Buscador VM

Buscador is a Linux Virtual Machine that is pre-configured for online investigators. It was developed by David Westcott and Michael Bazzell, and distributions are maintained on this page:


Cyber Keynote Links

Below are some of the the links to free resources that I discuss during my Cyber Keynotes. All resources will open inside of a new tab in your browser. If you would like to schedule a presentation, contact us.

LastPass (Secure cloud-based password manager)
KeePassXC (Secure computer-based password manager)
PIA VPN (Encrypts and protects your internet connection, even public wi-fi)
Privacy Checklist (Checklist presented at Cyber events)
Have I Been Pwned? (SEARCH ANY email addresses to discover reported breaches)
Shodan (Discover various online devices such as cameras, thermostats, and printers)
Wigle (Database of wireless access points)
Annual Credit Report (Free credit report to detect fraud)

Microsoft 7 AV:MS Security Essentials
Microsoft 10 AV: MS Defender
MalwareBytes: (Windows)
MalwareBytes: (Mac)
CCleaner: (Windows)
CCleaner: (Mac)

Privacy & Security Gift Guide

A recent forum post started a conversation about Black Friday and Cyber Monday deals on the privacy related goods and services that we use. This launched a series of messages asking for recommendations, and the following post contains my suggested items as gifts for others (or yourself). Please note that while some of these are affiliate links, I use the following products constantly.

VPN: Private Internet Access (PIA): This is by far the most important item on the list. If you are not using a VPN to protect your internet traffic, please consider doing so. If you have people in your life that have contemplated using a VPN, this is a great gift. If you would like to read why I choose PIA as my primary VPN, go here: https://inteltechniques.com/pia.html.

Silent Pocket Faraday Bag: Signal-blocking bags are not all created equal. I have tested many that did not work at all. The Silent Pocket is a premium option that has worked 100% of the time for me. It also has a magnetic enclosure to prevent those embarrassing velcro releases that get attention from anyone nearby.
Yubikey: I always prefer a hardware-based two-factor authentication (2FA) option over a text message or software token. These tiny devices require participating services to verify that the USB device is present before access to the online account can be granted. My email and financial services all require my Yubikey be pressed before I can log into my accounts. You can also use these for GMail, KeePassXC, and many other options. 

Onlykey: If the Yubikey is not enough for you, consider the Onlykey. It replicates the basic functions of the Yubikey, but adds additional memory slots for lengthy passwords and an internal password manager. Onlykey maintains a great FAQ here: https://docs.crp.to/faq.html

Microphone Lock: This $6 gadget (or $20 5-pack) can be fun, quirky, and unique. It also provides a legitimate value to privacy enthusiasts. It enables the external microphone option on a phone or computer, and then blocks it. If you encounter any malicious software that attempts to listen to you through your microphone, this device prohibits the action.
SanDisk UltraFit Flash Drives: You can never have enough USB drives. I prefer these fast and small devices because they are affordable and reliable. Make sure you have backups of your KeePassXC password databases (You did create a password vault, correct?) and any other valuable data, encrypted on USB devices. These also work great for bootable Linux systems as described in my OSINT book.

Free Workbook

This digital document (PDF) contains my entire collection of personal online data removal links from all of my books. It is updated often as sites change. If you are looking for the most recent list of online information removal resources, this is it.


Weekly Podcast

My weekly podcast presents ideas to help you become digitally invisible, stay secure from cyber threats, and make you a better online investigator. Click HERE to listen or subscribe.