The Privacy, Security, & OSINT Show – Episode 113

Posted on March 1st, 2019

EPISODE 113: The Creepy Things Apple Knows About You (and Me)

This week I discuss the documents received from Apple in reference to my Alias Apple ID accounts. I was surprised to learn the details they keep about me, and learned where my alias use failed to disguise my true identity.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

THE CREEPY THINGS APPLE KNOWS ABOUT YOU (AND ME):

https://privacy.apple.com/
https://privacy.apple.com/account

OUTRO:

Micah Sky
https://www.gigsalad.com/Micah_Sky_huntington


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf


Filed under Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 113

The Privacy, Security, & OSINT Show – Episode 112

Posted on February 22nd, 2019

EPISODE 112: Privacy Lessons from the Road

This week I discuss some lessons learned when attempting anonymous travel, the most recent privacy related news, Facebook’s search changes, and a site that generates photos of people who do not exist.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

PRIVACY LESSONS FROM THE ROAD:


PRIVACY NEWS:

https://arstechnica.com/information-technology/2019/02/catastrophic-hack-on-email-provider-destroys-almost-two-decades-of-data/

https://www.businessinsider.com/nest-microphone-was-never-supposed-to-be-a-secret-2019-2?utm_source=reddit.com

https://www.techradar.com/news/major-security-issues-found-in-popular-password-managers

OSINT:

https://inteltechniques.com/menu.html
https://thispersondoesnotexist.com/


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 112

The Privacy, Security, & OSINT Show – Episode 111

Posted on February 8th, 2019

EPISODE 111: Back to Basics: Phones & MySudo

This week I revisit the need for an anonymous telephone and explain my latest use cases for MySudo. Later in the show, Paul Ashley, CTO at Anonyome Labs, joins me to give us the latest MySudo updates.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

BACK TO BASICS: PHONES & MYSUDO:

Mint Mobile Starter Kit:
https://amzn.to/2MRbGTI

MySudo
https://mysudo.com/

Paul Ashley, CTO Anonymome Labs
https://twitter.com/Sudo_Dr


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 111

New Email Search Tool for Offense & Defense

Posted on February 4th, 2019

I have always maintained an Email Search Tool as part of my set of online investigation tools at https://inteltechniques.com/menu.html. This month, a series of reports about a huge new set of data breaches emerged and created unnecessary panic. While there truly was a new public database released containing hundreds of millions of email addresses and passwords, the vast majority was old data which had surfaced several years prior. Regardless, it was a good reminder that we should be diligent about checking our own email accounts against the various online repositories that possess most of the public leaks/breaches/data dumps being abused by amateur criminals. Investigators should also take advantage of this information as part of every email investigation. Recently, I made several changes to the Email Search Tool as seen below.

In this example, I entered a test email address and chose the “Populate All” option. The following details explain the first six options, which are the most lucrative.

Breaches/Leaks: This tool queries the HIBP API and presents the results in the window to the right. In this example, you can see that the test email is present within numerous data breaches. The OFFENSE of this is to identify the various online accounts in use by your target. The DEFENSE is to identify your own accounts with exposed passwords and change them anywhere they have been used.

Pastes: This queries the HIBP Pastebin API and identifies email addresses that have appeared on pastebin.com, which is often used to store user credentials.

PSBDMP: This queries the PSBDMP collection of pastebin scrapes, which identifies email addresses that have appeared on pastebin.com, even if they have been removed or were never indexed by Google. The results display in the window to the right, and I have added the complete URL of each entry for further investigation. (Thanks to Justin Seitz for fixing my pathetic PHP attempt on this). This has been a huge help with my investigations. A sample entry with the dates of original capture is below.

Verifier: This opens a new tab and queries the address through the Trumail API. This identifies whether the email address is valid, has a full inbox, is a catch-all, is from a disposable email provider, and other interesting details.

Dehashed: This opens a new tab and queries the free version of dehashed.com, which displays any additional breaches that may not have been captured by the previous attempts. Paid memberships can see the password details.

