigators are those who build a network of experts. As Tolman points out, the technology changes every day, but the "investigative mindset"—the drive to keep digging until the story makes sense—is what ultimately solves the case.
Want to hear the full deep dive into the world of Pangea Research and the future of data validation?
Listen to the full episode of Data Xposure with Justin Tolman and Jessica Stutzman here.