SlideShare a Scribd company logo
1 of 32
GREGORY GONDWE
BLANTYRE
MALAWI
Who understands it?
What is it then?
Creative and innovative ways
to find information on a
source or someone you’re
investigating
Involves using freely available search
tools to more usefully sift through
publicly-accessible information that’s
online.
What you actually do with that information
is, of course, entirely up to you.
Evil or Illegal
or Both
“Social media sleuthing is not
hacking and is not illegal but the
most important aspect of social
media sleuthing is to be a
journalist, not a stalker.” -
Michael Salzwedel, Social
Weaver, 2018.
According to Salzwedel
People leave digital footprints or
fingerprints which are not easily visible
Social media sleuthing is a helpful
approach that journalists can use to find
information.
What are the Platforms that journalists can
use to find public information of people on
social media
For journalists, it answers the big
picture questions about who you are
looking into or monitoring.
Example,
What Can You look into ?
A source,
 Their past relationships and friendships,
People they have met up with,
Places they have been,
Where they have worked,
The stories they’ve read and shared.
During the 2018 African Journalism
Investigative Conference Michael
Salzwedel from shared simple tools for
journalists to use to dig deep into
people’s social media background.
Open-Source Intelligence (OSINT) OSINT
Framework
A tool that collects and brings data from public sources.
Provides access to free tools and reasonably priced
resources.
Useful tool for finding valuable information by querying
free search engines such as Google, and other resources,
and tools publicly available on the internet.
How it works:
 Person’s registered companies.
 Framework has an option of “business records” when you click on it, it
opens up another menu which will include annual reports, employee
profile, general info, company profiles and more.
 Clicking on “company profile” will lead you to a number of tools such
as UK Data, UK Companies list, Vault, Owler (R), Kompass
International where you can search for the company profile.
Fishing for names, fishing for nicknames
 IntelTechniques, an OSINT has been taken down
 Namecheckr is a website that, simply, checks a lot websites for usernames.
 Backgrounding - Tom Mpinganjira
 Namecheckr will find all the profiles on Twitter, Tumblr, etc., etc., etc.
 Try it with all the various emails and usernames he has.
Pipl
It is a free to use, large people search engine,
A person’s real identity behind their email address,
social media usernames or phone number.
Everything about a person, including personal,
professional, demographic, and contact
information.
How to use it,
Copy and Paste or Type - phone number,
email address, name or username of the
person you’re looking for and the
platform will bring up any information it
finds.
Facebook
Stalkscan
Free tool that shows all public information of any
given Facebook profile.
Displays public information from Facebook’s
official graph search.
 Attention!
 As of June 6th, you can scan only your own profile with this tool.
 After two years and 28M+ StalkScan sessions, Facebook decided to make the
Graph Search less transparent.
 As usual, they did this without any communication or dialogue with activists and
journalists that used it for legitimate purposes.
 The creepy graph search itself still exists, but is now less accessible and more
difficult to use.
 Make sure to check yourself with this tool, since your data is still out there!
The results depend on:
Privacy settings.
If the information is set to ‘friends only’
it will only show up for Facebook friends.
How to use Stalkscan
Pick a Facebook account you would like to
sleuth,
Open the profile (on Facebook),
Facebook then has a profile code/number for
the account in the link, copy that link into
Stalkscan,
 Stalkscan then gives you different tabs including:
 Available options (you can set the year of the profile you like to search through,
search through their past relationships, age, friends. co-workers)
 Tags,
 Pictures,
 Places,
 People,
 Interests,
 Comments
 Liked posts
Tweetdeck
Set up columns to monitor sources,
Monitor specific hashtags,
Refine columns (e.g for verified accounts only,
popular tweets only, monitor mentions of
users by other users).
FollowFly will sort by likes or retweets, but
only for the last year. And only for accounts,
not hashtags or anything.
SocialBearing will go back 3,200 tweets… but
you have to sit there clicking a button to load
200 tweets a time.
Social bearing
Provides free Twitter analytics and
searches for tweets, timelines & twitter
maps.
Find, filter and sort tweets or people
through engagement, influence, location,
sentiment and more.
Mentionmapp
Visualise your social network,
Discover connections and influencers,
Make anyone the centre of your attention (even
sources or those you are investigating), to quickly
see who they have the most interactions with.
Mention, shows where/how you have been
mentioned
OTHER TOOLS
MapChecking calculates the size
of an area,
How many people may be standing in it
- based on how thick the crowd is
Used for crowd estimation, like at
protests and such.
HaveIBeenPwned checks if
your email has gotten got in a
hack
Privacy tools
 SelfControl
 Tor
Hides your web browsing
Private windows, hide your browser history
Google and other trackers are still very aware of
what you’ve done
Tor
Protects protestors, secret agents, and
journalists from being censored or killed
Tor is the strongest tool for privacy and
freedom online.
It is free and open source software
maintained by the Tor Project and a
community of volunteers worldwide.
 https://socialweaver.com/
 https://osintframework.com/
 https://www.namecheckr.com/
 https://pipl.com/
 https://stalkscan.com/
 http://followfly.co/
 https://socialbearing.com/
 https://mentionmapp.com/
 https://www.mapchecking.com/
 https://haveibeenpwned.com/
GOD BE WITH
US ALL!