IntelX: This premium option (with a free trial) also identifies pastebin posts that reference the email address. The free version will tell you that the data exists, the premium (or free trial) will display the content.

I encourage everyone to check their own email addresses on occasion. If you appear within any of these data sets, you know that an account has likely been compromised to some extent. Be sure to change those passwords to something secure, unique, and preferably randomly generated by a password manager (I use KeepassXC).

Filed under OSINT, Search | Comments Off on New Email Search Tool for Offense & Defense

The Privacy, Security, & OSINT Show – Episode 110

Posted on February 1st, 2019

EPISODE 110: Testing Your Online Security

This week I discuss easy ways to test your VPN, DNS, Browsers, extensions, and custom settings. I also revisit canary tokens as a test of your potential exposure.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

Privacy.com: https://privacy.com/inteltechniques

PRIVACY: TESTING YOUR ONLINE SECURITY:

https://panopticlick.eff.org/
https://www.deviceinfo.me/
https://browseraudit.com
https://browserleaks.com/
https://detectmybrowser.com/
https://ipleak.net
https://www.dnsleaktest.com/
https://www.emailprivacytester.com

OSINT:  TESTING DEFENSE TO CANARY TOKENS:

http://canarytokens.org/generate


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 110

Buscador 2.0 OSINT Virtual Machine Released!

Posted on January 25th, 2019

Buscador is a free Linux Virtual Machine that is pre-configured for online investigators. It was developed by David Westcott and myself, and distributions are maintained at https://inteltechniques.com/buscador/index.html. We also released a podcast today about this new release, which can be found at https://soundcloud.com/user-98066669/109-privacy-news-buscador-20-release. Download links and install instructions can be found at https://inteltechniques.com/buscador/index.html. The current build is under 5GB and includes the following resources:

Custom Firefox Browser & Add-Ons
Custom Chrome Browser & Extensions
Tor Browser
Custom Video Manipulation Utilities
Custom Video Download Utility
Amass
BleachBit
EmailHarvester
ExifTool
EyeWitness
Ghiro
GIMP
Google Earth Pro
HTTrack Cloner
InstaLooter
KeePassXC
Kleopatra
Knock Pages
LibreOffice
LinkedInt
Maltego
Metagoofil
MediaInfo
Metadata Anylisation Toolkit
PhoneInfoga
Photon
ReconDog
Recon-NG
SkipTracer
SocialMapper
Spiderfoot
StegoSuite
SubBrute
Sublist3r
theHarvester
Tinfoleak
Twint
Twitter Exporter
VeraCrypt
VLC
Yubico Utilities

Filed under OSINT, Security | Comments Off on Buscador 2.0 OSINT Virtual Machine Released!

The Privacy, Security, & OSINT Show – Episode 109

Posted on January 25th, 2019

EPISODE 109: Privacy News & Buscador 2.0 Release

This week I talk about the latest privacy news and David Westcott joins me to announce the official release of the free Buscador OSINT Virtual Machine.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

Silent Pocket: https://silent-pocket.com/discount/totalprivacy
Authentic8: https://info.authentic8.com/

PRIVACY/SECURITY:

Latest Breach Discussion:
https://krebsonsecurity.com/2019/01/773m-password-megabreach-is-years-old/

Chrome Proposes to Eliminate Script Blockers:
https://www.theregister.co.uk/2019/01/22/google_chrome_browser_ad_content_block_change/

Archive.org Ignoring Robots.txt:

User-agent:ia_archiver
Disallow: /
User-agent: archive.org_bot
Disallow: /

MyLife Removal Update:
https://www.bbb.org/consumer-complaints/file-a-complaint/get-started

“Dumb” Blu Ray Players:
Magnavox 4K blu day player

A.I. is Now Watching Us:
https://www.cbsnews.com/news/60-minutes-ai-facial-and-emotional-recognition-how-one-man-is-advancing-artificial-intelligence/

