The Privacy, Security, & OSINT Show – Episode 103

Posted on December 14th, 2018

EPISODE 103: Intermediate Disinformation, Reputation Management, & Usenet Archives

This week I continue the conversation about disinformation tactics, introduce the idea of future reputation management, and discuss a recent OSINT project collecting Usenet archive data.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

Silent Pocket: https://silent-pocket.com/discount/totalprivacy
Authentic8: https://info.authentic8.com/

INTRO:

Locked account issues
Taylor Swift’s facial recognition system
Spam messages from email searches

INTERMEDIATE DISINFORMATION & REPUTATION MANAGEMENT:

Proactive vs Reactive
Domains
Social Networks
Family Trees
Business Listings:
https://advertising.superpages.com/contact/
https://www.merchantcircle.com/signup#step=stepOne
https://getstarted.thryv.com/free-listing-yp/
https://smallbusiness.yahoo.com/local
https://www.bingplaces.com/
Paste Sites
Classifieds
Address
Telephone

OSINT: USENET ARCHIVES:
https://internetarchive.readthedocs.io/en/latest/
https://archive.org/details/usenethistorical
https://archive.org/details/giganews

LISTENER QUESTIONS:

Q: Have you had success with getting auto insurance for a car titled in a trust?

Q: I will soon be joining the InfraGard and one of their requirement is they will run the background check. Does it mean I will fail their check since I have credit freeze on my account? Should I remove the freeze prior to asking them to run the background check?


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 103

Bomb Threat Extortion Emails

Posted on December 14th, 2018

We have been bombarded with email extortion lately. Recently, most of us received an email containing an old password and a threat to expose our internet search history unless we pay a hefty ransom via Bitcoin. We know these are hoaxes. Today, my inbox was full of people asking me about a specific message received at their business. While most of these messages were similar, some had minor wording differences. Here is a redacted example:


Hello.  My man has hidden the explosive device (Tetryl) in the building where your business is conducted. My recruited person built the bomb according to my guide. It can be hidden anywhere because of its small size, it can not damage the structure of the building, but there will be many wounded people if it explodes.

My mercenary is watching the situation around the building. If he sees any unusual behavior or emergency he will blow up the device.

I can withdraw my recruited person if you pay. 20’000 usd is the price for your life. Pay it to me in BTC and I guarantee that I have to call off my recruited person and the bomb will not detonate. But do not try to fool me- my warranty will become valid only after 3 confirms in blockchain network.

It is my BTC address – REDACTED

You have to send money by the end of the working day. If you are late with the payment the bomb will explode.
Nothing personal this is just a business, if you don’t send me the money and the bomb detonates, next time other companies will send me more money, because this isnt a one-time action.
 I will not visit this email account. I monitor my Bitcoin address every 35 min and after receiving the payment I will order my person to leave your district.

If a bomb detonates and the authorities read this email:
We are not terrorists and do not take liability for explosions in other places.


This scam seems to be hitting everything from small businesses to large corporations to government buildings and hospitals. Please spread the word that these are hoaxes, and to always do a bit of research before taking extreme action. I always encourage people to take a small unique sentence from these emails and search it within quotes. It will almost always reveal other sources. In this incident, the wave hit very quickly and online evidence was not present at the peak of the threats. At this time, I am monitoring a handful of BTC addresses, but so far no payments have been made to them (thankfully).

Here are a few articles that hit on “can withdraw my recruited person if you pay”:

https://www.google.com/search?q=”can+withdraw+my+recruited+person+if+you+pay”

The “From” email addresses all appear to be either spoofed or hijacked accounts. In this scam, a return email is not necessary, so any address could be used. Unfortunately, I think we will see much more of this.

