SlideShare a Scribd company logo
How to Use Open Source Intelligence
in Investigations
Sandra Stibbards, Camelot Investigations
Sandra Stibbards
Sandra Stibbards, is the owner and President of Camelot Investigations, a licensed private
investigation agency in California and Texas, since its inception in 1996. Ms. Stibbards is
regarded as a leading online investigations expert whose clients include Fortune 500
companies and international corporations over five continents. She specializes in Financial
Fraud Investigations, Internet Threat Investigations, Cybercrime, Competitive Intelligence,
Counterintelligence, Vulnerability and Threat Assessments, International IP/Counterfeiting
Investigations, and Pre-Investment & Due Diligence Investigations. Ms. Stibbards has been
responsible for assisting her clients in locating millions of dollars worth of assets from
financial fraud and international counterfeiting as well as identification of those utilizing the
internet, websites and other means to remain anonymous for high profile scams and threats.
She has become recognized for her presentations and trainings on Open Source
Intelligence providing expanded insight into the methods of obtaining and locating
information in public forums. These trainings are in demand by both the private and public
sectors including financial institutions, aerospace industry, pharmaceutical industry, all levels
of law enforcement, federal agencies, internal audit and regulators.
Sandra Stibbards, Camelot
Investigations © 2016
Always be sure to……
THINK
OUTSIDE
THE BOX
Sandra Stibbards, Camelot
Investigations © 2016
Security
and
Privacy
Sandra Stibbards, Camelot
Investigations © 2016
Sandra Stibbards, Camelot
Investigations © 2016
Secure/Encryted Email
Secure Browsers
Sandra Stibbards, Camelot
Investigations © 2016
VPN/proxy Servers
purevpn is One of Many
Sandra Stibbards, Camelot
Investigations © 2016
Other Ways to Secure Your Privacy
Sandra Stibbards, Camelot
Investigations © 2016
Malwarebytes
Sandra Stibbards, Camelot
Investigations © 2016
CCLEANER
Sandra Stibbards, Camelot
Investigations © 2016
Google.com/Trends
Sandra Stibbards, Camelot
Investigations © 2016
Google.com/Alerts
Sandra Stibbards, Camelot
Investigations © 2016
Exploit-DB.com/Google-
Hacking-Database/
Sandra Stibbards, Camelot
Investigations © 2016
Google Earth Pro – Free Mobile
Version Also
Sandra Stibbards, Camelot
Investigations © 2016
International
People
Searches
10/17/2016
SPOKEO.COM
Sandra Stibbards, Camelot
Investigations © 2016
INFOBEL.COM/EN/WORLD
Sandra Stibbards, Camelot
Investigations © 2016
HAVEIBEENPWNED.COM
Sandra Stibbards, Camelot
Investigations © 2016
International
Public Records
10/17/2016
WIPO.INT/pct/en
Sandra Stibbards, Camelot
Investigations © 2016
FAMILYSEARCH.ORG
Sandra Stibbards, Camelot
Investigations © 2016
International
Social Networks
& Media
10/17/2016
LINKEDIN.COM
Sandra Stibbards, Camelot
Investigations © 2016
Privacy Settings Come First
Sandra Stibbards, Camelot
Investigations © 2016
Open Search System
Sandra Stibbards, Camelot
Investigations © 2016
TWITTER.COM
Sandra Stibbards, Camelot
Investigations © 2016
APP.TEACHINGPRIVACY.COM
Sandra Stibbards, Camelot
Investigations © 2016
TALKWALKER.COM/ALERTS
Sandra Stibbards, Camelot
Investigations © 2016
FACEBOOK.COM
Sandra Stibbards, Camelot
Investigations © 2016
https://developers.facebook.com/docs/plugins/embedded-posts
Sandra Stibbards, Camelot
Investigations © 2016
Picture Mate Plug In
Sandra Stibbards, Camelot
Investigations © 2016
Others to Remember
VK.COM
WEIBO.COM
INSTAGRAM.COM
PANORAMIO.COM
FOURSQUARE.COM
YOUTUBE.COM
Sandra Stibbards, Camelot
Investigations © 2016
TinEye.com
Sandra Stibbards, Camelot
Investigations © 2016
Domains
&
Websites
10/17/2016
DOMAINTOOLS.COM
Sandra Stibbards, Camelot
Investigations © 2016
ARCHIVE.ORG/WEB/
Sandra Stibbards, Camelot
Investigations © 2016
StatsCrop.com
Sandra Stibbards, Camelot
Investigations © 2016
WhoIsMind.com
Sandra Stibbards, Camelot
Investigations © 2016
EmailSherlock.com
Sandra Stibbards, Camelot
Investigations © 2016
AddressSearch.com
Sandra Stibbards, Camelot
Investigations © 2016
READNOTIFY.COM
Sandra Stibbards, Camelot
Investigations © 2016
International
Business
Information
10/17/2016
GLASSDOOR.COM
Sandra Stibbards, Camelot
Investigations © 2016
SEC.gov/edgar.shmtl
Sandra Stibbards, Camelot
Investigations © 2016
FreeERISA.com
Sandra Stibbards, Camelot
Investigations © 2016
Pay Databases
10/17/2016
PACER.GOV
Sandra Stibbards, Camelot
Investigations © 2016
TLO.COM
Sandra Stibbards, Camelot
Investigations © 2016
Thank-you for participating
If you have any questions, please feel free
to email them to:
Sandra Stibbards, Owner / President of Camelot Investigations
sandra@camelotinvestigations.com
Questions about i-Sight:
info@i-sight.com
10/17/2016