China Crowdsourcing Debt Shaming:
https://www.dailymail.co.uk/news/article-6620879/China-launches-app-tells-500-yards-debt.html?ito=social-facebook

OSINT:  Buscador 2.0 Release:

David Westcott:
https://twitter.com/ninjininji

Buscador 2.0:
https://inteltechniques.com/buscador/index.html

LISTENER QUESTIONS:

Q: When I was in grade school, my parents signed a release allowing the school to publish my full name, school assignments/awards, and picture on their website. Since then, the websites been archived and cannot be removed. Besides that, the school says they wouldn’t remove it anyway since they have a valid release signed. Now, when I search my true name, pictures of me and the school I went to and my hometown and old friends and such are all readily available. Is this something I should be concerned about? Is there anything that can be done to remove it or bury it under disinformation or something?

Q: I’ve been using Lastpass for a few years and have recently started looking into non-cloud options like KeePassXC. I just came across a few services, like LessPass, MasterPassword, and getVau.lt, which take contextual data like the site and your login ID along with a master password to calculate passwords for services. Because of this there is no need to store passwords and you can even generate a password directly from the websites by entering the site, login, and your master password. What are your thoughts on something like this?


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 109

The Privacy, Security, & OSINT Show – Episode 108

Posted on January 18th, 2019

EPISODE 108: Our TV’s, Doorbells, & Private Messengers Are Spying On Us

This week I discuss the latest smart-home threats and Justin Seitz joins me to talk about how you may be exposing your IP address on instant messengers.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

Privacy.com: https://privacy.com/inteltechniques
Authentic8: https://info.authentic8.com/

INTRO:

Smart TV Woes:
https://www.businessinsider.com/smart-tv-data-collection-advertising-2019-1?utm_source=reddit.com
https://www.techdirt.com/articles/20190114/08084341384/vizio-admits-modern-tv-sets-are-cheaper-because-theyre-spying-you.shtml

Ring Doorbell Issues:
https://boingboing.net/2019/01/10/surveillance-a-go-go.html

Home Assistance Devices Privacy:
https://www.theverge.com/circuitbreaker/2019/1/15/18182214/amazon-echo-google-home-privacy-protection-project-white-noise

GoDaddy Injecting Data Into Websites:
https://www.igorkromin.net/index.php/2019/01/13/godaddy-is-sneakily-injecting-javascript-into-your-website-and-how-to-stop-it/

OSINT:  How To Blow Your Online Cover With URL Previews:

Justin Seitz:
https://twitter.com/jms_dot_py

How To Blow Your Online Cover With URL Previews:
https://hunch.ly/osint-articles/osint-article-how-to-blow-your-online-cover<

LISTENER QUESTIONS:

Q: What are the risks of using a dedicated Sudo number for 2FA?
Q: I have a security clearance, and I’m about to have my 10 year re-investigation and am wondering how not having had a physical address other then a Texas PMB service the last 5 years might give me trouble.


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 108

The Privacy, Security, & OSINT Show – Episode 107

Posted on January 11th, 2019

EPISODE 107: Listener Questions

This week I attempt to answer the most common questions sent from listeners over the past month.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

Silent Pocket: https://silent-pocket.com/discount/totalprivacy
Authentic8: https://info.authentic8.com/

INTRO:

Cell Phone Data For Sale:
https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-microbilt-zumigo-tmobile

New Training Videos:
https://inteltechniques.com/25

Buscador 2.0 BETA:
https://inteltechniques.com/buscador/index.html

PRIVACY LISTENER QUESTIONS:

Trusts:
Should I use a land trust or living rust?
Do you have a template?
Should I buy the land trust training or the book?
How do I find an attorney for this?

NOLO Trust Book:

2017 version: https://amzn.to/2T4VJLV
2019 version: https://amzn.to/2ASCmPs

I am seeing more stores require a fingerprint in order to use a credit card. What do you do in these situations?

I bought my car in cash, Title is in my name. If I transfer title into a trust, as you mentioned on the show, the VIN historical record will still lead to me. Should I just wait until I get a different car?

