SlideShare a Scribd company logo
1 of 23
© 2014 The Hetherington Group
Conducting Anonymous
Online Investigations
Cynthia Hetherington, Hetherington Group
© 2014 The Hetherington Group
Cynthia Hetherington
Cynthia is one of the most respected authorities on
the topics of online investigations and online
security.
•Librarian
•Analyst
•Security Practitioner
•Investigator
•Author of:
 Business Background Investigations
 The Manual to Online Public Records
 Web of Deceit
 Data2Know.com: Internet & Online Intelligence
Newsletter
© 2014 The Hetherington Group
In Short…
Anywhere you find
convenience
I will find you.
© 2014 The Hetherington Group
Acxiom’s - Aboutthedata.com
• Thousands of databases
• Millions of websites
• Dozens of possible experts
• Hundreds of listservs, mailing lists, e-mail groups
© 2014 The Hetherington Group
Surfing Anonymously
• www.torproject.org
© 2014 The Hetherington Group
Please Read the Small Print
Want to Really Work?
•...then please don't just install it and go on. You need to change some
of your habits and reconfigure your software! Tor, by itself, is NOT all
you need to maintain your anonymity. There are several major pitfalls
to watch closely.
•Tor only protects Internet applications that are configured to send
their traffic through Tor—it doesn't magically make all your traffic
anonymous just because you install it. We recommend you use Firefox
with the Torbutton extension.
© 2014 The Hetherington Group
Create a New E-mail Account
© 2014 The Hetherington Group
E-mail Rules
• Check with the boss first
• Do not use your real identity or anything that appears to be
your real identity
– No Nascar drivers, sports teams, badge numbers,
geographic indicators, or kids names in the User ID
section
• Do not put in a proper e-mail address
• Do not answer the security questions properly
© 2014 The Hetherington Group
Social Network Participation
• Facebook does not reveal the viewer to the person they are
checking out
• Linkedin does reveal the viewer unless they make their
profile anonymous
• MySpace has an application that can be added to reveal IP
addresses as well as User IDs (if you’re logged in)
• Twitter does not reveal who is looking at your profile
© 2014 The Hetherington Group
Undercover Accounts
© 2014 The Hetherington Group
Facebook
• Facebook has a strict Terms of Service stating
you are not to create a false profile in order to
deceive their users into revealing themselves
• Most Facebook participants are now sensitive
to strangers trying to “friend” them
• If you are being friended, have a challenge
question ready for the supposed friend to vet
them
© 2014 The Hetherington Group
Would You Friend Danny?
© 2014 The Hetherington Group
Would Rawan Friend You?
© 2014 The Hetherington Group
Facebook
You are better off creating an account of something
local
or inanimate
© 2014 The Hetherington Group
Beware Facebook
Facial recognition is now at 80%
– http://www.bbc.co.uk/news/magazine-15069858
Your cell phone directory is now public information
– http://www.facebook.com/group.php?
gid=2392434374
© 2014 The Hetherington Group
LinkedIn
• Make yourself anonymous
• Log into your account
• Select Settings
• In the middle of the screen you’ll see Privacy Controls
• Choose Select what others see when you’ve viewed their profile
© 2014 The Hetherington Group
Choose Anonymous
The only caveat is that you can not see who is viewing your profile if you select
anonymous, unless you pay for the $25 per month subscription.
Choose anonymous
© 2014 The Hetherington Group
LinkedIn Hazards
While you are making your profile anonymous,
check out the following items to lock down your
account:
PRIVACY CONTROLS
– Turn on/off your activity broadcasts
– Select who can see your activity feed
– Select who can see your connections
– Change your profile photo & visibility
© 2014 The Hetherington Group
Twitter
• Twitter is accessible without having an account
• There are some reasonably intelligent individuals to follow on
Twitter that cover the security markets
• Do not discount Twitter as a waste of time — most suspects are
live tweeting constantly
© 2014 The Hetherington Group
Twitter Do Nots
• Don’t be too specific! There is a big difference between “Just
bought a gazillion carat ring on XX Avenue, leaving store now”
and “Just bought and engagement ring, wish me luck!”
• On that note, say it, don’t spray it: Don’t spit excessive personal
information—this is about as dangerous on Twitter as it is on any
other social network.
• Call the police, don’t tweet about it!
• Don’t tweet about moving servers, changing passwords, or any
other type of situation where your security could be
compromised more easily.
– Source: http://www.twitip.com/twitter-security-dos-and-donts/
© 2014 The Hetherington Group
Twitter Dos
• There are hundreds of Twitter tools everywhere. In your Twitter
settings, you can manage which applications have access to your
data and which don’t in the Connection tab
• Choose a strong password—Twitter’s famous attacks have been
known to start with a hacker guessing someone’s password
• Do use direct messages when appropriate, not everything is meant
to be said in the wild
• Consider having a private, separate account for work or project-
related purposes
© 2014 The Hetherington Group
Other Social Networks
• So far, there is no industry standard for social networks
• Read through the FAQs and information sheets on each service
• Try a friend’s account to view your own personal accounts to see
what you are exposing
• Software designers and hackers are both in a race to monetize
your profile!
© 2014 The Hetherington Group
Thank-you for participating
If you have any questions, please feel free
to email them to:
Cynthia Hetherington
CH@hetheringtongroup.com
Joe Gerard, Vice President Marketing and Sales, i-Sight
j.gerard@i-sight.com

