• Sock puppet accounts are mainly known to those outside the information security field as accounts used for disinformation purposes, such as swaying your opinion about a topic or a product. However, this is not the only way to use a sock puppet account. In Hg’s Summer FactSheet, up-and-coming cybersecurity researcher Dakota State University Junior, Mariel Klosterman, describes how sock puppets are used by malicious actors and OSINT investigators, types of sock puppet accounts, and how to create a sock puppet for information collection.
  • While billions of people are under stay-at-home and work from home orders, predators are taking advantage of people’s fears, anxiety, and losses at mind-numbing proportions. Children, who are now spending more time online for schooling, are targets for exploitation by pedophiles. Seniors are vulnerable from financial scams, and businesses are vulnerable from hacking, phishing, and cybercrimes. We are committed to serve the public by providing information on the latest scams, exploitation, and fraudulent activities as we are all in this together.
  • Evaluating Public Records Databases 

    Years ago it would have taken an investigator weeks and a great deal of financing to locate pertinent information for background checks and cases. Today there are a number of good public record vendors from which to choose.  
  • GEO-Investigation Online

    In this issue of Data2Know, we focus on all the facets of online geo-investigation. Learn how and where to conduct real-time/passive and real-time/active geotracking online and all the tricks of the widely-ranged trade. We also take you into the world of geophoto-data and explain how to get behind online photos and search them for clues.  
  • Open Source Searching with Maltego by Paterva

    In this issue of Data2Know, read about the details of open source searching with Paterva’s software, Maltego, and the wide world of trademark searches and investigations through TESS. Here, we take you through Maltego and explain how to utilize it to your best advantage when trying to locate a subject online.
  • Securing Your Profile in Facebook

    Are you certain your profile is secure with Facebook? Facebook makes it challenging to keep up with your privacy controls. The privacy policies change often and there is extensive information published regarding the settings. In this issue learn the tools to protect yourself.
  • Analytical Models for Investigations

    My recommended reading list includes anything written by Craig Fleisher and Babette Bensoussan. Together they have published several works on applying analytical methods which are easy to follow and incredible tools for building your report writing.  
  • Medical Fraud-An Online Case Study

    Every now and then a case comes through the office that astounds me. I’m reminiscing on the absolutely “I can’t believe they thought they’d get away with this” foolish insurance fraudsters.
  • Product Review: Reputation.com

    Reputations, whether personal or institutional, cannot be easily scrubbed clean once a dark mark has been laid upon it, hence firms like ours and Reputation.com who are enlisted to try and quell the noise and remove or bury more sensitive postings.  
  • Protecting Your Image Online

    "Have you Googled yourself lately?" Not a bad line to throw out at happy hour, because it is sure to bring a few chuckles. However, this is a very serious statement to make not only to investigators, police officers and prosecutors - but anyone else concerned about personal security.

Title

Go to Top