What do you provide for your address on your credit report? Are you specially updating it to your alternate physical address?

I have found that all financial institutions require that you have a physical address and cannot use a PO Box for the address. I have a PO Box that I signed up for with USPS however as part of their requirements, I cannot use the physical street address for financial purposes. So my question is, how can I prevent my physical address from being used by these financial institutions.

I recently purchased a new car from a local dealer, financing it through the manufacturer. Using the car’s GPS technology, does either the dealer or the finance company or the corporate manufacturer have the ability to track the location of my vehicle?

I searched my name on various people search sites. Some had it, some didn’t. As these are the top 10, should we opt out of these with information we assume they have?
Should we opt-out with information we know they have? Can we assume the top 10 definitely have our information?

For those of us whose jobs require us to have a photo on a website, and where that photo has been used previously in press releases, etc, what are the best strategies for (a) choosing a new photo that has the least chance of being used in image recognition or for other unhelpful purposes; (b) asking news sites etc to remove your picture in prior stories, etc; and (c) getting the photos off Google Images?

What do you do with deleted/deactivated account information? Keep it in your password manager? Dump them onto some like an archive spreadsheet. I’ve got alot of accounts in my password manager and get overwhelmed trying to figure out what to clean out.

Airplane mode disables the cellular modem preventing cell tower triangulation. The GPS modem is still receiving location data. Do iPhones log GPS data and send it back when airplane mode is turned off?

OSINT LISTENER QUESTIONS:

What happened to the FB live map? Any alternative options?

I conduct a lot of online investigations and rely on Google, but I worry about how much privacy I lose. Any suggestions?

I use KeepasXC to store all of my covert account logins for my OSINT work. Having two databases is a pain when I need to access my own data. Any harm in combining all of this into one database as long as it never gets stored online?

I use several social network accounts as part of my covert online investigations. I use Google Voice numbers in order to receive 2FA sms messages to log into the accounts. Two questions: a) Is having the Google Voice app on an iPhone reckless? b) If so, what is the best option to get the messages?

How do I get started in a career in OSINT?


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 107

Historic Telephone Searching

Posted on January 4th, 2019

We all know there are countless “White Pages” style of telephone number lookup sites that work well for landline numbers. This has had great value over the years, but many people are ditching the landline and only using cell phones in the home. I have always possessed numerous residential telephone book CD-ROMs in case I ever need to go back in time to find an old number or address. These discs are a burden and require a Windows 98 virtual machine. I needed a better option. I recently found three various online resources that possess historic telephone number data associated with landlines dating back to 1994. These three sources happen to allow a URL query with a pure text return, so I put together an automated tool which should help with searching. It is located on the Telephone Tools section of the IntelTechniques Search Tool at https://inteltechniques.com/menu.html. Below is an actual example.

Loren Copp, a former pastor and owner of a pizza parlor, was recently found guilty of several child sex crimes near St. Louis. A search on TruePeopleSearch.com revealed a telephone number of 3144570842. I searched this number through the tool and found the following.

THIS example indicates:

Another person owned the number from approximately 1994 to 1997
Another person owned the number from approximately2002 to 2003
The number was likely unused from 1998 to 2001 and 2007-2013
The number was assigned to our target in 2014
The number was still assigned to our target in 2018

In ANOTHER (unpublished) example, this tool informed me of the following.

My target possessed the number from 1996-2018 (present in tool)
My target changed addresses near 2001 (address changed in listing)
My target was married near 2003 (Spouse added to listing)
My target was divorced near 2014 (name change and spouse removed)
My target moved near 2018 (address changed in listing)

While landline numbers may not be as valuable today as they were in the past, we have a great resource of historical details to take advantage of. There are many small nuggets of valuable information hiding within these old phone-books. Instant availability thanks to the internet make it easy to search, and inexcusable to avoid. Special thanks to Justin Seitz (hunch.ly) for fixing my original PHP mistakes on this tool.

Filed under OSINT | Comments Off on Historic Telephone Searching

Search

Recent Posts