Cybersecurity Professional | Licensed Private Investigator
OSINT Specialist
FL PI License C19000077 | Agency License A3200172
Combining investigative expertise with technical innovation to solve complex security challenges
I'm Patrick Quirk, a cybersecurity professional and licensed private investigator with expertise in incident response, OSINT/GEOINT intelligence, and threat analysis. With a Master's degree in Cybersecurity Management and a Bachelor's in Cybersecurity & Ethical Hacking (both Magna Cum Laude), I bring a unique blend of investigative skills and technical expertise to solve complex security challenges.
My career spans incident response analysis at the University of Miami (reducing response time by 80%), OSINT research supporting U.S. military operations at Torchlight, skip tracing coordination at Proof (98% success rate), and founding Spencer Investigations—a licensed PI agency with a 98% case resolution rate across 100+ complex investigations.
I'm fluent in English, French, Spanish, and Italian, with conversational German. Beyond my professional work, I'm passionate about building innovative tools that bridge cybersecurity, data intelligence, and visualization—as demonstrated in my project portfolio below.
I'm currently seeking opportunities in cybersecurity, threat intelligence, or OSINT where I can leverage my investigative background and technical skills to protect organizations and solve challenging problems.
Spencer Investigations
Proof | Denver, CO
University of Miami | Coral Gables, FL
Torchlight | Saint Petersburg, FL
Drawbridge | West Palm Beach, FL
VaporShark (formerly The Hand Media LLC) | South Miami, FL
Nova Southeastern University
May 2022 | GPA: 3.7/4.0 | Magna Cum Laude
Maryville University of St. Louis
August 2020 | GPA: 3.8/4.0 | Magna Cum Laude
Real-time cybersecurity visualization tool that monitors firewall logs and displays network attack attempts on a 3D ASCII globe. Features live attack feeds, threat intelligence, and interactive terminal dashboard for defensive security education.
Automated news aggregator revealing media bias through AI-powered clustering across 204 sources (50 US, 70+ Global, 45+ Military, 37 UFO/UAP). Features real-time updates, advanced bias analysis, coverage gap heatmaps, and sentiment analysis to compare how different political perspectives cover the same stories. Built on 100% Cloudflare infrastructure with automatic updates every 30 minutes.
Comprehensive technical intelligence platform aggregating real-time cybersecurity threats, AI developments, and tech news from 204 sources (110 Cybersecurity, 52 AI, 42 Tech). Features CVSS-inspired severity scoring (0-10 scale), automated CVE tracking, intelligent clustering, risk heatmaps, and CISO-focused threat analysis tools for enterprise security operations.
Powerful Electron-based desktop search tool for the Library of Congress digital collections. Features dual-view modes (Gallery and List), massive results per page, 8 theme options, and smart client-side caching with prefetching. Provides superior search experience with no API key required, optimized for visual browsing and rapid scanning of LOC and PPOC collections.
Professional artist website for VIEWER (Edwart Zermeño), a drum and bass producer from Guanajuato, Mexico. Features dark/light theme switcher, embedded Spotify player, YouTube videos, upcoming EP showcase with countdown timer, "BUT CAN IT RUN DOOM?" splash screen easter egg, and fully responsive mobile-first design. Built with pure vanilla HTML/CSS/JS.
Immersive terminal application for reading Sun Tzu's "The Art of War" with cinematic animations, TUI chapter reader, ASCII warrior art, and epic story-driven game. Features 12 animations, 153 wisdom quotes, beautiful blessed-based TUI interface with Chinese borders, and "The General's Path" interactive game with multiple branching storylines and endings. Cross-platform support for Windows, macOS, and Linux.
Automated safety switch that sends encrypted messages if you fail to check in. Server-powered with automatic email delivery via SendGrid. Perfect for journalists, activists, security researchers, or anyone needing a digital dead man's switch for sensitive information protection.
Terminal UI visualization for SecKC Modern Honey Network attack map. Real-time 3D ASCII globe displaying global cyberattacks with interactive controls, multiple visual themes, and detailed attack information panels. Live threat intelligence monitoring tool.
Global data center intelligence system that maps critical infrastructure worldwide. Successfully compiled 6,266+ verified data center locations across 155 countries with autonomous web scraping, GPS extraction, and interactive visualization.
Interactive OSINT research and visualization tool featuring radial spire charts, multi-source confidence metrics, and grouped result displays. Fully client-side implementation with no backend dependencies for secure public hosting.
Comprehensive Bible exploration tool with 4 interfaces (CMD, GUI, Web Visualizer, Web Terminal). Features 340,000+ cross-references, 9 interactive visualizations, 4 translations, and geographic/historical data analysis using network graphs and advanced data visualization.
Cross-platform MAC address management tool with both GUI and CLI interfaces. Features 45+ vendor presets, random generation, custom input options, and real-time network stats. Supports Windows, Linux, and macOS with 11 color themes.
Philosophical text-based adventure blending themes from "The Matrix" and "Alice in Wonderland." Features 5 unique endings, branching narratives, Matrix-style terminal effects, and deep exploration of reality, identity, and perception concepts.
Interactive fiction adaptation of the 1930 book "Consider the Consequences" - the first choose-your-own-adventure game ever created. Python-based with 89 story segments, 3 characters, 43 decision points, and 83+ unique endings. Historical preservation meets modern gaming.
Global interactive map of infamous locations including serial killers, crime scenes, school shootings, and macabre historical sites. Features comprehensive filtering by category, search functionality, and detailed information on dark tourism destinations worldwide for historical research and morbid curiosity.
