Online sources can also be perilous. This guide reveals top mistakes law enforcement online investigators make and offers suggestions on how to avoid them.
Without the ability to control details of your digital fingerprint, investigative targets could uncover your identity and intent — and spoil your investigation or put you at personal risk.
Manufacturer’s SOC uses regional egress nodes to prevent getting blocked while investigating region-specific malware.
A social media company’s trust and safety analyst receives a surprise visit from the FBI after participating in terrorism-related online chats and forums.
A suite of productivity enhancement features for analysts including Collecter and Gofer.
An online payment platform’s brand reputation agents needed secure, anonymous access to websites, social media and local sources to effectively follow up on suspicious activity and threat reports
A major tech company’s trust and safety analysts experienced retaliation from investigation targets due to improper attribution management.
Building on our introductory Managed Attribution webinar, Naked & Exposed Part 2 looks at how managed attribution improves online investigations.
The SOC team of a major U.S. city government conducts complete, detailed investigations, collecting evidence to share with site owners and law enforcement with the help of Silo for Research.