More Related Content

What's hot

Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101Srinivasan Vanamali
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Ajin Abraham
 
Mobile Application Design & Development
Mobile Application Design & DevelopmentMobile Application Design & Development
Mobile Application Design & DevelopmentRonnie Liew
 
Android Application Development Using Java
Android Application Development Using JavaAndroid Application Development Using Java
Android Application Development Using Javaamaankhan
 
Be Social. Use CrowdRE.
Be Social. Use CrowdRE.Be Social. Use CrowdRE.
Be Social. Use CrowdRE.CrowdStrike
 
QA Fest 2019. Катерина Овеченко. Тестирование безопасности API
QA Fest 2019. Катерина Овеченко. Тестирование безопасности APIQA Fest 2019. Катерина Овеченко. Тестирование безопасности API
QA Fest 2019. Катерина Овеченко. Тестирование безопасности APIQAFest
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
Aggregating API Services with an API Gateway (BFF)
Aggregating API Services with an API Gateway (BFF)Aggregating API Services with an API Gateway (BFF)
Aggregating API Services with an API Gateway (BFF)José Roberto Araújo
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDIDavid Sweigert
 
Threat intelligence notes
Threat intelligence notesThreat intelligence notes
Threat intelligence notesAmgad Magdy
 
Introduction to appDynamics
Introduction to appDynamics Introduction to appDynamics
Introduction to appDynamics Siddhanta Rath
 
Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...Internet Security Auditors
 

What's hot (20)

Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
 
Mobile Application Design & Development
Mobile Application Design & DevelopmentMobile Application Design & Development
Mobile Application Design & Development
 
Android Application Development Using Java
Android Application Development Using JavaAndroid Application Development Using Java
Android Application Development Using Java
 
Be Social. Use CrowdRE.
Be Social. Use CrowdRE.Be Social. Use CrowdRE.
Be Social. Use CrowdRE.
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
QA Fest 2019. Катерина Овеченко. Тестирование безопасности API
QA Fest 2019. Катерина Овеченко. Тестирование безопасности APIQA Fest 2019. Катерина Овеченко. Тестирование безопасности API
QA Fest 2019. Катерина Овеченко. Тестирование безопасности API
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
Aggregating API Services with an API Gateway (BFF)
Aggregating API Services with an API Gateway (BFF)Aggregating API Services with an API Gateway (BFF)
Aggregating API Services with an API Gateway (BFF)
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
Threat intelligence notes
Threat intelligence notesThreat intelligence notes
Threat intelligence notes
 
Introduction to appDynamics
Introduction to appDynamics Introduction to appDynamics
Introduction to appDynamics
 
Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...
 