More Related Content

What's hot

Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywherePhil Bradley
 
Social media user guide
Social media user guideSocial media user guide
Social media user guideWhitney Moore
 
06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And Learn06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And LearnJeff Geoghan
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and AdvantageTechno World 4 U
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
The changing world of search
The changing world of searchThe changing world of search
The changing world of searchPhil Bradley
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The UglyDr. Joel Evans
 
Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Phil Bradley
 
Social Media - My Story and Your Story
Social Media - My Story and Your StorySocial Media - My Story and Your Story
Social Media - My Story and Your StoryiSource Solutions Inc.
 
Twitter for NOT so dummies webinar
Twitter for NOT so dummies webinarTwitter for NOT so dummies webinar
Twitter for NOT so dummies webinarshipyourideas
 
Social Media: The good, the bad & the ugly
Social Media: The good, the bad & the ugly Social Media: The good, the bad & the ugly
Social Media: The good, the bad & the ugly Carol Skyring
 
Twitter 101
Twitter 101Twitter 101
Twitter 101elliotel
 
Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Phil Bradley
 
Social Media and the Job World
Social Media and the Job WorldSocial Media and the Job World
Social Media and the Job WorldMike Schaffer
 
Social Media 202, goals, structure, state government
Social Media 202, goals, structure, state governmentSocial Media 202, goals, structure, state government
Social Media 202, goals, structure, state governmentRobin J Phillips
 

What's hot (20)

Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywhere
 
Social media user guide
Social media user guideSocial media user guide
Social media user guide
 
06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And Learn06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And Learn
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
The changing world of search
The changing world of searchThe changing world of search
The changing world of search
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014
 
Social Media - My Story and Your Story
Social Media - My Story and Your StorySocial Media - My Story and Your Story
Social Media - My Story and Your Story
 
Social Media Job Search
Social Media Job SearchSocial Media Job Search
Social Media Job Search
 
Twitter for NOT so dummies webinar
Twitter for NOT so dummies webinarTwitter for NOT so dummies webinar
Twitter for NOT so dummies webinar
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
Social Media: The good, the bad & the ugly
Social Media: The good, the bad & the ugly Social Media: The good, the bad & the ugly
Social Media: The good, the bad & the ugly
 
Twitter 101
Twitter 101Twitter 101
Twitter 101
 
All about Twitter
All about TwitterAll about Twitter
All about Twitter
 
Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013
 
Social Media and the Job World
Social Media and the Job WorldSocial Media and the Job World
Social Media and the Job World
 
Social Media 202, goals, structure, state government
Social Media 202, goals, structure, state governmentSocial Media 202, goals, structure, state government
Social Media 202, goals, structure, state government
 

