going beyond google 2 philadelphia loss conference

45
Going Beyond Google 2.0: Using the internet to investigate your Work Comp, Auto and P&C claims … Michael Petrie, WCCC; Founder of “V.I.A.” and “DIGG- iT”; Director of Web Research and Development, Litigation Solutions, LLC By Michael Petrie

Upload: mikep007

Post on 17-May-2015

1.400 views

Category:

Technology


0 download

DESCRIPTION

Some attorneys have argued that scouring social networking sites in search of a reason not to hire someone, or evidence of insurance fraud, is an invasion of privacy. But insurance companies and their attorneys argue that internet searches for public social networking profiles are similar to the informal video surveillance investigations of property-casualty claimants that are common in the industry.

TRANSCRIPT

  • 1. By Michael PetrieGoing Beyond Google 2.0:Using the internet to investigate your WorkComp, Auto and P&C claims Michael Petrie, WCCC; Founder of V.I.A. and DIGG-iT; Director of WebResearch and Development, Litigation Solutions, LLC

2. Social NetworksThe term social network was coined in themid 1950s by sociologist J.A. BarnesFacilitates and promotes interactions betweenpeople with similar interests and/orprofessional interestsDepends on users being able to find and linkto each otherThis is done by creating profiles and postingtext, images, videos and other information 3. Social Network Technologies Social network websites E-Commerce Sites(Craigslist/Ebay) Blogging Microblogging - Twitter Location Based SocialNetworking Sites Photo/Video Sharing 4. Quick history of Social Networks Started in the late 70s and ran through theearly 90s BBS system, AOL, Compuserve Six Degrees - 1997 Friendster 2002 (circle of friends) LinkedIn -2003 Facebook 2004 Twitter - 2006 5. According to EbizMBA the Top 4 SocialNetworking Sites estimated monthly visitorsUnique visitors are determined by the number of unique IP addresses on incomingrequests that a site receives, but this can never be 100% accurate. Depending on configuration issues and type of ISP service, in some cases, one IP address can represent many users;750,000,000 Monthly Visitors250,000,000 Monthly Visitors110,000,000 Monthly Visitors 70,500,000 Monthly Visitors 6. 1.Facebook2.Twitter3.Linkedin4.MySpace5.Google +6.Deviant Art7.LiveJOURNAL8.Tagged9.Orkut10. Caf Mom Top 10 Most PopularSocial Networking Sites(February 2012) 7. 1.Facebook 11. Bebo2.Twitter12. Mylife3.Myspace13. Friendster4.LinkedIn 14. MyHeritage5.Ning 15. Multiply6.Tagged 16. orkut7.Classmates 17. badoo8.hi518. gaia oline9.myYearbook 19. blackPlanet10. Meetup 20. SkyRockMost popular social networks by hits (US) March 2012 8. 1. Photobucket2. SlickPic3. Flickr4. Webshots5. Dotphoto6. Fotfi7. Smug Mug8. Picturetrail9. 23 plus10. KodakEasyshareTop 10 Photo Sharing Web Sites 9. Demographics1.More than 843 million monthly users.2.483 million daily users.3.5,590 users per second!!! 700 billion minutes a month4.The average visit time on Facebook.com is 20 minutes.5.9,660,000,000 minutes used per day!!!6.Facebook.coms audience skews slightly more female tthan the online population as a whole: 43% male: 57%female.7.The average Facebook user has 130 friends and isconnected to 90 pieces of content( pages, events andgroups)8.50% of users log on each day9.There are now about 2.5 billion photo uploads tofacebook each month10. MEDIAN USERS AGE IS 33 YEARS OLD, UP FROM 26 YEARSOLD IN MAY 200811. FASTEST GROWTH IS IN THE 35+ YEARS OLD DEMOGRAPHIC 10. A fully filled-out Facebook profile cancontain over 40 pieces of recognizablepersonal information, including(name, address, date of birth, photos ofsubjects, current and prior employmenthistory, activities and interests, home andcell phone numbers, other emailaddresses, friends and family, other socialnetworking sites, educationhistory, personal likes and dislikes, aswell as other related information. 11. Demographics Twitter has more than 1Billion tweets permonth averaging 40 Million tweets per day.That is an average of 463 tweets per secondEVERYDAY! (5556 Tweets) 43% of Twitters users range in age from 18-34; 27% range in age from 35-44 Nearly 180 million unique visitors each day The sites growth is beyond exponential:1400% increase in Tweets in 2009 Twitter is on pace to process 10 billiontweets this year The library of congress has stored everysingle Tweet since 2006. 