Android studio
Android studioAndroid studio
Android studio
 
Fuzzing.pptx
Fuzzing.pptxFuzzing.pptx
Fuzzing.pptx
 
Android Architecture
Android ArchitectureAndroid Architecture
Android Architecture
 
website phishing by NR
website phishing by NRwebsite phishing by NR
website phishing by NR
 
Sécurité des applications web
Sécurité des applications webSécurité des applications web
Sécurité des applications web
 

Similar to Social Media Sleuthing

Social Media Newsgathering Tools
Social Media Newsgathering ToolsSocial Media Newsgathering Tools
Social Media Newsgathering ToolsAlaa Mahmoud
 
Social Media Monitoring—A presentation for @Midwest
Social Media Monitoring—A presentation for @MidwestSocial Media Monitoring—A presentation for @Midwest
Social Media Monitoring—A presentation for @MidwestBrian Huonker
 
CMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome ExtensionCMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome ExtensionLarissaChurchill
 
John Blue - Notes for Social Media 101, 2018 University of Scouting, Indianap...
John Blue - Notes for Social Media 101, 2018 University of Scouting, Indianap...John Blue - Notes for Social Media 101, 2018 University of Scouting, Indianap...
John Blue - Notes for Social Media 101, 2018 University of Scouting, Indianap...John Blue
 
Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014Christie Wilcox
 
Barc Socail Media Presentation
Barc Socail Media PresentationBarc Socail Media Presentation
Barc Socail Media Presentationdustinpitcher
 
Your 'traditional' social media toolkit
Your 'traditional' social media toolkitYour 'traditional' social media toolkit
Your 'traditional' social media toolkitjoniayn
 
Put Social Media to Work for You and Your Organization
Put Social Media to Work for You and Your OrganizationPut Social Media to Work for You and Your Organization
Put Social Media to Work for You and Your OrganizationKatherine Swartz Hilton
 
HOW TO FIND STORIES BY NEWSGATHERING AND MONITORING THE SOCIAL WEB
HOW TO FIND STORIES BY NEWSGATHERING AND MONITORING THE SOCIAL WEBHOW TO FIND STORIES BY NEWSGATHERING AND MONITORING THE SOCIAL WEB
HOW TO FIND STORIES BY NEWSGATHERING AND MONITORING THE SOCIAL WEBJavier334441
 
Social media quick reference
Social media quick referenceSocial media quick reference
Social media quick referencewordspring
 
Add Taste To Your Network
Add Taste To Your NetworkAdd Taste To Your Network
Add Taste To Your NetworkMark Comerford
 
Innovation Methods: The Essential Guide to Digital Ethnography
Innovation Methods: The Essential Guide to Digital EthnographyInnovation Methods: The Essential Guide to Digital Ethnography
Innovation Methods: The Essential Guide to Digital EthnographyKevin C. Cummins
 
News-gathering and Monitoring | by: Menna El-hosary
News-gathering and Monitoring | by: Menna El-hosaryNews-gathering and Monitoring | by: Menna El-hosary
News-gathering and Monitoring | by: Menna El-hosaryMenna El-hosary
 
NENPA: Using social media to improve your journalism
NENPA: Using social media to improve your journalismNENPA: Using social media to improve your journalism
NENPA: Using social media to improve your journalismTory Starr
 
Fantastic four presentation
Fantastic four presentationFantastic four presentation
Fantastic four presentationJason Posner
 
Social Media 202 for journalists: Using SM as a research tool
Social Media 202 for journalists: Using SM as a research toolSocial Media 202 for journalists: Using SM as a research tool
Social Media 202 for journalists: Using SM as a research toolRobin J Phillips
 

Similar to Social Media Sleuthing (20)

Social Media Newsgathering Tools
Social Media Newsgathering ToolsSocial Media Newsgathering Tools
Social Media Newsgathering Tools
 
Social Media Monitoring—A presentation for @Midwest
Social Media Monitoring—A presentation for @MidwestSocial Media Monitoring—A presentation for @Midwest
Social Media Monitoring—A presentation for @Midwest
 
CMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome ExtensionCMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome Extension
 
John Blue - Notes for Social Media 101, 2018 University of Scouting, Indianap...
John Blue - Notes for Social Media 101, 2018 University of Scouting, Indianap...John Blue - Notes for Social Media 101, 2018 University of Scouting, Indianap...
John Blue - Notes for Social Media 101, 2018 University of Scouting, Indianap...
 
Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014
 
Barc Socail Media Presentation
Barc Socail Media PresentationBarc Socail Media Presentation
Barc Socail Media Presentation
 
Your 'traditional' social media toolkit
Your 'traditional' social media toolkitYour 'traditional' social media toolkit
Your 'traditional' social media toolkit
 
Put Social Media to Work for You and Your Organization
Put Social Media to Work for You and Your OrganizationPut Social Media to Work for You and Your Organization
Put Social Media to Work for You and Your Organization
 
HOW TO FIND STORIES BY NEWSGATHERING AND MONITORING THE SOCIAL WEB
HOW TO FIND STORIES BY NEWSGATHERING AND MONITORING THE SOCIAL WEBHOW TO FIND STORIES BY NEWSGATHERING AND MONITORING THE SOCIAL WEB
HOW TO FIND STORIES BY NEWSGATHERING AND MONITORING THE SOCIAL WEB
 
Social media quick reference
Social media quick referenceSocial media quick reference
Social media quick reference
 
Twitter: Social Media Prospecting Tool
Twitter: Social Media Prospecting ToolTwitter: Social Media Prospecting Tool
Twitter: Social Media Prospecting Tool
 
Add Taste To Your Network
Add Taste To Your NetworkAdd Taste To Your Network
Add Taste To Your Network
 
Innovation Methods: The Essential Guide to Digital Ethnography
Innovation Methods: The Essential Guide to Digital EthnographyInnovation Methods: The Essential Guide to Digital Ethnography
Innovation Methods: The Essential Guide to Digital Ethnography
 
News-gathering and Monitoring | by: Menna El-hosary
News-gathering and Monitoring | by: Menna El-hosaryNews-gathering and Monitoring | by: Menna El-hosary
News-gathering and Monitoring | by: Menna El-hosary
 
NENPA: Using social media to improve your journalism
NENPA: Using social media to improve your journalismNENPA: Using social media to improve your journalism
NENPA: Using social media to improve your journalism
 
Fantastic four presentation
Fantastic four presentationFantastic four presentation
Fantastic four presentation
 
Social Media 202 for journalists: Using SM as a research tool
Social Media 202 for journalists: Using SM as a research toolSocial Media 202 for journalists: Using SM as a research tool
Social Media 202 for journalists: Using SM as a research tool
 
Social Media 202
Social Media 202Social Media 202
Social Media 202
 
Social Media for Outreach
Social Media for OutreachSocial Media for Outreach
Social Media for Outreach
 
Nfp workshop
Nfp workshop Nfp workshop
Nfp workshop
 

Recently uploaded

April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramMoniSankarHazra
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlkumarajju5765
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 

Recently uploaded (20)