Similar to Conducting Anonymous Online Investigations - Webinar

Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...Philip Calvert
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking serviceManish S Thingalaya
 
Introduction to social media workshop - Community organisations in Havering (...
Introduction to social media workshop - Community organisations in Havering (...Introduction to social media workshop - Community organisations in Havering (...
Introduction to social media workshop - Community organisations in Havering (...Bottom Line Ideas
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1Julian Ranger
 
State of Social Media for Civic Leaders 2013
State of Social Media for Civic Leaders 2013State of Social Media for Civic Leaders 2013
State of Social Media for Civic Leaders 2013Kemp Edmonds
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxsaththiyans1
 
Twitter case study final
Twitter case study  finalTwitter case study  final
Twitter case study finalAishwaryaa Ravi
 
Building Donor Engagement through Social Media
Building Donor Engagement through Social MediaBuilding Donor Engagement through Social Media
Building Donor Engagement through Social MediaKyle Lacy
 

Similar to Conducting Anonymous Online Investigations - Webinar (20)

Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Introduction to social media workshop - Community organisations in Havering (...
Introduction to social media workshop - Community organisations in Havering (...Introduction to social media workshop - Community organisations in Havering (...
Introduction to social media workshop - Community organisations in Havering (...
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
State of Social Media for Civic Leaders 2013
State of Social Media for Civic Leaders 2013State of Social Media for Civic Leaders 2013
State of Social Media for Civic Leaders 2013
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Twitter case study final
Twitter case study  finalTwitter case study  final
Twitter case study final
 
Building Donor Engagement through Social Media
Building Donor Engagement through Social MediaBuilding Donor Engagement through Social Media
Building Donor Engagement through Social Media
 

More from Case IQ

How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskHow Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskCase IQ
 
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...Case IQ
 
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Case IQ
 
Protecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsProtecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsCase IQ
 
Meric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxMeric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxCase IQ
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work CultureCase IQ
 
How to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceHow to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceCase IQ
 
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Case IQ
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer IncidentsCase IQ
 
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Case IQ
 
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Case IQ
 
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...Case IQ
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?Case IQ
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Case IQ
 
Building Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingBuilding Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingCase IQ
 
How to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceHow to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceCase IQ
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsCase IQ
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Case IQ
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionCase IQ
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk Case IQ
 

More from Case IQ (20)

How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskHow Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
 
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
 
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
 
Protecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsProtecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate Investigators
 
Meric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxMeric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptx
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture
 
How to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceHow to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of Compliance
 
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
 
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
 
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
 
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
 
Building Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingBuilding Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and Training
 
How to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceHow to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplace
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace Investigators
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 