 

Filed under Security | Comments Off on Bomb Threat Extortion Emails

The Privacy, Security, & OSINT Show – Episode 102

Posted on December 9th, 2018

EPISODE 102: A Bad Week for Hotels and Their Customers

This week I discuss the Marriott breach, more hotel sextortion, and some Facebook search tips involving locations.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

Pay with Privacy: https://privacy.com/inteltechniques
Authentic8: https://info.authentic8.com/

INTRO:

Dennis Regan:
https://www.youtube.com/channel/UCEP-9V9nXovVAHqN3RlEdhg
https://twitter.com/DennisRegan333

Dry Bar Comedy:
https://www.youtube.com/watch?v=u3CCo3X5yVA

MARRIOTT BREACH / HOTEL SEXTORTION:

https://krebsonsecurity.com/2018/11/marriott-data-on-500-million-guests-stolen-in-4-year-breach/

https://www.cnn.com/2018/12/05/us/hilton-worldwide-hotel-hidden-camera-lawsuit/index.html

FACEBOOK LOCATION SEARCH:

https://inteltechniques.com/menu.html

site:facebook.com/places/Things-to-do-in-CITY-STATE/NUMBER

LISTENER QUESTIONS:

Q: I recently discovered I was in a data breach thanks to spycloud.com. Name, address and DOB. Email and password and phone number all leaked. All have been changed in regard to email and passwords, But how do you clean up your address and DOB etc when it is leaked. I won’t be moving house and I’m not getting any younger.

Q: I took your advice and purchased an iPod Touch in order to use communications and Sudo from my home without being on a cellular tower. When I went to set it up, Apple demanded a cell number, and I can’t get past that screen. What should I do?


Free Webinar December 14, 2018:
https://cc.readytalk.com/registration/#/?meeting=xa4ctwkusl6i&campaign=1zw9cf6efkbh

Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 102

A Few Thoughts on the Marriott Breach

Posted on December 3rd, 2018

You have likely heard about the data breach at Marriott that impacted 500 million people. The best full coverage of this can be read at https://krebsonsecurity.com/2018/11/marriott-data-on-500-million-guests-stolen-in-4-year-breach. My inbox was full of questions about this breach, so here are a few thoughts. Note that I will have a detailed summary of the breach and response on this week’s podcast, due out Friday, December 7, 2018.

1) This is not technically a Marriott breach. The breach happened to the Starwood Hotel chain, which Marriott happened to recently purchase. If you stayed at an actual Marriott property, you are not likely affected. If you stayed at a Starwood property over the past four years, such as a Westin, you probably are in this breach.

2) If you are in this breach, the attackers now have your name, mailing address, phone number, email address, passport number, Starwood Preferred Guest account information, date of birth, gender, arrival and departure information, reservation date and communication preferences. This is quite invasive.

3) Marriott is offering free credit monitoring for one year. I do NOT recommend that you enroll in this. Instead, freeze your credit. (Guide at https://inteltechniques.com/data/workbook.pdf).

4) Change your password for your Starwood Preferred Guest Rewards Program immediately. If you used that password anywhere else, change all references immediately.

5) Watch out for breach-related scams. Email phishing attacks will start to use this incident as bait to get you to click or download things you should not.

6) This is not a Marriott problem, this is a global problem. This does not make Hilton any more secure than Marriott. Every hotel business is vulnerable. This is why I am very selective about providing any personal details to a company. I have always used an alias name at hotels over the past ten years, and paid with either a secondary alias card or a Privacy.com card in an alias name. Some have accused me of being paranoid. I am sure that I am in this breach, but under an alias, with a fake address, a burner telephone number, and a unique form of payment that can be easily closed. I have little concern. Will this change any of your behaviors when companies ask for your name, address, cell, etc?

Please listen to my podcast Friday for many more details and strategies.

Filed under Podcast, Privacy, Security | Comments Off on A Few Thoughts on the Marriott Breach

Updated Data Removal Workbook

Posted on December 2nd, 2018

I have applied several updates to the Hiding From The Internet Free Data Removal Workbook (https://inteltechniques.com/data/workbook.pdf). It now contains opt-out instructions for 152 invasive websites and a complete tutorial for all six recommended credit freezes. It also now has dates next to each entry for quick updates. I send a huge thanks to everyone in the Forum that passes along their research.

