It is a reference to the manipulation of a simple hand puppet made from a sock and is often used to refer to alternative online identities or user accounts created for the purpose of deception and operational security. A sock puppet is defined as a person whose actions are controlled by another. In Internet terms, sock puppets are online identities used for disguised activity by the operator. Why is it important to be aware of the types of data that can identify us? Because it is a two-way street, and we must take these into account to set up our sock puppet. The list above is not exhaustive, but it provides a general overview of the types of data that make it possible to identify a person. Professional And Employment: Experience in the professional world, the professional record of the worker, and positions they’ve occupied.Academic And Training: Academic record, training, and qualifications.Social Services: Aid or subsidies, receipt of social assistance benefits, subsidies, and pensions.Judicial: Judicial file or history, sanctions, and judicial procedures.Administrative: Administrative procedures, claims and appeals, sanctions, records, applications, and concessions.Medical or health: Medical history of the individual and health controls, among others.Economic-financial: Bank details, income, income, credits, loans, guarantees, pension plan, and retirement.Family: Genealogical tree, names of parents, siblings, children, etc.Social: Properties, hobbies and lifestyles, membership in forums, clubs or associations.Personal Or Identifying Data: Name, surname, ID or NIE, social security number, address, telephone, date and place of birth, age, and marital status.What is personal data? It is any information that allows us to identify a natural person or make a person identifiable. To better visualize the kind of information that we should be protecting, we can talk about “spheres” or areas of our daily lives that may be breached. The personal safety of the investigator involves, among many other things, shielding all data associated with his or her private life. Happy Holidays! The 5 Levels and Types of Personal Data □︎ We want to share these with you and hope you can implement them to benefit your investigations in the near future. One strategy to prevent this when we are performing OSINT investigations is by using a sock puppet.īecause prevention is the best protection, we at Maltego have made our Christmas list of must-have features for sock puppets when performing in-depth OSINT investigations. If the investigator does not have all their flanks covered with respect to their personal security, the other aspects (virtual, operational, strategic, and tactical) can be seriously compromised. The security of an operation starts with the investigator in charge. It shouldn’t be different in the virtual realm. It is a must in every aspect of our daily lives. Sicherheit, securité, seguridad, ασφάλεια, sicurezza, veiligheids, safety. Security within an Operation Starts with the Investigators □︎
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |