Open-Source Intelligence and Digital Foot printing
Malicious actors have been using specially crafted tools to collect information (like the police have search tools across a number of databases) and data companies collect so much information about us that a lot of free tools (OSINT) can be used to collect that information.
So, what does an innocent individual have in their arsenal to defend himself? Knowing what information is out there using OSINT tools.
Digital Footprint
Your digital footprint comprises every email you’ve ever sent, every post you’ve shared on social media, or every picture you’ve taken and uploaded on Instagram.
You know what they say about the internet, once it’s online, it can never be completely erased.
Your digital footprint also contains everything you aren’t aware that you’re doing online. For instance, every time you agree to let a website store your cookies and digital information or your IP address gets stored somewhere, you’re adding to your digital footprint. One way to think about your digital footprints is to categorize them as either “active” or “passive.”
“Passive” footprints are those you leave behind without intending to, or in some cases knowing. For instance, websites that collect information about how many times you have visited in the recent past are adding to your digital footprint in a “passive” fashion. You don’t choose to hand them this data, they collect it when a device at your IP address connects with their websites.
Because this is a hidden process, you may not realize it is happening at all.
“Active” footprints are those you leave when you make deliberate choices on the Internet. Posts you make to your own social media channels are a well-known form of the active footprint.
When you are logged into project management or a similar site, changes you make that are connected to your login name are also part of your active footprint.
How to find yourself in 4 steps
Enter your name into several search engines. – use google, bing, yahoo or if you want to be hidden use duck duck go etc…
If you want to know what an individual without log-in knows about you use google chrome in hidden mode.
Use our search tools like ThatsThem or PiPL or SPOKEO,paid service or check what is on your social media using FB People Directory or Facebook Email Search if you just have a personal e-mail (yours)
Check the location you’re sharing on social media with Creepy or how much you’re sleeping Facebook Sleep Stats
Some consequence of identity theft
- A good example story of a person who got his identity stolen Bennett Arron and made a stand-up of it.
Identity profiling can lead to very targeted phishing campaigns and ultimately result in damage to companies and individuals as it happened to these two C-Levels.
Burglars target households when people are away. How do they know? Simply watching social media activity or another example.
A fraudster can collect information from a bank account using the statement that you trash. They can call you and impersonate the bank. In those case always hang up and call directly the bank number.