You are on page 1of 1

September 28, 2021

Today we were taught about the use of social media and other open-source intelligence
application or software in the conduct of our investigation. In microblogging, there is tweeter. I learned
that Wikipedia is not a reliable reference because the webpage can be edited. In using open-source
intelligence, we have been advised that we have to be: (1) patient and; (2) keep our money. The lecturer
encouraged us to look for free app when we do our open source.

In people search we have been advised to use: (1) https://osintframework.com; and (2)
whopostedwhat.com. We have been taught how to create temporary email to be used whenever we
create an account so as to access the deep web without compromising our identity or leaving a track.
We were also informed that can create a temporary mobile number we can use for verification.

Another interesting tool introduced is https://virustotal.com. This tool can scan malwares and
virus from files or data, hence is a shield from cyber attack or simply an accidental virus infiltrating and
damaging the computer software and hardware.

We were also introduced to the use of toolkit called duckduckgo.com – a website which does
not reveal the IP address and other search traces when we conduct our research. We were taught about
the use of archive.org, advance search options, and google search options; the use of quotation marks in
searches; that we can use google to search within a site. For instance, by typing: Site: www. Facebook.
com “kat Catalan”. By that, we can know what data facebook have on Kat Catalan. There are also
interesting toolkits such as: Goofram, Wolfram search, Alpha search, and Searchbot.com

As part of our basic search, it is important that we: (1) plan out searc; (2) understand the subject
we are investigating; and (3) get to know the people associated to the subject.

You might also like