How To De-Anonymize Threat Actors Quickly And Efficiently

In any investigation, identifying threat actors, their pattern of behavior, locations and connections is crucial for getting insight into the who, what, where, how and when during investigations. With threat actors communicating more and more online, they are leaving digital footprints that span multiple digital channels, devices, and data formats.

Download the e-book to learn:

  • What are digital footprints
    • Types of digital footprints
    • Utilization of Digital Footprints
    • Different Devices Make Different Digital Footprints
  • Malicious Use of Digital Footprints
    • Abusing the digital footprints of targets
    • Using digital footprints to remain obfuscated
  • Digital Footprints Forensics
    • DIME – Discovering, Inventory, Monitoring, Enforcement
    • Practical security tools
    • Digital footprints for intelligence gathering
    • Compliance
  • Using digital footprints in web investigations
    • Collection
    • Processing
    • Analysis
    • Monitoring
  • AI – An Essential Discovery Tool
    • Using AI for connecting and analyzing the data points
    • Mapping Digital Footprint Activities and Locations
  • De-anonymizing profiles with WEBINT
  • Reconstructing Web Profiles

Request this e-book

Skip to content