Explore the world's most haunted locations, ghost sightings, and paranormal phenomena on an interactive global map. Features haunted houses, hotels, hospitals, asylums, cemeteries, and documented paranormal activity with filtering, search, and detailed location histories.
Interactive historical map chronicling Genghis Khan's conquests and the expansion of the Mongol Empire from 1206-1227. Visualizes military campaigns, major battles, territorial expansion across Asia and Europe, and the rise of one of history's largest contiguous empires.
Discover America's rich historical legacy with an interactive map of heritage sites across the United States. Features colonial sites, military battlefields, Native American locations, Spanish missions, national monuments, industrial heritage sites, and civil rights landmarks with filtering and search.
⚠️ WARNING: LIVE HONEYPOT - Real-time attack data collection system capturing live cyberattack attempts, bot activity, and malicious traffic patterns. Features automated threat intelligence collection, attack visualization, and comprehensive logging of exploit attempts for security research and defensive analysis.
⚠️ WARNING: LIVE HONEYPOT - UK-based honeypot deployment capturing international cyberattack patterns, bot reconnaissance, and automated exploit attempts. Features geolocation tracking, attack pattern analysis, and threat intelligence gathering from European threat actors for global security research initiatives.
Advanced Python extraction tool for backing up and analyzing WiFi survey history from WiGLE wardriving data. Features automated API integration for wireless network research, security auditing, and geospatial intelligence gathering with comprehensive data preservation capabilities.
Military-grade tactical interface simulating a global threat monitoring system with real-time countdown timers for 12 simultaneous catastrophic scenarios. Features classified aesthetic with terminal scanlines, dynamic threat metrics, DEFCON level tracking, and strategic command center visualization. Built for demonstration of crisis management UI/UX design.
Real-time commodity price tracker with historical data visualization and analytics. Monitors cryptocurrencies (Bitcoin, Ethereum, XRP, Solana), precious metals (Gold, Silver, Platinum, Palladium, Rhodium), energy commodities, agriculture, and economic indicators. Features 100% free APIs, persistent localStorage data, auto-refresh every 30 seconds, and interactive charts with timeline filters.
Military-grade web path discovery tool with real-time TUI dashboard and animated BFS pathfinding visualization. Features complete redirect chain tracking, wildcard detection, content fingerprinting, and performance of 2000-5000+ req/s. Includes 10 color themes, interactive configuration menu, rotating 3D globe visualization, and military-grade pentest report generation. Built in Go for maximum performance.
Cross-platform desktop GUI application for quick system reconnaissance and security monitoring. Gathers network intelligence (local/public IP, MAC address, all interfaces), system information (OS, hostname, platform), hardware metrics (CPU, RAM, disk usage), and user context. Built for penetration testers who need instant access to critical system information with real-time refresh capabilities.
Advanced infrastructure intelligence platform weaving together the unseen threads of global civilization. Next-generation geospatial intelligence system mapping the architecture of modern infrastructure across continents. Multi-dimensional visualization, real-time synthesis, proprietary analysis. Enterprise-grade platform architecture. Further details undisclosed pending official launch.
Real-time honeypot attack visualization on a 3D ASCII globe. Deploys decoy servers (SSH, SMB, HTTP, SCADA, IoT, and 15+ more protocols) in the cloud to attract cyber attacks worldwide, then displays them on a beautiful terminal dashboard. Features credential capture, malware collection, geographic tracking, threat intelligence gathering, and multiple color themes. Built on T-Pot platform with custom visualization layer.
Advanced Open Source Intelligence gathering and visualization tool integrating 17+ data sources: Sherlock username enumeration, Holehe email discovery, Shodan internet intelligence, Google Custom Search, Have I Been Pwned, CourtListener legal database, FBI Wanted, and more. Features 5 interactive visualizations (Radial Arcs, Brick Tower, Constellation, Dumpster Fire, List View), 10 color themes, medieval fantasy loading animation, and comprehensive threat intelligence.
Dual-mode interactive website featuring a fullscreen Kali Linux-styled terminal emulator and comprehensive hacker cinema database. Terminal mode includes virtual filesystem with wardriving guides, command history, and authentic terminal feel. Website mode showcases 92 hacker films & documentaries, wardriving guides for Kali Linux & Kismet, GitHub projects portfolio, and technical articles. Pure HTML/CSS/JavaScript with no frameworks required.
Collection of interactive browser-based games and simulations with fake operations theme. Features Satellite Command Terminal (hacking simulator), MIB Division (alien tracking database with neuralyzer), and Wonderland (psychedelic Alice adventure). Includes Konami code easter eggs, Matrix rain effects, animated cards, and Discord webhook visitor tracking. Kid-friendly entertainment with no actual operations - pure parody and fun.
Technical guides, tutorials, and explorations into hacker culture, hardware modifications, and security research.
A deep dive into breathing new life into vintage hardware by integrating modern components and software. Explore techniques for modernizing legacy systems while preserving their authentic character—from retrofitting old terminals with Raspberry Pi internals to running contemporary software on classic computing platforms.
📖 Read on Medium →Complete guide to setting up Kismet wireless monitoring with the Hak5 Wi-Fi Coconut multi-radio capture device. Learn how to configure GPS integration, optimize capture settings for multiple radios simultaneously, and leverage the Coconut's unique capabilities for comprehensive wireless network mapping and security research.
📖 Read on Medium →More articles coming soon. Follow @ringmast4r on Medium for updates.