Entries by AR INTELL

Accident Reconstruction

[ Forensic Accident Investigation ] [ Types of Accidents ] [ Related Sudden illnesses ] [ Accident Investigation ] [ Accident Reconstruction ] [ Accident Scene ] What is a forensic accident investigation or accident reconstruction? In traffic, we call this also a vehicular accident investigation (traffic collision) and reconstruction (car accidents). Of course, there […]

Insurance Fraud Investigations

[ Illegitimate Insurance Claims ] [ Insurance Fraud ] [ Types of Insurance Claims ] [ Insurance Claim Investigation ] [ Evidence Gathering ] [ Red Flags ] [ Insurance Fraud Report ] Illegitimate insurance claims Illegitimate insurance claims cost billions yearly. Some still think that insurance fraud is a victimless crime. It is clear […]

Criminal Background Check

[ Reasons ] [ Elements ] [ Types ] Reasons for a Criminal Background Check In many cases, a criminal background check is needed. In companies, we use this method to verify if a potential employee is reliable, and honest. How do you know if somebody might become a threat to others or even your […]

Dark Web – Deep Web Investigation

[ Dark Web ] [ Surface Web ] [ Deep Web ] [ Illegal & Criminal activities ] [ Importance ] [ Investigation ] What is the Dark Web? The dark web is simply a part of the  World Wide Web. The dark web uses networks called darknets. You need different software and setups to access the […]

Insider Threat Investigations

[ Reality of Insider Threat ] [ Types ] [ Threat Actors ] [ Dangers ] [ Red Flags ] [ Counter Measures ] The Insider Threat is real The “insider threat” will sneak around in your offices like a snake, poke around in your network, look for confidential information, and check what is on […]

SOCMINT – Social Media Intelligence Gathering

[ What is SOCMINT? ] [ Social Media Monitoring ] [ Information Extraction ] [ Social Media Investigation ][ Psychological Analysis ] [ ProcessReport ] What is SOCMINT? Social Media Intelligence (SOCMINT) consists of a set of search methods and technologies. These forensic techniques aim to monitor social media networking platforms and users. Many people […]

Cyber Espionage Investigations

[ Cyber Espionage ] [ Cyber Espionage Targets ] [ Espionage Methodology ] [ Spy-Operators ] [ Red Flags for Espionage ] [ Cyber Espionage Indicators ] [ Cyber Espionage Counter Measures ] [ Risks of Cyber Espionage ] [ Cyber Espionage Asssesment ] What is Cyber Espionage? Cyber Espionage is one of the biggest […]

Cyber Defense

[ What is Cyber Defense ] [ Cyber Defense Assessment ] [ Effects of Cyber Attacks ] [ Recommendations ] What is Cyber Defense? Cyber Defense refers to the ability to prevent cyber attacks. This activity is sometimes related to Cyber Warfare, Cyber Espionage, National Security issues, Critical Infrastructure Attacks, Cyber Offence/Offense Operations (hacking back), […]

Cyber Warfare

Cyber Attacks The amount of ongoing cyber attacks (many types) could be compared to a relentless assault with millions of arrows on a given target. Just take a look at the different live Cyber War maps and Cyber Attack or Cyber Threat maps. Cyber Threat Maps Live Cyber Threat Map | Check Point – FireEye […]