Conducting Anonymous Online Investigations - Webinar

  • 1. © 2014 The Hetherington Group Conducting Anonymous Online Investigations Cynthia Hetherington, Hetherington Group
  • 2. © 2014 The Hetherington Group Cynthia Hetherington Cynthia is one of the most respected authorities on the topics of online investigations and online security. •Librarian •Analyst •Security Practitioner •Investigator •Author of:  Business Background Investigations  The Manual to Online Public Records  Web of Deceit  Data2Know.com: Internet & Online Intelligence Newsletter
  • 3. © 2014 The Hetherington Group In Short… Anywhere you find convenience I will find you.
  • 4. © 2014 The Hetherington Group Acxiom’s - Aboutthedata.com • Thousands of databases • Millions of websites • Dozens of possible experts • Hundreds of listservs, mailing lists, e-mail groups
  • 5. © 2014 The Hetherington Group Surfing Anonymously • www.torproject.org
  • 6. © 2014 The Hetherington Group Please Read the Small Print Want to Really Work? •...then please don't just install it and go on. You need to change some of your habits and reconfigure your software! Tor, by itself, is NOT all you need to maintain your anonymity. There are several major pitfalls to watch closely. •Tor only protects Internet applications that are configured to send their traffic through Tor—it doesn't magically make all your traffic anonymous just because you install it. We recommend you use Firefox with the Torbutton extension.
  • 7. © 2014 The Hetherington Group Create a New E-mail Account
  • 8. © 2014 The Hetherington Group E-mail Rules • Check with the boss first • Do not use your real identity or anything that appears to be your real identity – No Nascar drivers, sports teams, badge numbers, geographic indicators, or kids names in the User ID section • Do not put in a proper e-mail address • Do not answer the security questions properly
  • 9. © 2014 The Hetherington Group Social Network Participation • Facebook does not reveal the viewer to the person they are checking out • Linkedin does reveal the viewer unless they make their profile anonymous • MySpace has an application that can be added to reveal IP addresses as well as User IDs (if you’re logged in) • Twitter does not reveal who is looking at your profile
  • 10. © 2014 The Hetherington Group Undercover Accounts
  • 11. © 2014 The Hetherington Group Facebook • Facebook has a strict Terms of Service stating you are not to create a false profile in order to deceive their users into revealing themselves • Most Facebook participants are now sensitive to strangers trying to “friend” them • If you are being friended, have a challenge question ready for the supposed friend to vet them
  • 12. © 2014 The Hetherington Group Would You Friend Danny?
  • 13. © 2014 The Hetherington Group Would Rawan Friend You?
  • 14. © 2014 The Hetherington Group Facebook You are better off creating an account of something local or inanimate
  • 15. © 2014 The Hetherington Group Beware Facebook Facial recognition is now at 80% – http://www.bbc.co.uk/news/magazine-15069858 Your cell phone directory is now public information – http://www.facebook.com/group.php? gid=2392434374
  • 16. © 2014 The Hetherington Group LinkedIn • Make yourself anonymous • Log into your account • Select Settings • In the middle of the screen you’ll see Privacy Controls • Choose Select what others see when you’ve viewed their profile
  • 17. © 2014 The Hetherington Group Choose Anonymous The only caveat is that you can not see who is viewing your profile if you select anonymous, unless you pay for the $25 per month subscription. Choose anonymous
  • 18. © 2014 The Hetherington Group LinkedIn Hazards While you are making your profile anonymous, check out the following items to lock down your account: PRIVACY CONTROLS – Turn on/off your activity broadcasts – Select who can see your activity feed – Select who can see your connections – Change your profile photo & visibility
  • 19. © 2014 The Hetherington Group Twitter • Twitter is accessible without having an account • There are some reasonably intelligent individuals to follow on Twitter that cover the security markets • Do not discount Twitter as a waste of time — most suspects are live tweeting constantly
  • 20. © 2014 The Hetherington Group Twitter Do Nots • Don’t be too specific! There is a big difference between “Just bought a gazillion carat ring on XX Avenue, leaving store now” and “Just bought and engagement ring, wish me luck!” • On that note, say it, don’t spray it: Don’t spit excessive personal information—this is about as dangerous on Twitter as it is on any other social network. • Call the police, don’t tweet about it! • Don’t tweet about moving servers, changing passwords, or any other type of situation where your security could be compromised more easily. – Source: http://www.twitip.com/twitter-security-dos-and-donts/
  • 21. © 2014 The Hetherington Group Twitter Dos • There are hundreds of Twitter tools everywhere. In your Twitter settings, you can manage which applications have access to your data and which don’t in the Connection tab • Choose a strong password—Twitter’s famous attacks have been known to start with a hacker guessing someone’s password • Do use direct messages when appropriate, not everything is meant to be said in the wild • Consider having a private, separate account for work or project- related purposes
  • 22. © 2014 The Hetherington Group Other Social Networks • So far, there is no industry standard for social networks • Read through the FAQs and information sheets on each service • Try a friend’s account to view your own personal accounts to see what you are exposing • Software designers and hackers are both in a race to monetize your profile!
  • 23. © 2014 The Hetherington Group Thank-you for participating If you have any questions, please feel free to email them to: Cynthia Hetherington CH@hetheringtongroup.com Joe Gerard, Vice President Marketing and Sales, i-Sight j.gerard@i-sight.com