Centro de Documentação da PJ
Monografia

3536223.C.8
BAZZELL, Michael
Open source intelligence techniques : resources for searching and analyzing online information / Michael Bazzell.- 4th ed.- [Greenville, SC] : IntelTechniques.com / CCI Publishing, 2015.- 418 p. ; 24 cm
ISBN 978-1-5086-3633-5


ANÁLISE DA INFORMAÇÃO, FONTE DE INFORMAÇÃO, INFORMAÇÃO COMPUTORIZADA, REDE INFORMÁTICA, REDE DE TRANSMISSÃO DE DADOS

About the author. Introduction. CHAPTER 1: Search engines: Google and Bing. Google operators. Google search tools. Google alerts. Google images. Bing images. Google cache. Bing cache. Website archives. language translation. Newsgroups. News archives. Blog search. Keyword tool. Custom search engines. CHAPTER 2: Search engines: other alternatives. Topic engines. International engines. Yandex. Meta search engines. FTP search engines. CHAPTER 3: Social networks. Facebook. Facebook profile search. Facebook profile details. Facebook common results. Facebook custom search tool. Facebook private friends. Twitter. Twitter person search. Twitter location search. Twitter deleted search. Custom twitter tools. Twitter location results. Twitter photos. Twitter applications. Twitter analytics. MySpace. Google+. LinkedIn. CHAPTER 4: Online maps. Google maps. Bing maps. Custom maps tool. Mapping utilities. Street view hyperlapse. CHAPTER 5: People search engines. Searching by name. Searching by email. Searching by user name. Searching by education. CHAPTER 6: Social network traffic. Custom search engines. Social network content. Bookmarking services. CHAPTER 7: Online communities. Classified ad searching. Classified ad archives. Online auctions. Dating sites. Forums & message boards. Ethnicity specific. Online prostitution. Reddit. Compromised accounts. Emergency communications. CHAPTER 8: Documents. Google searching. Document search engines. Leaked documents. Paste sites. CHAPTER 9: Photographs. Twitter images. Instagram. Exif data. Reverse image searching. Image manipulation. CHAPTER 10: Videos. YouTube. Google videos. Bing videos. Video captions. Vine. CHAPTER 11: Addresses & telephone numbers. Caller ID databases. Reverse telephone search. Cellular provider information. Text number searching. Addresses. Real Estate. CHAPTER 12: IP addresses and domains. IP addresses. Websites. Additional website identification. Whois information. Website manipulation notification. WordPress vulnerabilities. Hidden subdomains. Backlinks. Robots.txt. Wireless access points. Online device search. Obtaining IP addresses. CHAPTER 13: Government records. Court records. SSN verification. Birth date identification. Criminal information. CHAPTER 14: Application Programming Interfaces (API). Pipl API. Fliptop API. Full contact API. Facebook API. Instagram API. Reverse Caller ID. TowerData API. CHAPTER 15: Software applications. Firefox. Firefox extensions. Chrome extensions. IP address masking. Tweet Deck. Instagram download. Creepy. YouTube download. Video manipulation. Video metadata. Exif tool. SmartDeblur. Google Earth. FOCA. HTTrack. SEO Spider. Domain Hosting View. IP Net Info. CHAPTER 16: Android emulation. Genymotion. Android apps. Google android emulator. Manymo. CHAPTER 17: Radio frequency Monitoring. Hardware. Software. Family radios. Citizens band. Marine channels. Room monitors. Wireless microphones. Hotels. Online frequency database. Retail business. News media. Nearby frequencies. CHAPTER 18: OSINT workflow process. Email addresses. User names. Real names. Telephone numbers. Domain names. Location. Conclusion.