SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Digital InvestigationsDigital Investigations
Presenter: Andrew GarrettPresenter: Andrew Garrett
Garrett Discovery Inc.Garrett Discovery Inc.
Presentation forPresentation for
Private DetectivesPrivate Detectives
Why use technology?
Technology
is often the usage and knowledge of tools,
techniques, crafts, systems or methods of organization in
order to solve a problem or serve some purpose
Efficiency
well use of time and effort
Cost
Can reduce cost by obtaining a desired outcome without use
of another less efficient method
Cyber Sleuthing
• Using the power of the Internet to gather revealing
information on people and to skip trace (track someone
down)
• For investigators, the web is a broad avenue for informal
discovery, allowing litigators to test a witness’ candor
and probe a litigant’s background and resources.
• Websites (Launch Pad)
– Birthdate: Switchboard.com, whowhere.com,
anywho.com
– Criminal: searchsystems.net
– Gov: firstgov.gov, tray.com
Social Networking
• Facebook
By default, when you search for a topic on Facebook, the
results you see will be from your list of contacts; your
"circle of friends", so to speak. If you would like to expand
that circle to include results from anyone who has chosen
to make their Facebook information publicly accessible,
simply click on "Posts By Everyone". This gives you the
option to view information from people who are not
included in your contact list.
• Myspace
• Mylife
• Twitter
Fake Social Network Pages
• Find a friend of your subject that doesn’t post a lot
• Copy a few of the pictures of that friend including a profile
picture
• Let’s assume we are cloning the identity of John Doe that is
friends with your subject Jake Harris.
• Add a few of John Doe friends to the Facebook account that are
common friends with Jake Harris
• You now have a believable account!
• Add Jake Harris as a friend and he will most likely just add you!
• Now you have access and can send him an invite to your wedding
and ask for his address if needed.
Footprinting
Footprinting is searching for collections of data to be
used with social engineering to gather more
information about your suspect.
In order to understand how to footprint you must
learn how the web search engines work. All search
engines are based on Boolean logic.
Always keep your reference sheet handy until
memorized.
Google Footprinting
Operators Description
site: Restrict results to only one domain, or
server
inurl:/allinurl: All terms must appear in URL
intitle:/allintitle: All terms must appear in title
cache: Display Google’s cache of a page
ext:/filetype: Return files with a given
extension/file type
info: Convenient way to get to other
information about a page
link: Find pages that link to the given page
inanchor: Page is linked to by someone using
the term
Google Footprinting
Operators Description
- Inverse search operator (hide
results)
~ synonyms
[#]..[#] Number range
* Wildcard to put something
between something when
searching with “quotes”
+ Used to force stop words
OR Boolean operator, must be
uppercase
| Same as OR
Surveillance
Technologies
Video Cameras
The video camera is the most valuable piece of
equipment in the PI's arsenal. Video cameras provide
physical documentation of the PI's observations. In a
vehicle, video cameras mount on tripods for mobile
surveillance. For stationary surveillance, video
cameras are hand-held. Video surveillance is
admissible in criminal and civil court and workers'
compensation hearings.
What about the times you cannot see the suspect?
Are there covert cameras?
Surveillance Technologies
Pinhole Cameras
Pinhole cameras, button cameras and micro-cameras are small, about the
size of a dime, and placed in a variety of objects for covert surveillance.
Pinhole cameras hide easily within a woman's purse, jacket or shirt
pocket. A number of nondescript items, such as sunglasses and baseball
caps may be purchased with a built-in camera. Pinhole cameras allow a PI
to move about freely and even engage the investigative subject in
conversation.
• Placement
• Practice
• Cost
• Battery Life
• Brickhouse.com stuntcams.com
Surveillance
Technologies
Voice Recorders
State and federal wiretapping and eavesdropping laws
govern the use of voice recorders. Recording
telephone conversations is permissible if the call takes
place in a one-party state. A one-party state requires
consent of only one person directly involved in the
conversation. Approximately 12 U.S. states are two-
party states, which require that both parties consent
to the recording. Voice recorders can also record
verbal statements from witnesses, victims and
suspects.
• Practice
• Telephone Taps with consent
• I wish I could record this conversation and “would u
allow me if I had a recorder?”
Surveillance Technologies
GPS Systems
Private investigators use live GPS systems to track an investigative target's
movements in real time. The GPS unit attaches to the subject's vehicle;
the PI then uses a computer to observe and document the movements.
Passive GPS systems record the subject's movements. Upon removal of
the unit from the vehicle, the PI is then able to upload the recorded
information to another computer. Data is viewable through a mapping
program.
Cost-Monthly Charge-Mounts
• Brickhouse Security
• Gpsfootprints.com
• Xacttrax.com
• Zoombak.com
Surveillance Technologies
Key Loggers
Key loggers record activities on a computer. The key logger plugs into a
USB port on the target's computer and installs a program. The program
records and encrypts information about visited websites and keystrokes.
Retrieving the data requires that the key logger be plugged back into the
USB port; the information uploads directly to the key logger.
• Qualified Computer Tech
• Antivirus
• Spyware Monitoring
• Use of Porn Site Email
Social Engineering
• IP-Relay
– IP-relay.com
• Spoofing Phone calls
– Spoofcard.com
– International Calling Cards
– Target Trap
Forensics
• Mobile Phone Analysis
– Up to 5000 deleted text messages
• Computer analysis
– Web History
– Facebook Chat Logs
– Instant Messenger Chat Logs
– Reconstruction of web pages
– Passwords
Thank you for attending
Questions:
www.garrettdiscovery.com
Office: 217-615-1888

