We begin with checking main Social Networks (Facebook.com, VK.com; Instagram.com, Wechat.com, Linkedin.com):
- Conducting name-based searches on Facebook.com utilizing the full name of the Report Subject.
- Investigating the presence of his/her relatives on the platforms and look for “open profiles” in order to collect further information.
- Analyzing all the available pictures including the “likes” and the “comments” received under the pictures of the Report Subject or the already identified close relatives’ profiles.
- Analyzing posts, comments, and the provided personal information, including the “groups”, “places”, and “pages he/she likes” sections.
- Conducting the same extensive search for all the relevant social media platforms.
- Utilizing specifically dedicated software to gather and connect further information (with particular attention to the post the Report Subject liked on the platforms when such information would be available).
We continue with checking main Internet search engines results (Google, Yandex, Baidu):
- Conducting extensive name-based queries.
- Conducting image searches utilizing the Report Subject social media profile pictures.
- Conducting search engines queries utilizing all other relevant identifiers (i.e. phone number, company name, close relatives’ names).
- Conducting the searches by changing the IP address to the relevant geographical area for the specific case.
In addition, we, conduct Reverse WHOIS searches:
- Utilizing the Report Subject’s name and/or email
- Utilizing the Report Subject’s family members names and/or emails
- Conducting WHOIS searches for all the website connected to the Report Subjects and/or his/her relatives
Finally, we produce a report that is sent monthly or after preferred periodically.
- Reporting the content in a clear and exhaustive form, comprehensive of links to content representing a digital risk to the Report Subject and exemplifying screenshots.
- Providing a risk evaluation for each case, taking into consideration the overall results and their interconnection.
- Providing tailored recommendations for resolving or mitigate the identified digital risks.
We also help to remove unwanted content that has been identified through this service on an ad-hoc basis.
Leave A Comment
You must be logged in to post a comment.