So there are a couple of things we need to do to start the intelligence gathering process from a cyber perspective. It is important to take the time necessary upfront to protect your true identity and location (both physically and virtually) while conducting intelligence-gathering operations. After all, it would be quite embarrassing to have a POI (person of interest) identify your real identity and call you on it. If this occurs, your case and intelligence are gone.

So let’s talk about the steps:

  1. Set up an Investigators Computer
  2. Secure and Create Identifying Information
  3. Set up Sock Puppet Accounts
  4. Provide Validation Tools for the Sock Puppet Accounts
  5. Establish Social Proof


Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Post Comment

Michael Clayton wrote: Apr 10, 2019

I'm eager to learn something new!