5 Vital Cyber Security Tips For Private Investigators

5 Vital Cyber Security Tips For Private Investigators

Cyber security is important for everyone, but it is especially important for private investigators and detectives who are browsing through the profiles of subjects, witnesses and criminals for clues and evidence.

Open source intelligence has a lot of value, and it should never be dismissed, even for the smallest of cases...but jumping right in without preparation can put yourself at risk.

On many social media platforms the subject can see who is viewing their profile. If the person owns the site you are looking at, let's say it's a shop or a portfolio, they can see your IP address, the device you are using, and even the browser you're accessing it from (trust me, I have a blog).

If the subject is more tech savvy than you are, they may have various tools and methods to conduct counter-surveillance, and you may find yourself the victim of cyber harassment, stalking, blackmail, doxxing (exposing your private information online, even on the dark web) or extortion (obtaining money through threats).

Therefore, online intelligence is not something to be done casually or without proper precaution.

If you're new to using the internet as an investigation tool, here are some basic tips you should take to heart before your next case:


1. Create Fake/Sock Puppet Accounts

While obvious, this tip is sometimes neglected due to the time it takes to create and maintain fake accounts.

Sure, you can quickly create a fake account when you need it, but that person may still find it suspicious when an account that was created yesterday, with no friends or posts, is looking at their profile. It is much better to have established accounts that won't draw any attention. Best of all, you can use them over and over again!

Use FakeNameGenerator for ideas on a full alias, and Dashlane to save your passwords securely so you don't forget them!


2. Use A VPN (Virtual Private Network)

A VPN is a software installed onto your device that encrypts all your information so anyone who tries to snoop in on your Wifi or who are on the other side of the site you are visiting can't learn anything about you. Your location, device, and all other personal information is hidden and encoded.

This tool is especially useful if you can't access a site or video due to your location, or want to appear to be in a certain country to convince your subject. VPNs are super cheap, usually costing $3-10/month, and can be installed on every device. This is not only useful for your investigations, but for your own general security as well.

A couple of the most highly rated VPNs on the market are NordVPN and ExpressVPN.

Note: Do NOT install a free VPN. VPN's have servers to maintain and they need people to update, maintain, and secure it regularly. VPNs need money to ensure it is safe for it's users. Some of these free VPNs make money by selling your data, or they simply aren't that secure, thus defeating it's purpose. A VPN is definitely worth the investment.


3. Use A Secured Browser/Search Engine

If you're a Google or Google Chrome user, did you know that Google is always collecting and selling your information? Everything you do, every site you visit, everything you look up is being recorded and used to build a profile about you. This profile can then be sold or used to advertise to you. That also means this information is being saved and anyone who hacks or snoops in to your device can access it as well.

One of the best mainstream browsers for privacy is Firefox. Firefox is also great because you can download various useful extensions for your investigations.

As for search engines, DuckDuckGo is certainly the winner, and luckily, it feels like Google too!


4. Avoid Posting Personal Information Online

This goes for your real accounts and your sockpuppet accounts. I'm not saying you should avoid posting anything at all, but definitely be more cautious about what information you may be providing unintentionally.

You may post a photo in front of your building, and clues in the background could tell others exactly where you live. You may be sharing a post about your oldest pet, Rufus, and ironically, that is the answer to a lot of your security questions. You may include your birth year in your email address and username, or love posting photos of your car which can make it easier to find you in public.

Always think twice before posting, cause once it's online, it's there forever. Even if you delete it, someone else may have already downloaded it, or it is permanently archived on the internet.


5. Do Not Click On Risky Emails

Email is the way of life, and many private investigators may rely on it to correspond with their customers and send evidence. The more you use and share your email, the more junk and spam is going to pile up. It also leaves you vulnerable to potential hackers and phishing scams.

First off, if your email is your main point of contact, do not, I repeat, DO NOT, just click on any link or attachment. Even if it is addressed to you and sounds like a real case, always look for these warning signs before taking a chance. Even if nothing pops up and your computer doesn't crash, that doesn't mean nothing happened.

Clicking on an email can send your coordinates to the person who sent it, and clicking on a link or attachment can allow them to secretly download malware or trojans that allow them to freely access your device, browse through your files, use your webcam, and even hold your device for ransom.

Second, if possible, always have multiple email addresses. As I mentioned in my ultimate privacy guide, you never want to have one email address for everything. You may want one for your payments and taxes, one for potential customers, one for customers you've already onboarded, one for social medias, and one that you don't really care about to sign up for webinars and free stuff. The amount is up to you, but this way, if one does get hacked or compromised, you aren't losing everything in one go. You should use different passwords for each, and use each one as a recovery address for another.


Bonus: Have A Separate Computer For OSINT

While I know it's not always in everyone's budget to have two computers, it is certainly worth the investment if you plan to do online intelligence often.

Having a separate computer not only ensures your personal information is kept away from your work, but it also makes it easier to jump in when you need to and is better forensically for court. You can set your device up right from the very beginning, and ensure all the tools and software you need is ready to go.

If you are just conducting background checks or keeping an eye on cheating spouses, it may not be necessary, but if you are dealing with legal cases, dangerous suspects, or cyber criminals, this is a must.


In Conclusion...

Cyber security is important for everyone, but it is especially vital for those who need to be up in other people's business. One careless move can cause a lot of trouble for you later on, so do all you can to stay safe.

If you are interested in more security tools, tutorials for open source intelligence, and sites that are amazing for your online investigations, why not become a member of Cyber Intel Resources?

I created this database specifically for private investigators so anyone at any skill level can jump right in and find everything they could possibly need for any kind of case. The internet can help you with surveillance, insurance fraud, corporate investigations, skip tracing, cheating/adultery, and much more, so it shouldn't be taken for granted. Feel free to message me if you would like more information or details.

You can also like and follow my Linkedin page for a free weekly tool you can add to your toolbox!

I hope this article has given you the insight you need to feel more safe and confident with online investigations. Always remember that is is better to take steps to keep yourself safe than to deal with the aftermath of a cyber crime.

Feel free to share and don't hesitate to message me if you have questions or would like more advice!

Edmund Magdziarek ?????

Professional Investigator, Process Server ?????

3 å¹´

Some useful reminders there. As professionals we shouldn't be the "it won't happen to me" type. I was recently having issues with a fellow investigator. He had started sending me harassing emails, which was great for me as I then had his IP address and was able to identify who was sending the emails.

David G. Herrera

Owner, Herrera Investigative Services

3 å¹´

Sabrina, this was a fact-filled article with so much good and valuable operational information. Thank you so much for taking the time to go into so much detail. David

Great article! Thank you for sharing such valuable tips!

Eli W. Wilkerson, MBA/M

Cyber / Fraud Forensics | Criminal Case Consultant | Private Investigator | CII, CFE, CEH, & CASIP

3 å¹´

Outstanding write up.

Tamara R.

Managed Detection & Response (MDR) | Governance, Risk & Compliance (GRC) | Identity Access Mgmt. (IAM) | Security+ | ITIL | AI

3 å¹´

Great write-up! Sharing and saving

要查看或添加评论,请登录

Sabrina Liverpool, CCIP, CSMIE, COSINT的更多文章

社区洞察

其他会员也浏览了