Filed under Privacy, Security | Comments Off on Updated Data Removal Workbook

The Privacy, Security, & OSINT Show – Episode 101

Posted on November 30th, 2018

EPISODE 101: Basic Disinformation & Covert OSINT Accounts

This week I talk about basic disinformation techniques in order to achieve greater privacy and better ways to create and maintain covert online OSINT accounts.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

Silent Pocket: https://silent-pocket.com/discount/totalprivacy (code: totalprivacy)
Authentic8: https://info.authentic8.com/

INTRO:

None

BASIC DISINFORMATION (PART I):

https://www.whitepages.com/blog/edit-control-your-listing/
https://www.amazingregistry.com/create-registry
https://www.theknot.com/gs/wedding-websites
https://www.bedbathandbeyond.com/store/giftregistry/simpleReg_creation_form.jsp?regType=BRD
https://www.pennysaverusa.com/item/new
https://www.classifiedads.com/post.php
http://www.freeclassifieds.com/
https://carnival.honeymoonwishes.com/
https://wordpress.com/

COVERT ACCOUNT CREATION:

Mint Sim: https://amzn.to/2QnTrcX

LISTENER QUESTIONS:

Q: I stayed in Germany, and stayed in several hotels. All of which asked for my passport. I told them all that I lost my passport and had an appointment with the consulate to get another. I was never challenged, every hotel just requested another ID. I presented my gym ID, and was accepted without additional challenge each time.

Q: Bad password strategy?


Free Webinar December 14, 2018:
https://cc.readytalk.com/registration/#/?meeting=xa4ctwkusl6i&campaign=1zw9cf6efkbh

Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 101

The Privacy, Security, & OSINT Show – Episode 100

Posted on November 23rd, 2018

EPISODE 100: Alex Goldman, Frank Ahearn, & Justin Seitz

This week my guests are Reply All co-host Alex Goldman, best selling privacy author Frank Ahearn, and OSINT guru Justin Seitz.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

Dehashed: https://dehashed.com/
Pay with Privacy: https://privacy.com/inteltechniques
Authentic8: https://info.authentic8.com/

INTRO:

Ron Swanson

ALEX GOLDMAN:

https://www.gimletmedia.com/reply-all/

FRANK AHEARN:

https://frankahearn.com/

JUSTIN SEITZ:

https://twitter.com/jms_dot_py

site:youtube.com inurl:bpctr

https://instagram.fyxe1-1.fna.fbcdn.net/vp/38efa72f63bf0a98b346dc07eaa39699/5CABBB39/t51.2885-15/sh0.08/e35/s640x640/44887062_319535245548059_8604094516137381161_n.jpg

https://scontent-dfw5-1.cdninstagram.com/vp/38efa72f63bf0a98b346dc07eaa39699/5CABBB39/t51.2885-15/sh0.08/e35/s640x640/44887062_319535245548059_8604094516137381161_n.jpg

LISTENER QUESTIONS:

Q: We started using a PO box several months ago and also had our mail forwarded to it. Now we only receive mail in our name at the PO box, which is what we want. We started putting disinformation out there by ordering catalogs, a magazine, baby registry, signed up for cruise information, etc in a fake name to our actual home address. The problem is we have not received one piece of mail (not even junk mail) at our home since we forwarded our real mail to the PO box. I thought this was strange, so I sent a postcard to our home address in the fake name, but it was not delivered either.

Q: What do you have in store for future episodes?

