So there are a couple of things we need to do to start the intelligence gathering process from a cyber perspective. It is important to take the time necessary upfront to protect your true identity and location (both physically and virtually) while conducting intelligence-gathering operations. After all, it would be quite embarrassing to have a POI (person of interest) identify your real identity and call you on it. If this occurs, your case and intelligence are gone.
So let’s talk about the steps:
- Set up an Investigators Computer
- Secure and Create Identifying Information
- Set up Sock Puppet Accounts
- Provide Validation Tools for the Sock Puppet Accounts
- Establish Social Proof