Posts

Electronic Fingerprinting: Mobile Devices Behind The Shadows

Image
Passive tracking is pervasive in today’s world. Let’s talk more about that. While we’ve all heard about web fingerprinting and had that moment where we wondered if our microphones were listening to us, most of that tracking revolves around the internet and being tracked by our patterns and the information we share via our social media and browsing habits. However there is another form of electronic surveillance that we experience many times each day, and our experience is that most people don’t give that a second thought. Today, we’re going to talk about how you can be betrayed by something you use every single day and what you can do to mitigate this should you wish to do so. You don’t get far as an Investigator without having a creative brain and finding ingenious ways to navigate problems while using technology to maintain an edge in the field. While this technology can be used in many situations sometimes legally speaking many tools are not suitable for the job, leading to ass...

HACKED! The evolution of Private Sector Cyberwar in the current Ukraine conflict.

Firstly, with this conflict not even 12 months old, its important we clearly state one thing. Historians, analysts and military tacticians at large will dissect nearly every part of this conflict with the intent of drawing out as much information and intelligence as possible however this will have to be done in the future, when some form of peace has been obtained. Assessing current combat strength, effectiveness and ability to conduct operations unimpeded on Ukrainian soil is well beyond the scope of this article. We’ll leave that bit to the historians, today we’ll purely be discussing the Ukrainian response to those initial days and what was done to assist to transitioning Ukraine from a force under pressure and near collapse due to enemy invasions to a first rate fighting force, using tactics weapons and innovations that any tier 1 military can be proud of. As we approach the 12 month anniversary of the “special military operation”, that anyone else would call a war, we’d like to ...

We're published! The first 2 investigator515 books are ready for release.

Image
We're now published!!!!! 2 Live, 2 to go We missed the Wednesday blog cycle this week, for one very important reason. We've just finished our first round of publishing!!! We figured that its never great missing a post during the cycle, but missing it because you're compiling things to be published is mostly acceptable right??? Hold on, cause we're about to fill you in on exactly whats happening for us over the next few months. Firstly, after a short and brief love affair with google and blogspot, the investigator515 blog is now moving to a now home. Originally found at investigator515.blogspot.com, while we configured the site and domain for catfisher.info the new subdomain will be going live this week. We've attatched it to the catfisher.info site to keep everything streamlined, however we will leave most other things unchanged. There'll still be two publications a week, one on Wed and one on Sun, and we'll still rotate through OSINT anaylsis', curren...

Basic Counter Surveillance for Travellers and Tourists.

Note: In this article we've provided some affordable options for those who wish to go a step further in regards to securing their privacy. These are provided through affiliate links, through which we may recieve a small commission. Whilst you wont find commercial counter surveillance devices cheaply on amazon, there are some effective ways to attain affordable peace of mind. When it comes to traveling and staying in a new place, whether it's an Airbnb property or a hotel, there are a number of risks to consider in terms of privacy and security. One of the most common risks is traffic interception, which occurs when someone intercepts the network traffic of a guest, allowing them to see sensitive information such as login credentials and credit card numbers. This can happen through the use of a malicious Wi-Fi network or by hacking into the hotel's network. Some guests have reported finding hidden cameras in their Airbnb properties or hotels, which can be used to spy ...

OSINT. Oh What? How Open Souce Intelligence Connects our World

Image
Jake11 found via OSINT. Jake11 has been extensively tracked providing ELINT data during the ukrainian war. OSINT has become a bit of a buzzword, whilst becoming more blurred on whats actually classified as open source intelligence. Today we'll look quickly at some of the ways open source intelligence connects our world behind the scenes. First, lets get a ChatGPT refresher on just what exactly is defined as open source intelligence, and a quick history of its evolution. Open source intelligence, or OSINT for short, is like a treasure hunt for information. Imagine a group of detectives scouring the streets, looking for clues to solve a mystery. Except instead of physical clues, they're searching for information in the vast expanse of the internet and other publicly available sources. The history of OSINT can be traced back to the early days of intelligence gathering, when spies would sneak into enemy territories to gather information. But with the advent of the internet ...

ad social bar