SlideShare a Scribd company logo
1 of 16
Digital InvestigationsDigital Investigations
Presenter: Andrew GarrettPresenter: Andrew Garrett
Garrett Discovery Inc.Garrett Discovery Inc.
Presentation forPresentation for
Private DetectivesPrivate Detectives
Why use technology?
Technology
is often the usage and knowledge of tools,
techniques, crafts, systems or methods of organization in
order to solve a problem or serve some purpose
Efficiency
well use of time and effort
Cost
Can reduce cost by obtaining a desired outcome without use
of another less efficient method
Cyber Sleuthing
• Using the power of the Internet to gather revealing
information on people and to skip trace (track someone
down)
• For investigators, the web is a broad avenue for informal
discovery, allowing litigators to test a witness’ candor
and probe a litigant’s background and resources.
• Websites (Launch Pad)
– Birthdate: Switchboard.com, whowhere.com,
anywho.com
– Criminal: searchsystems.net
– Gov: firstgov.gov, tray.com
Social Networking
• Facebook
By default, when you search for a topic on Facebook, the
results you see will be from your list of contacts; your
"circle of friends", so to speak. If you would like to expand
that circle to include results from anyone who has chosen
to make their Facebook information publicly accessible,
simply click on "Posts By Everyone". This gives you the
option to view information from people who are not
included in your contact list.
• Myspace
• Mylife
• Twitter
Fake Social Network Pages
• Find a friend of your subject that doesn’t post a lot
• Copy a few of the pictures of that friend including a profile
picture
• Let’s assume we are cloning the identity of John Doe that is
friends with your subject Jake Harris.
• Add a few of John Doe friends to the Facebook account that are
common friends with Jake Harris
• You now have a believable account!
• Add Jake Harris as a friend and he will most likely just add you!
• Now you have access and can send him an invite to your wedding
and ask for his address if needed.
Footprinting
Footprinting is searching for collections of data to be
used with social engineering to gather more
information about your suspect.
In order to understand how to footprint you must
learn how the web search engines work. All search
engines are based on Boolean logic.
Always keep your reference sheet handy until
memorized.
Google Footprinting
Operators Description
site: Restrict results to only one domain, or
server
inurl:/allinurl: All terms must appear in URL
intitle:/allintitle: All terms must appear in title
cache: Display Google’s cache of a page
ext:/filetype: Return files with a given
extension/file type
info: Convenient way to get to other
information about a page
link: Find pages that link to the given page
inanchor: Page is linked to by someone using
the term
Google Footprinting
Operators Description
- Inverse search operator (hide
results)
~ synonyms
[#]..[#] Number range
* Wildcard to put something
between something when
searching with “quotes”
+ Used to force stop words
OR Boolean operator, must be
uppercase
| Same as OR
Surveillance
Technologies
Video Cameras
The video camera is the most valuable piece of
equipment in the PI's arsenal. Video cameras provide
physical documentation of the PI's observations. In a
vehicle, video cameras mount on tripods for mobile
surveillance. For stationary surveillance, video
cameras are hand-held. Video surveillance is
admissible in criminal and civil court and workers'
compensation hearings.
What about the times you cannot see the suspect?
Are there covert cameras?
Surveillance Technologies
Pinhole Cameras
Pinhole cameras, button cameras and micro-cameras are small, about the
size of a dime, and placed in a variety of objects for covert surveillance.
Pinhole cameras hide easily within a woman's purse, jacket or shirt
pocket. A number of nondescript items, such as sunglasses and baseball
caps may be purchased with a built-in camera. Pinhole cameras allow a PI
to move about freely and even engage the investigative subject in
conversation.
• Placement
• Practice
• Cost
• Battery Life
• Brickhouse.com stuntcams.com
Surveillance
Technologies
Voice Recorders
State and federal wiretapping and eavesdropping laws
govern the use of voice recorders. Recording
telephone conversations is permissible if the call takes
place in a one-party state. A one-party state requires
consent of only one person directly involved in the
conversation. Approximately 12 U.S. states are two-
party states, which require that both parties consent
to the recording. Voice recorders can also record
verbal statements from witnesses, victims and
suspects.
• Practice
• Telephone Taps with consent
• I wish I could record this conversation and “would u
allow me if I had a recorder?”
Surveillance Technologies
GPS Systems
Private investigators use live GPS systems to track an investigative target's
movements in real time. The GPS unit attaches to the subject's vehicle;
the PI then uses a computer to observe and document the movements.
Passive GPS systems record the subject's movements. Upon removal of
the unit from the vehicle, the PI is then able to upload the recorded
information to another computer. Data is viewable through a mapping
program.
Cost-Monthly Charge-Mounts
• Brickhouse Security
• Gpsfootprints.com
• Xacttrax.com
• Zoombak.com
Surveillance Technologies
Key Loggers
Key loggers record activities on a computer. The key logger plugs into a
USB port on the target's computer and installs a program. The program
records and encrypts information about visited websites and keystrokes.
Retrieving the data requires that the key logger be plugged back into the
USB port; the information uploads directly to the key logger.
• Qualified Computer Tech
• Antivirus
• Spyware Monitoring
• Use of Porn Site Email
Social Engineering
• IP-Relay
– IP-relay.com
• Spoofing Phone calls
– Spoofcard.com
– International Calling Cards
– Target Trap
Forensics
• Mobile Phone Analysis
– Up to 5000 deleted text messages
• Computer analysis
– Web History
– Facebook Chat Logs
– Instant Messenger Chat Logs
– Reconstruction of web pages
– Passwords
Thank you for attending
Questions:
www.garrettdiscovery.com
Office: 217-615-1888