Weitere ähnliche Inhalte

Was ist angesagt?

Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentationJesse Ratcliffe, OSCP
 
Dark Arts Of Social Engineering
Dark Arts Of Social EngineeringDark Arts Of Social Engineering
Dark Arts Of Social EngineeringNutan Kumar Panda
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINTAdam Compton
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source IntelligenceNapier University
 
Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017reconvillage
 
OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc Cyber Threat Intelligence Network
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideAntonio Sanz Alcober
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureOllie Whitehouse
 

Was ist angesagt? (20)

Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Maltego
MaltegoMaltego
Maltego
 
Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Gangcoptechspeak
 
OSINT
OSINTOSINT
OSINT
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Dark Arts Of Social Engineering
Dark Arts Of Social EngineeringDark Arts Of Social Engineering
Dark Arts Of Social Engineering
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017
 
OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
 
Osint primer
Osint primerOsint primer
Osint primer
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 

Ähnlich wie Digital investigations

Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of ThingsJoshua Johnston
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsNicholas Davis
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsNicholas Davis
 
hacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxhacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxsconalbg
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...NCCOMMS
 
Stealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile SurveillancewareStealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile SurveillancewarePriyanka Aash
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...FORnSECSolutions
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : ForensicsKaruna Kak
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...Fredrik Olsson
 

Ähnlich wie Digital investigations (20)

Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
hacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxhacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Stealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile SurveillancewareStealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile Surveillanceware
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : Forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...
 

KĂźrzlich hochgeladen

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

KĂźrzlich hochgeladen (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Digital investigations

