Posted on December 28th, 2018
EPISODE 105: Advanced Disinformation & Telephone Archives
This week I wrap up the discussion about disinformation techniques and present a new OSINT tool that pulls historic phone numbers, names, and addresses.
Listen to all episodes at https://inteltechniques.com/podcast.html
or Subscribe at:
OSINT: TELEPHONE ARCHIVES:
Q: Let’s say I have a VeraCrypt container that contains my .kdbx password database file. Now I go in and remove the .kdbx file extension, so Windows just sees this as a generic “file”. If someone somehow cracked into my VeraCrypt container, would they have any way of knowing that file is in fact a KeePass database? Assuming that I don’t name the file “my_keepass_db”, would this be a valid way to disguise my database? Whenever I need to access the file I could just add the extension back temporarily.
Q: To complete a vetting process, the organization I am working with uses PeopleFacts to complete a back ground investigation. I have provided all of my real life information to this web site with exception to my Social Security Number. What is your take on this risk?
Data Removal Workbook:
Please submit your listener questions at https://inteltechniques.com/podcast.html