OSINT Assessment Tool
Secure Connection
Red Flag Assessment
Identify your risk level with our free 5-step analysis designed by intelligence professionals.
Progress
40%
Question 2 of 5
contact_mail
Communication Patterns
Scammers often use specific contact methods to bypass security filters and build false intimacy quickly. The initial point of contact is a critical data point in threat assessment.
info
Tip: Legitimate organizations rarely initiate contact via encrypted apps like Telegram or WhatsApp for official business.
How did the individual first contact you?
Select the option that best matches your situation.
lock
256-bit Encrypted Session
visibility_off
100% Anonymous & Confidential
verified_user
Verified by Cyber-Sec Experts