  • 1. Digital InvestigationsDigital Investigations Presenter: Andrew GarrettPresenter: Andrew Garrett Garrett Discovery Inc.Garrett Discovery Inc. Presentation forPresentation for Private DetectivesPrivate Detectives
  • 2. Why use technology? Technology is often the usage and knowledge of tools, techniques, crafts, systems or methods of organization in order to solve a problem or serve some purpose Efficiency well use of time and effort Cost Can reduce cost by obtaining a desired outcome without use of another less efficient method
  • 3. Cyber Sleuthing • Using the power of the Internet to gather revealing information on people and to skip trace (track someone down) • For investigators, the web is a broad avenue for informal discovery, allowing litigators to test a witness’ candor and probe a litigant’s background and resources. • Websites (Launch Pad) – Birthdate: Switchboard.com, whowhere.com, anywho.com – Criminal: searchsystems.net – Gov: firstgov.gov, tray.com
  • 4. Social Networking • Facebook By default, when you search for a topic on Facebook, the results you see will be from your list of contacts; your "circle of friends", so to speak. If you would like to expand that circle to include results from anyone who has chosen to make their Facebook information publicly accessible, simply click on "Posts By Everyone". This gives you the option to view information from people who are not included in your contact list. • Myspace • Mylife • Twitter
  • 5. Fake Social Network Pages • Find a friend of your subject that doesn’t post a lot • Copy a few of the pictures of that friend including a profile picture • Let’s assume we are cloning the identity of John Doe that is friends with your subject Jake Harris. • Add a few of John Doe friends to the Facebook account that are common friends with Jake Harris • You now have a believable account! • Add Jake Harris as a friend and he will most likely just add you! • Now you have access and can send him an invite to your wedding and ask for his address if needed.
  • 6. Footprinting Footprinting is searching for collections of data to be used with social engineering to gather more information about your suspect. In order to understand how to footprint you must learn how the web search engines work. All search engines are based on Boolean logic. Always keep your reference sheet handy until memorized.
  • 7. Google Footprinting Operators Description site: Restrict results to only one domain, or server inurl:/allinurl: All terms must appear in URL intitle:/allintitle: All terms must appear in title cache: Display Google’s cache of a page ext:/filetype: Return files with a given extension/file type info: Convenient way to get to other information about a page link: Find pages that link to the given page inanchor: Page is linked to by someone using the term
  • 8. Google Footprinting Operators Description - Inverse search operator (hide results) ~ synonyms [#]..[#] Number range * Wildcard to put something between something when searching with “quotes” + Used to force stop words OR Boolean operator, must be uppercase | Same as OR
  • 9. Surveillance Technologies Video Cameras The video camera is the most valuable piece of equipment in the PI's arsenal. Video cameras provide physical documentation of the PI's observations. In a vehicle, video cameras mount on tripods for mobile surveillance. For stationary surveillance, video cameras are hand-held. Video surveillance is admissible in criminal and civil court and workers' compensation hearings. What about the times you cannot see the suspect? Are there covert cameras?
  • 10. Surveillance Technologies Pinhole Cameras Pinhole cameras, button cameras and micro-cameras are small, about the size of a dime, and placed in a variety of objects for covert surveillance. Pinhole cameras hide easily within a woman's purse, jacket or shirt pocket. A number of nondescript items, such as sunglasses and baseball caps may be purchased with a built-in camera. Pinhole cameras allow a PI to move about freely and even engage the investigative subject in conversation. • Placement • Practice • Cost • Battery Life • Brickhouse.com stuntcams.com
  • 11. Surveillance Technologies Voice Recorders State and federal wiretapping and eavesdropping laws govern the use of voice recorders. Recording telephone conversations is permissible if the call takes place in a one-party state. A one-party state requires consent of only one person directly involved in the conversation. Approximately 12 U.S. states are two- party states, which require that both parties consent to the recording. Voice recorders can also record verbal statements from witnesses, victims and suspects. • Practice • Telephone Taps with consent • I wish I could record this conversation and “would u allow me if I had a recorder?”
  • 12. Surveillance Technologies GPS Systems Private investigators use live GPS systems to track an investigative target's movements in real time. The GPS unit attaches to the subject's vehicle; the PI then uses a computer to observe and document the movements. Passive GPS systems record the subject's movements. Upon removal of the unit from the vehicle, the PI is then able to upload the recorded information to another computer. Data is viewable through a mapping program. Cost-Monthly Charge-Mounts • Brickhouse Security • Gpsfootprints.com • Xacttrax.com • Zoombak.com
  • 13. Surveillance Technologies Key Loggers Key loggers record activities on a computer. The key logger plugs into a USB port on the target's computer and installs a program. The program records and encrypts information about visited websites and keystrokes. Retrieving the data requires that the key logger be plugged back into the USB port; the information uploads directly to the key logger. • Qualified Computer Tech • Antivirus • Spyware Monitoring • Use of Porn Site Email
  • 14. Social Engineering • IP-Relay – IP-relay.com • Spoofing Phone calls – Spoofcard.com – International Calling Cards – Target Trap
  • 15. Forensics • Mobile Phone Analysis – Up to 5000 deleted text messages • Computer analysis – Web History – Facebook Chat Logs – Instant Messenger Chat Logs – Reconstruction of web pages – Passwords
  • 16. Thank you for attending Questions: www.garrettdiscovery.com Office: 217-615-1888