April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 

Social Media Sleuthing

  • 3. Creative and innovative ways to find information on a source or someone you’re investigating
  • 4. Involves using freely available search tools to more usefully sift through publicly-accessible information that’s online. What you actually do with that information is, of course, entirely up to you.
  • 6. “Social media sleuthing is not hacking and is not illegal but the most important aspect of social media sleuthing is to be a journalist, not a stalker.” - Michael Salzwedel, Social Weaver, 2018.
  • 7. According to Salzwedel People leave digital footprints or fingerprints which are not easily visible Social media sleuthing is a helpful approach that journalists can use to find information.
  • 8. What are the Platforms that journalists can use to find public information of people on social media
  • 9. For journalists, it answers the big picture questions about who you are looking into or monitoring.
  • 11. A source,  Their past relationships and friendships, People they have met up with, Places they have been, Where they have worked, The stories they’ve read and shared.
  • 12. During the 2018 African Journalism Investigative Conference Michael Salzwedel from shared simple tools for journalists to use to dig deep into people’s social media background.
  • 13. Open-Source Intelligence (OSINT) OSINT Framework A tool that collects and brings data from public sources. Provides access to free tools and reasonably priced resources. Useful tool for finding valuable information by querying free search engines such as Google, and other resources, and tools publicly available on the internet.
  • 14. How it works:  Person’s registered companies.  Framework has an option of “business records” when you click on it, it opens up another menu which will include annual reports, employee profile, general info, company profiles and more.  Clicking on “company profile” will lead you to a number of tools such as UK Data, UK Companies list, Vault, Owler (R), Kompass International where you can search for the company profile.
  • 15. Fishing for names, fishing for nicknames  IntelTechniques, an OSINT has been taken down  Namecheckr is a website that, simply, checks a lot websites for usernames.  Backgrounding - Tom Mpinganjira  Namecheckr will find all the profiles on Twitter, Tumblr, etc., etc., etc.  Try it with all the various emails and usernames he has.
  • 16. Pipl It is a free to use, large people search engine, A person’s real identity behind their email address, social media usernames or phone number. Everything about a person, including personal, professional, demographic, and contact information.
  • 17. How to use it, Copy and Paste or Type - phone number, email address, name or username of the person you’re looking for and the platform will bring up any information it finds.
  • 18. Facebook Stalkscan Free tool that shows all public information of any given Facebook profile. Displays public information from Facebook’s official graph search.
  • 19.  Attention!  As of June 6th, you can scan only your own profile with this tool.  After two years and 28M+ StalkScan sessions, Facebook decided to make the Graph Search less transparent.  As usual, they did this without any communication or dialogue with activists and journalists that used it for legitimate purposes.  The creepy graph search itself still exists, but is now less accessible and more difficult to use.  Make sure to check yourself with this tool, since your data is still out there!
  • 20. The results depend on: Privacy settings. If the information is set to ‘friends only’ it will only show up for Facebook friends.
  • 21. How to use Stalkscan Pick a Facebook account you would like to sleuth, Open the profile (on Facebook), Facebook then has a profile code/number for the account in the link, copy that link into Stalkscan,
  • 22.  Stalkscan then gives you different tabs including:  Available options (you can set the year of the profile you like to search through, search through their past relationships, age, friends. co-workers)  Tags,  Pictures,  Places,  People,  Interests,  Comments  Liked posts
  • 23. Tweetdeck Set up columns to monitor sources, Monitor specific hashtags, Refine columns (e.g for verified accounts only, popular tweets only, monitor mentions of users by other users).
  • 24. FollowFly will sort by likes or retweets, but only for the last year. And only for accounts, not hashtags or anything. SocialBearing will go back 3,200 tweets… but you have to sit there clicking a button to load 200 tweets a time.
  • 25. Social bearing Provides free Twitter analytics and searches for tweets, timelines & twitter maps. Find, filter and sort tweets or people through engagement, influence, location, sentiment and more.
  • 26. Mentionmapp Visualise your social network, Discover connections and influencers, Make anyone the centre of your attention (even sources or those you are investigating), to quickly see who they have the most interactions with. Mention, shows where/how you have been mentioned
  • 27. OTHER TOOLS MapChecking calculates the size of an area, How many people may be standing in it - based on how thick the crowd is Used for crowd estimation, like at protests and such.
  • 28. HaveIBeenPwned checks if your email has gotten got in a hack
  • 29. Privacy tools  SelfControl  Tor Hides your web browsing Private windows, hide your browser history Google and other trackers are still very aware of what you’ve done
  • 30. Tor Protects protestors, secret agents, and journalists from being censored or killed Tor is the strongest tool for privacy and freedom online. It is free and open source software maintained by the Tor Project and a community of volunteers worldwide.
  • 31.  https://socialweaver.com/  https://osintframework.com/  https://www.namecheckr.com/  https://pipl.com/  https://stalkscan.com/  http://followfly.co/  https://socialbearing.com/  https://mentionmapp.com/  https://www.mapchecking.com/  https://haveibeenpwned.com/