More Related Content

What's hot

Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
Dark Arts Of Social Engineering
Dark Arts Of Social EngineeringDark Arts Of Social Engineering
Dark Arts Of Social EngineeringNutan Kumar Panda
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINTAdam Compton
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
 
Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017reconvillage
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideAntonio Sanz Alcober
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureOllie Whitehouse
 

What's hot (20)

Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Maltego
MaltegoMaltego
Maltego
 
Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Gangcoptechspeak
 
OSINT
OSINTOSINT
OSINT
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Dark Arts Of Social Engineering
Dark Arts Of Social EngineeringDark Arts Of Social Engineering
Dark Arts Of Social Engineering
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017
 
OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
 
Osint primer
Osint primerOsint primer
Osint primer
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 

Similar to Digital investigations

Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
hacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxhacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxsconalbg
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...NCCOMMS
 
Stealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile SurveillancewareStealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile SurveillancewarePriyanka Aash
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...FORnSECSolutions
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : ForensicsKaruna Kak
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...Fredrik Olsson
 

Similar to Digital investigations (20)

Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
hacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxhacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Stealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile SurveillancewareStealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile Surveillanceware
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : Forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Digital investigations

  • 1. Digital InvestigationsDigital Investigations Presenter: Andrew GarrettPresenter: Andrew Garrett Garrett Discovery Inc.Garrett Discovery Inc. Presentation forPresentation for Private DetectivesPrivate Detectives
  • 2. Why use technology? Technology is often the usage and knowledge of tools, techniques, crafts, systems or methods of organization in order to solve a problem or serve some purpose Efficiency well use of time and effort Cost Can reduce cost by obtaining a desired outcome without use of another less efficient method
  • 3. Cyber Sleuthing • Using the power of the Internet to gather revealing information on people and to skip trace (track someone down) • For investigators, the web is a broad avenue for informal discovery, allowing litigators to test a witness’ candor and probe a litigant’s background and resources. • Websites (Launch Pad) – Birthdate: Switchboard.com, whowhere.com, anywho.com – Criminal: searchsystems.net – Gov: firstgov.gov, tray.com
  • 4. Social Networking • Facebook By default, when you search for a topic on Facebook, the results you see will be from your list of contacts; your "circle of friends", so to speak. If you would like to expand that circle to include results from anyone who has chosen to make their Facebook information publicly accessible, simply click on "Posts By Everyone". This gives you the option to view information from people who are not included in your contact list. • Myspace • Mylife • Twitter
  • 5. Fake Social Network Pages • Find a friend of your subject that doesn’t post a lot • Copy a few of the pictures of that friend including a profile picture • Let’s assume we are cloning the identity of John Doe that is friends with your subject Jake Harris. • Add a few of John Doe friends to the Facebook account that are common friends with Jake Harris • You now have a believable account! • Add Jake Harris as a friend and he will most likely just add you! • Now you have access and can send him an invite to your wedding and ask for his address if needed.
