In any investigation, identifying threat actors, their pattern of behavior, locations and connections is crucial for getting insight into the who, what, where, how and when during investigations. With threat actors communicating more and more online, they are leaving digital footprints that span multiple digital channels, devices, and data formats.
Read the e-book to learn:
- What are digital footprints
- Malicious use of digital footprints
- Digital footprints forensics
- Using digital footprints in web investigations
- AI – an essential discovery tool
- De-anonymizing profiles with WEBINT
- Reconstructing web profiles
Share This e-book:
Request this E-book
"*" indicates required fields