Information You Provide Directly
When you engage Specter, you provide us with foundational data needed to initiate your threat assessment:
- Full name and preferred contact information (email, phone)
- Professional title, role, and organization
- LinkedIn profile URL and other professional identifiers
- Key family members or associates (for family protection assessments)
- Known or suspected threat indicators you've already identified
This is the core of what Specter does. During your assessment, we discover vast amounts of publicly available data about you. We access:
- Data broker networks and people search databases
- Public social media profiles and activity archives
- Public records (property ownership, court filings, business registrations)
- Financial filings and SEC documents
- News archives and press mentions
- Historical domain registrations and website information
- Online directories and professional networking sites
Critical distinction: We discover this data because it's publicly accessible. We do not hack, breach, or access private systems. Everything in your Specter Report comes from legally accessible, public sources.
When you access Specter's platform:
- Device information (type, OS, browser)
- IP address and general location
- Session data and authentication logs
- Usage metrics (pages viewed, time on platform)
We maintain records of:
- Encrypted communications with your assigned Handler
- Secure messages and notifications sent through the platform
- Documentation of threat assessments and remediation requests
All communications are encrypted end-to-end. We retain these records to provide continuity of service and document the work we've done on your behalf.