ZeroTrace OSINT
Person Investigation Composer
One page that wires every identity tool around a single subject — name, alias, email, phone, username, city — and auto-creates an investigation profile.
The person investigation composer is the workflow tool. It takes any subset of identifiers you have for a person and orchestrates every relevant identity tool around the same subject, accumulating findings into an auto-created investigation profile.
It is the right starting point when you have some information about a person and want to deepen it without manually clicking through five separate tools.
Inputs
You provide any subset of:
| Field | Example |
|---|---|
| Real name | First / middle / last |
| Alias / pseudonym | Pen name, nickname, scene name |
| One or several | |
| Phone | One or several |
| Username / handle | One or several |
| City / region | Where the subject is based |
| Country | When relevant for jurisdictional context |
| Date of birth / year | When known |
The more fields you provide, the deeper the composer's auto-orchestration.
What the composer does
For each provided identifier, the composer triggers the appropriate downstream tools and aggregates the results:
| If you provided... | The composer runs... |
|---|---|
| Name + city | Deep links to public people-search engines per locale (TruePeopleSearch, FastPeopleSearch, Whitepages for US; 192.com for UK; Pages Blanches for FR; etc.) |
| Email analyzer + breach-domain check + permutator (generates handle candidates from the local part) | |
| Phone | Phone lookup |
| Username | Username sweep across thirty-plus platforms, plus permutator-derived variants |
| Image / photo URL | Photo-clustering candidate, reverse-image composer for matched results |
A reverse-pivot table cross-references discovered profiles with their public photos, then deep-links those photos into the reverse image composer to confirm cross-platform identity matches.
Auto-created profile
When you run the composer, the toolkit auto-creates an investigation profile named after the subject. Every finding the composer produces lands in the profile with full provenance — the same as if you had pinned each finding manually.
This is the single largest workflow saving in the toolkit. A typical "I have a name and an email and a city" case produces fifteen to twenty findings across six tools in one run, all pinned to a fresh profile and ready for review.
The composer is also the right way to re-run an existing case. Open an existing profile, click the composer's "re-investigate" action, and the composer re-runs every prior tool with the same inputs — surfacing what has changed since last time.
Per-locale public-records deep links
The composer ships with a locale-aware list of public-records engines:
| Locale | Engines |
|---|---|
| United States | TruePeopleSearch, FastPeopleSearch, Whitepages, Justia, CourtListener |
| United Kingdom | 192.com, BAILII |
| France | Pages Blanches / Pages Jaunes |
| Australia | AustLII |
| Canada | CanLII |
| EU-wide | EUR-Lex |
| Genealogy | FamilySearch, Wikitree |
| Academic | Google Scholar, ORCID, ResearchGate |
| Government / corporate | SEC EDGAR (US), OpenCorporates |
The composer constructs deep-link URLs (with the subject's name and locale pre-filled) and opens them in your browser when you click each link. The composer does not scrape these engines — you visit them directly.
What the composer does not do
- Aggregating data from paid people-search aggregators. PimEyes, Spokeo paid, BeenVerified — out of scope.
- Live face recognition. No biometric matching across photos.
- Combining identifiers without your input. The composer does not invent identifiers — it only orchestrates against the ones you provide.
Pivots
The composer's results pivot the same way the underlying tools' results pivot. Click any value in the auto-created profile and the standard pivot menu opens.
Sources
The composer's sources are the union of every tool it composes:
- Email analyzer and breach lookup → HIBP-related sources.
- Phone lookup → bundled libraries (no network).
- Username sweep → per-platform direct probes.
- Photo clustering → image-hashing tools (no external network).
- Public-records deep links → URL constructors only; you visit the engines yourself.
Every source is named on the corresponding finding inside the auto-created profile.