OCIR™

ObscureIQ CounterIntel Reports

The first step to taking control of your digital footprint.

Before you can remove your personal data from the internet, you have to know where it is. All of it.

Our OCIR™ (ObscureIQ CounterIntel Reports), also called Digital Footprint Audit Reports, are the starting point for every privacy recovery we perform.

They are a complete, intelligence-grade map of your personal data threat surface. The exact blueprint of how an attacker would find you, profile you, and exploit your information.

We Think Like the Bad Guys. So They Can’t Beat You.

An OCIR isn’t a passive scan or a generic list of broker sites. We act like an adversary:

Comprehensive Data Scouring

Scouring public records, breach dumps, the dark web, and commercial surveillance networks.

Mapping Selectors

Mapping selectors (emails, phone numbers, usernames, addresses, even old gamertags) that can be used to re-link you to fresh data.

Uncovering Hidden Connections

Surfacing hidden connections between data points that most “privacy cleanup” services will never see.

Our Core Intelligence Tools

Military-Grade OSINT

Advanced open-source intelligence platforms, the same caliber used in government and defense operations.

The Codex

Our proprietary database of 8,600+ data brokers and commercial surveillance entities, giving us visibility into targets others miss.

Expert Recon Teams

Our B14ckBear Digital Recon unit includes OSINT investigators, former intelligence officers, data scientists, and risk specialists.

Three Layers of Defense

Enhanced Social & News Monitoring

We track more than mentions.
  • Pattern, intent, and escalation risk identification
  • Social, public web, and news monitoring with analyst review
  • Custom threat tags to reduce noise
  • Covers names, aliases, orgs, events, addresses, IDs & leaked creds

Chatter Intelligence from the Dark Corners

Where hostile intent often surfaces first.
  • Monitors dark web, alt platforms & encrypted leaks
  • AI + human analysis to flag leaks or targeting
  • Identifies what others miss
  • Low-signal chatter logged for escalation tracking

Geo-Specific Surveillance

Eyes on critical locations.
  • Geofencing and lat/long targeting for area monitoring
  • Local social and digital posts analyzed
  • Identifies surveillance or threat signals
  • Flags privacy risks from unauthorized images or event leaks

Get Your OCIR™ Report — Unlock a detailed map of your digital footprint

What You’ll See in Your Report

Audit Summary

  • Social Media: Visibility into posts, photos, check-ins, and professional history.
  • Passwords: Exposure levels from breaches.
  • Data Brokers: Where your personal data is being sold or given away.
  • Facial Recognition: PimEyes, FaceCheck.ID matches and opt-out opportunities.
  • AI & Chatbots: How LLMs may generate or surface your data.
  • Google Exposure: How easy it is to find you via search.

Profile Details – Deep Dive

  • Property & addresses, including mapped location history.
  • Relatives & associates.
  • Communication IDs (emails, numbers, usernames).
  • Social presence across platforms.
  • Public & voter records.
  • Breached & leaked data with specifics.
  • Biometric matches and URLs.

Digital Identity Card & Stats

Quantified exposures at a glance including property addresses, phone numbers, emails, usernames, account totals, breach counts, and password leaks.

Example: One client had 22 addresses, 7 phone numbers, 12 emails, and 21 breaches (including plaintext passwords exposed).

Identity Risk Grade

We assign a clear letter grade showing how easy you are to find and how attractive you are as a target.

Client Action Plan (CAP)

Your custom roadmap to reduce your threat surface, starting with a DeepDelete™ and adding layered protections where needed.

Why This Matters: Mapping the Threat Surface

Your personal threat surface is every data point that can be used against you — whether for stalking, harassment, fraud, or social engineering.

We treat employee and executive data as critical infrastructure because:

  • Cognitive Threat Perimeter – Your behavioral patterns can be reverse-engineered and exploited.
  • Weaponization of Data – LLMs now let attackers automate highly convincing phishing and social attacks.
  • Iceberg Model – Most of your exposure lies below the surface — ad tracking data, breach history, and broker archives.
  • Selectors & Base Records – Old identifiers still link you to new data unless they’re surgically removed.

ObscureIQ OCIR™ — Know your footprint. Control your exposure.

From Intel to Action

The OCIR is not the end. It’s the launchpad.

Once you see your threat surface, we move immediately to shrink it with DeepDelete™ and bespoke erasure services.

The result? Fewer attack vectors. Less visibility. Maximum obscurity.