Pular para o conteúdo principal

Compartilhe

Como posso descobrir quem é o proprietário de uma conta do Hotmail?

Como posso descobrir quem é o proprietário de uma conta do Hotmail? Os motivos pelos quais é difícil e as medidas que você pode tomar. Leo Notenboom Seguir 3 minutos de leitura · 23 de abril de 2017 17 1 Pressione Enter ou clique para ver a imagem em tamanho real. Imagem: canva.com Continuo recebendo e-mails "estranhos" de alguém usando uma conta do Hotmail. Como posso descobrir quem essa pessoa realmente é? O Hotmail (agora Outlook.com) é um dos sistemas de e-mail mais usados ​​(e abusados) do planeta. Uma das razões para isso é que é praticamente impossível saber quem realmente é o dono de uma conta do Hotmail. Existem situações em que acredito ser possível encontrar o proprietário de uma conta Hotmail, mas é difícil e você não vai gostar do processo. Experimente você mesmo Primeiro, vamos analisar por que é tão difícil determinar o proprietário de uma conta do Hotmail, Outlook.com, Yahoo, Gmail… ou qualquer conta de e-mail gratuita. Crie uma nova conta no Outlook.com e, en...

Fundamentals of Cyber Investigations and Human Intelligence

The working language of the seminar will be English. Please note that currently, some documents related to registration and pre-information are only available in German. If you thus have any questions, feel free to contact us via mail or phone.

The environment for criminal investigations has dramatically changed. Today’s criminals are tech-savvy and regularly misuse modern online tools and platforms for their criminal agenda. A vast amount of crimes today includes online activity, communications, tools and platforms. That means that plenty of evidence can be found through traces left on the internet. Investigators can utilize those same resources, to uncover and collect trails and evidence relating to their cases.

In this unique course you will be taught how to gather in-depth information about your target from publicly available resources, through the discipline of Open Source Intelligence (OSINT). The methods taught will help you discover new leads in your investigation and facilitate your evidence collection. You will also learn to profile a target through Social Media Intelligence (SOCMINT) and then utilize this profile to engage with the target and elicit information that will facilitate your investigation through methods of Human Intelligence (HUMINT). This course is particularly useful for both open and covert operations, as well as passive reconnaissance and information gathering on specific suspects. This course combines established intelligence collection practices with state-of-the-art technologies, and methodologies.

Outline:

  • Introduction
    o Course Overview: A hidden world in plain sight
    o Terminology
    o Legal considerations
    o Internet technologies
    o Intelligence cycle
  • Operational Security (OPSEC)
    o Cyber risks & countermeasures
    o Investigation workspace
    o Creation of sock puppets
  • Open Source Intelligence (OSINT)
    o Basic search techniques
    o People searches including (username, e-mail address and phone)
    o Website investigation
  • Social Media Intelligence (SOCMINT)
    o Basic information gathering principles for social networks
    o Content analysis
    o Cold Reading: conducting inferences and logical deductions
    o Reverse image searches
    o Forensic linguistics
  • Human Intelligence (HUMINT)
    o Profiling
    o Non-verbal communication
    o Engaging and building rapport
    o Perception reframing & information elicitation
    o Influence techniques
  • Collection & Documentation
    o Basic web scraping
    o Preserving evidence
    o OSINT Frameworks
  • Intelligence Analysis
    o Basic intelligence analysis principles
    o Common Pitfalls & Cognitive Biases
    o Graphical analysis techniques
  • Christina Lekati
  • Samuel  Lolagar

Introduction; Operational Security (OPSEC); Open Source Intelligence (OSINT); Social Media Intelligence (SOCMINT); Human Intelligence (HUMINT); Collection & Documentation; Intelligence Analysis

Security Consultant and Trainer
Cyber Security Experte

Comentários

Como usar um Agente OSINT IA

Pericia Digital

Ebook

Postagens mais visitadas