  • 6. Footprinting Footprinting is searching for collections of data to be used with social engineering to gather more information about your suspect. In order to understand how to footprint you must learn how the web search engines work. All search engines are based on Boolean logic. Always keep your reference sheet handy until memorized.
  • 7. Google Footprinting Operators Description site: Restrict results to only one domain, or server inurl:/allinurl: All terms must appear in URL intitle:/allintitle: All terms must appear in title cache: Display Google’s cache of a page ext:/filetype: Return files with a given extension/file type info: Convenient way to get to other information about a page link: Find pages that link to the given page inanchor: Page is linked to by someone using the term
  • 8. Google Footprinting Operators Description - Inverse search operator (hide results) ~ synonyms [#]..[#] Number range * Wildcard to put something between something when searching with “quotes” + Used to force stop words OR Boolean operator, must be uppercase | Same as OR
  • 9. Surveillance Technologies Video Cameras The video camera is the most valuable piece of equipment in the PI's arsenal. Video cameras provide physical documentation of the PI's observations. In a vehicle, video cameras mount on tripods for mobile surveillance. For stationary surveillance, video cameras are hand-held. Video surveillance is admissible in criminal and civil court and workers' compensation hearings. What about the times you cannot see the suspect? Are there covert cameras?
  • 10. Surveillance Technologies Pinhole Cameras Pinhole cameras, button cameras and micro-cameras are small, about the size of a dime, and placed in a variety of objects for covert surveillance. Pinhole cameras hide easily within a woman's purse, jacket or shirt pocket. A number of nondescript items, such as sunglasses and baseball caps may be purchased with a built-in camera. Pinhole cameras allow a PI to move about freely and even engage the investigative subject in conversation. • Placement • Practice • Cost • Battery Life • Brickhouse.com stuntcams.com
  • 11. Surveillance Technologies Voice Recorders State and federal wiretapping and eavesdropping laws govern the use of voice recorders. Recording telephone conversations is permissible if the call takes place in a one-party state. A one-party state requires consent of only one person directly involved in the conversation. Approximately 12 U.S. states are two- party states, which require that both parties consent to the recording. Voice recorders can also record verbal statements from witnesses, victims and suspects. • Practice • Telephone Taps with consent • I wish I could record this conversation and “would u allow me if I had a recorder?”
  • 12. Surveillance Technologies GPS Systems Private investigators use live GPS systems to track an investigative target's movements in real time. The GPS unit attaches to the subject's vehicle; the PI then uses a computer to observe and document the movements. Passive GPS systems record the subject's movements. Upon removal of the unit from the vehicle, the PI is then able to upload the recorded information to another computer. Data is viewable through a mapping program. Cost-Monthly Charge-Mounts • Brickhouse Security • Gpsfootprints.com • Xacttrax.com • Zoombak.com
  • 13. Surveillance Technologies Key Loggers Key loggers record activities on a computer. The key logger plugs into a USB port on the target's computer and installs a program. The program records and encrypts information about visited websites and keystrokes. Retrieving the data requires that the key logger be plugged back into the USB port; the information uploads directly to the key logger. • Qualified Computer Tech • Antivirus • Spyware Monitoring • Use of Porn Site Email
  • 14. Social Engineering • IP-Relay – IP-relay.com • Spoofing Phone calls – Spoofcard.com – International Calling Cards – Target Trap
  • 15. Forensics • Mobile Phone Analysis – Up to 5000 deleted text messages • Computer analysis – Web History – Facebook Chat Logs – Instant Messenger Chat Logs – Reconstruction of web pages – Passwords
  • 16. Thank you for attending Questions: www.garrettdiscovery.com Office: 217-615-1888