case examples on investigative techniques and intelligence ......•use a vpn (tor) at all times...
TRANSCRIPT
![Page 1: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/1.jpg)
BOGDAN CIINARU | BANGKOK | 10.09.2019
Case Examples on Investigative Techniques and
Intelligence Gathering
![Page 2: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/2.jpg)
![Page 3: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/3.jpg)
• Use a VPN (TOR) at all times when online.• Search widely, ba ck up and reinforce your findings• Make a note/ take copies of ALL evidence collected at the time of identification
(date): Screenprints Hyperlinks Website copies (Static/ video capture).• Record EVERYTHING that you provide to websites (pseudonyms) for future
reference and recall.• Understand the market (language, terminology, options...)• Lot of luck needed
![Page 4: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/4.jpg)
• Consistency - Criminals adopt an identity and keep it!• Confirm one identity – run checks on “ username “ elsewhere• Where possible, also consider ‘alternative spellings’:‘Bogdan123’‘B0gdan123’‘Bogdan_123’ ....
User Names
![Page 5: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/5.jpg)
VPN – Virtual Privat Network
• Hide your IP address
• Change your IP address
• Mask your location
• Encrypt data transfers
• Access blocked websites
![Page 6: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/6.jpg)
• Consider both current and historical registration domain records• Applicable date ranges of these periods• New leads - names, email addresses, telephone numbers, addresses• Site options:
Domain Tools (domaintools.com)Whoisology (whoisology.com)Domain History (domainhistory.net)
Domain Records – GDPR!?
![Page 7: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/7.jpg)
Terms and Conditions/ Disclaimer Pages
Contact details (including indication of geography) Affiliate companies Parent companies Phrasing used elsewhere online (compare and link)
• Interrogate for further information on:
![Page 8: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/8.jpg)
Payment Methods
• Proceed through mock check-out process• Use fake information to ‘analyse’• Do not complete!• Appropriate:
Check-out process Account summary
![Page 9: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/9.jpg)
BaiduBingAskAOLExciteYahooDogpileMetacrawlerGigablast…
Search Engines on internet
![Page 10: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/10.jpg)
WebMii :http://webmii.com
Pipl : https://pipl.com/
Peoplesearch : https://www.pplesearch.com/
…
Search People
15
![Page 11: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/11.jpg)
UK OSINT SOCIAL MEDIA SEARCH tool
http://www.uk-osint.net/facebook.html
![Page 12: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/12.jpg)
![Page 13: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/13.jpg)
![Page 14: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/14.jpg)
![Page 15: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/15.jpg)
![Page 16: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/16.jpg)
Geolocation
- Google maps (GPS) maps.google.com
- Maps (historical)
- Geolocation (IP address)
- https://www.iplocation.net
- http://www.infosniper.net
- https://www.openstreetmap.org
![Page 17: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/17.jpg)
http://www.lettermelater.com
http://www.emkei.cz
http://www.anonymouse.com
http://www.yandex.com
![Page 18: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/18.jpg)
https://www.ip-adress.com/trace-email-
address#result
Email header analyzer
![Page 19: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/19.jpg)
IMAGES FROM BROWSERS
Google Imagesimages.Google.com
Bingbing.com/images
Yandex (Russia)images.yandex.com
Baidu (Chinese)stu.baidu.com
![Page 20: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/20.jpg)
METADATA /IMAGES
Verexif (On-line Resource)Removes Exif data from an image.http://www.verexif.com/
Onlineocr (On-line Resource)Performs text recognition from an image or PDf and converts to Document (e.g. Doc, xls)https://www.onlineocr.net/
Free OCR (On-line Resource)Performs text recognition from an image with characters.www.free-ocr.com
FotoForensics (On-line Resource)Returns metadata, and among other features, checks if an image has been manipulated.http://fotoforensics.com/
![Page 21: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/21.jpg)
Stolencamerafinder (On-line Resource)By the image serial checks the origin of the camera, and search were are other photos taken by the camera.http://www.stolencamerafinder.co.uk/
Getghiro (Application)Application environment for forensic image analysis.http://www.getghiro.org/
METADATA /IMAGES
![Page 22: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/22.jpg)
Display Video Frames
https://www.youtube.com/watch?v=K9qSsb_1iyA
http://i.ytimg.com/vi/K9qSsb_1iyA/0.jpghttp://i.ytimg.com/vi/K9qSsb_1iyA/1.jpghttp://i.ytimg.com/vi/K9qSsb_1iyA/2.jpghttp://i.ytimg.com/vi/K9qSsb_1iyA/3.jpg
Reverse Videohttps://inteltechniques.com/menu.html
Metadatahttps://citizenevidence.amnestyusa.org
VIDEO
![Page 23: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/23.jpg)
https://osintframework.com/
![Page 24: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/24.jpg)
https://github.com/jivoi/awesome-osint
![Page 26: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/26.jpg)
https://www.paterva.com/web7/downloads.php
![Page 27: Case Examples on Investigative Techniques and Intelligence ......•Use a VPN (TOR) at all times when online. • Search widely, ba ck up and reinforce your findings • Make a note](https://reader031.vdocument.in/reader031/viewer/2022011917/5fe6e40aefd54950524e2b11/html5/thumbnails/27.jpg)
Thank you for your attention!
Bogdan CÎINARUTel.: +31611782482