More Related Content

PPTX
Osint {open source intelligence }
PPTX
OSINT: Open Source Intelligence gathering
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
OpenSourceIntelligence-OSINT.pptx
PPTX
osint - open source Intelligence
PDF
Open Source Intelligence (OSINT)
PPTX
Osint skills
PDF
Cyber Threat Intelligence
Osint {open source intelligence }
OSINT: Open Source Intelligence gathering
Cyber threat intelligence: maturity and metrics
OpenSourceIntelligence-OSINT.pptx
osint - open source Intelligence
Open Source Intelligence (OSINT)
Osint skills
Cyber Threat Intelligence

What's hot (20)

PPTX
Tools for Open Source Intelligence (OSINT)
PDF
Osint presentation nov 2019
PPTX
Cyber Threat Hunting Workshop
PDF
Open source intelligence information gathering (OSINT)
PDF
Threat Intelligence Workshop
PPTX
Cyber Threat Intelligence | Information to Insight
PDF
PDF
OSINT with Practical: Real Life Examples
PDF
OSINT- Leveraging data into intelligence
PPTX
Cyber Threat Intelligence
PPTX
Bsides Knoxville - OSINT
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PDF
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
PDF
Offensive OSINT
PDF
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
PPTX
Threat Hunting with Splunk Hands-on
PDF
Threat Hunting Report
PPTX
ATT&CKing with Threat Intelligence
PDF
Threat Hunting Procedures and Measurement Matrice
Tools for Open Source Intelligence (OSINT)
Osint presentation nov 2019
Cyber Threat Hunting Workshop
Open source intelligence information gathering (OSINT)
Threat Intelligence Workshop
Cyber Threat Intelligence | Information to Insight
OSINT with Practical: Real Life Examples
OSINT- Leveraging data into intelligence
Cyber Threat Intelligence
Bsides Knoxville - OSINT
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
Offensive OSINT
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
Threat Hunting with Splunk Hands-on
Threat Hunting Report
ATT&CKing with Threat Intelligence
Threat Hunting Procedures and Measurement Matrice
Ad

Viewers also liked (20)

PDF
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
PDF
OSINT for Attack and Defense
PPTX
Blackmagic Open Source Intelligence OSINT
PDF
What you need to know about OSINT
PPTX
OSINT using Twitter & Python
PDF
Osint overview 26 mar 2015
KEY
Tactical Information Gathering
KEY
Enterprise Open Source Intelligence Gathering
PPT
Investigating online conducting pre-interview research
PPTX
Technology Explosion and Future of Investigations
PDF
OSINT 2.0 - Past, present and future
PPT
Investigation Report Writing: A Nuts and Bolts Approach
PPT
2006 multinational intelligence (centcom ccc)
PPT
Open source intelligence
PPT
Writing Effective Investigation Reports
PPTX
Social Media Forensics for Investigators
PPTX
Open source intelligence analysis
PDF
OSINT su siti web
PPTX
Readi Response Service Offering
PPT
Conducting Anonymous Online Investigations - Webinar
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT for Attack and Defense
Blackmagic Open Source Intelligence OSINT
What you need to know about OSINT
OSINT using Twitter & Python
Osint overview 26 mar 2015
Tactical Information Gathering
Enterprise Open Source Intelligence Gathering
Investigating online conducting pre-interview research
Technology Explosion and Future of Investigations
OSINT 2.0 - Past, present and future
Investigation Report Writing: A Nuts and Bolts Approach
2006 multinational intelligence (centcom ccc)
Open source intelligence
Writing Effective Investigation Reports
Social Media Forensics for Investigators
Open source intelligence analysis
OSINT su siti web
Readi Response Service Offering
Conducting Anonymous Online Investigations - Webinar
Ad

More from Case IQ (20)

PPTX
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
PPTX
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
PPTX
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
PPTX
Protecting the Mental Wellbeing of Corporate Investigators
PPTX
Meric Bloc_Webinar Nov22.pptx
PPTX
5 Steps to Creating an Ethical Work Culture
PPTX
How to Assess, Level Up, and Leverage Your Culture of Compliance
PPTX
Everything You Need to Get E&C Investigations Right (According to the DOJ)
PPTX
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
PPTX
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
PPTX
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
PPTX
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
PPTX
What is Psychological Safety in the Workplace?
PPTX
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
PPTX
Building Effective Sexual Harassment Prevention Policies and Training
PPTX
How to recognize and minimize unconscious bias in the workplace
PPTX
Search Engine Skills for Workplace Investigators
PPTX
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
PPTX
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
PPTX
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Protecting the Mental Wellbeing of Corporate Investigators
Meric Bloc_Webinar Nov22.pptx
5 Steps to Creating an Ethical Work Culture
How to Assess, Level Up, and Leverage Your Culture of Compliance
Everything You Need to Get E&C Investigations Right (According to the DOJ)
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
What is Psychological Safety in the Workplace?
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Building Effective Sexual Harassment Prevention Policies and Training
How to recognize and minimize unconscious bias in the workplace
Search Engine Skills for Workplace Investigators
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)
Encapsulation_ Review paper, used for researhc scholars
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

How to Use Open Source Intelligence (OSINT) in Investigations