Free Webinar December 14, 2018:
https://cc.readytalk.com/registration/#/?meeting=xa4ctwkusl6i&campaign=1zw9cf6efkbh


Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 100

Free OSINT Webinar on December 14th

Posted on November 16th, 2018

I have always considered jumping into the live webinar game, but never really tried. I always focused my efforts on the pre-recorded online video training. I have decided to attempt a live session. On December 14, 2018, I will be hosting a live OSINT webinar. The event is sponsored by Pipl.com, and they are handling all of the technical logistics to make it happen. Attendees will be able to ask questions as we go, and there will be a large emphasis on breach data within OSINT investigations. Attendance is limited, register early. Here are the details:

https://cc.readytalk.com/registration/#/?meeting=xa4ctwkusl6i&campaign=1zw9cf6efkbh

From that link:

Connecting the dots: Turning online and offline people information into actionable intelligence

Dig deeper into the internet for personal information about any target. Drive your online investigations with new search techniques for intelligence gathering and uncovering the true identity behind any piece of people information.

Join Pipl and Michael Bazzell from @IntelTechniques for this informative and interactive webinar which will include a live demonstration and plenty of time for Q&A. Bring your questions!

Michael Bazzell spent 18 years as a government computer crime investigator. During the majority of that time, he was assigned to the FBI’s Cyber Crimes Task Force where he focused on open-source intelligence, and cyber-crime cases. He has been involved in numerous high-tech criminal investigations including online child solicitation, child abduction, kidnapping, cold-case homicide, terrorist threats, and high-level computer intrusions. He has trained thousands of individuals employed by state and federal agencies, as well as the private sector, in the use of his investigative techniques.

 

Filed under OSINT | Comments Off on Free OSINT Webinar on December 14th

The Complete Privacy & Security Podcast – Episode 099

Posted on November 16th, 2018

EPISODE 099: Some Show Housekeeping

This week, I clean up after the last two shows, answering numerous questions and providing clarification on the topics. An important new Offense/Defense discusses testing our OSINT on ourselves before a target, and two questions about anonymous vehicle registration as a response to increased license plate readers.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

None

INTRO:

Upcoming Free OSINT Webinar:
https://cc.readytalk.com/registration/#/?meeting=xa4ctwkusl6i&campaign=1zw9cf6efkbh

ReplyAll Episode:
https://www.gimletmedia.com/reply-all/130-lizard#episode-player

HOUSEKEEPING:

Questions from the ReplyAll Episode

Questions from Episode 098

Amazon Echo Ruling:
https://arstechnica.com/tech-policy/2018/11/amazon-must-give-up-echo-recordings-in-double-murder-case-judge-rules/

OFFENSE & DEFENSE:

O: Email Tools: https://inteltechniques.com/menu.html
D: Email Tools: https://inteltechniques.com/menu.html

LISTENER QUESTIONS:

Vehicle Tracking:
https://www.wired.com/story/drive-los-angeles-police-track-every-move/

Q: I was wondering how you handled privacy with car rentals, since they will have your real name (from your driver’s license). Other than having an opayq email and privacy.com card, is there much else you can do?

Q: how does car insurance change once you title as an LLC or trust? I assume I need business insurance if I get it in an LLC.


Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Complete Privacy & Security Podcast – Episode 099

The Complete Privacy & Security Podcast – Episode 098

Posted on November 9th, 2018

EPISODE 098: Sextortion, Data Breaches, and Anonymous Browsing

This week I discuss creepy new sextortion attacks, interview SpyCloud about data breaches, and review Authentic8’s investigation browser.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher


SHOW NOTES:

SPONSORS:

Authentic8: https://info.authentic8.com/
Privacy.com: https://privacy.com/inteltechniques

INTRO:

Store Tracking
Sextortion Scams

DATA BREACHES WITH SPYCLOUD:

Jason Lancaster, Head of Investigations, Spycloud

OFFENSE & DEFENSE:

O: Authentic8: https://info.authentic8.com/

D: Authentic8 Demo: https://a8silo.com/launch.html#

LISTENER QUESTIONS:

Q: Is there a difference between cable vs dhl vs satellite internet in regards to privacy or security?

Q: What specific vulnerability did you attack with the remote screen capture of the scammer’s computer call last week?


Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under Podcast, Privacy, Security | Comments Off on The Complete Privacy & Security Podcast – Episode 098

Search

Recent Posts