12. Demographics 260 million profiles, with more than130 million active monthly users Majority of profiles are public By default, all profiles of membersunder the age of 16 are set to private Median age of MS users is 26 13. Demographics Professional networking site formedon May 5, 2003 Over 65 million members globallyfrom over 150 industries, includingexecutives from almost everyFortune 500 company 42,000 new members join every day LinkedIn members average age is 39-41 14. Top 10 online dating sites 15. Location Based Social Networking sitesDoes your case involve placing a party in ageographical location? Their cell phone may havethe evidence you are looking for! 16. FoursquareLaunched in 2009 with limited availability inonly 100 worldwide metro areas. In January2010, Foursquare changed its location modelto allow check-ins from any locationworldwide. As of March 2010, the service had500,000 users; August 2010, nearly 3 millionusers; March 2011, over 8 million users.Foursquare explained:http://foursquare.com/#demoVideo 17. Foursquare examples 18. Additional location basedsocial networks 19. TextImagesMetadata 20. What you need to get started High speed internet connection Access to every website Good working browser (Firefox, Chrome or IE) Google Alerts Video capture & converter software RSS Reader (i.e., Google Reader) Alternate email addresses Social network profile(s) Browser/Internet virus protection Search engine bookmarks Screen shot /capture software Time 21. What were finding Multiple social Online dating infonetwork groups Financial Roommates, live-ininformation, such aspartners, and friends bankruptcies Marriage recordsCriminal records Birth records Court records (UCC Divorce records filings, suits, judgmen Assets (multiplets, liens)property Sex offenderownership, planes, an recordsimals, watercraft, au Child abuse recordstomobiles Personal references Death records E-commerce sites Address (present and Photosformer) Email addresses Places of work Political affiliations Drug associations Planned vacations Videos 22. Google quick referencehttp://www.googleguide.com/ 23. Comprehensive Search engines Search engines are algorithmic informationretrieval systems that allow searching ofmassive web-based databases. 24. Specific search sites www.archive.org digital library of older sites;AKA the wayback machine www.news.google.com/archivesearch www.thepaperboy.com www.wunderground.com weather history www.whois.com domain identifier www.godaddy.com domain identifier www.scroogle.com - DOA www.hidemyass.com * proxify - Proxify is a web-based anonymous proxyservice which allows ... - proxify.com Online Anonymous Proxy - Online anonymous proxyserver. Online proxy ... - zend2.com * Proxy 4 Free - Proxy 4 Free is a free proxy list andproxy checker http://studentclearinghouse.com http://bit.ly/ - URL shortner www.bump.com CA startup 25. Specific search sites www.criminalsearches.com www.blackbookinfo.com www.publicrecordsources.com www.verifyprolicense.com www.courts.phila.gov/ 26. Craigslist help? Trywww.searchtempest.comAlso try crazedlist.org;allofcraigslist.com 27. Ebay help?Found a seller thats under investigation, nowwhat? 28. Metadata Metadata - http://en.wikipedia.org/wiki/Metadata is more data about data. 29. Monthlyof locational privacy Loss transit swipe-cards Electronic tolling devices(FastTrak, EZpass, congestion pricing) Services telling you when your friends arenearby Searches on your PDA for services andbusinesses near your current location Free Wi-Fi with ads for businesses near thenetwork access point youre using Electronic swipe cards for doors Parking meters you can call to add moneyto, and which send you a text message whenyour time is running out Digital photos (EXIF data) Social Media Smartphones 30. Geotagging - http://en.wikipedia.org/wiki/Geotagging. Geotagging can help users find a wide variety of location-specificinformation. For instance, one can find images taken near a givenlocation by entering latitude and longitude coordinates into asuitable image search engine. Geotagging-enabled informationservices can also potentially be used to find location-basednews, websites, or other resources.[2] Geotagging can tell users thelocation of the content of a given picture or other media orthe point of view, and conversely on some media platforms showmedia relevant to a given location. http://regex.info/exif.cgi - Jeffreys EXIF viewerGeo spatial metadata (Geotagging) 31. How to disable your geotagging on your Smartphone http://icanstalku.com/how.php 32. More info about EXIF (exchangeable information) can be found here http://en.wikipedia.org/wiki/Exchangeable_image_file_formatExchangeable image file format (Exif) is a standard that specifiesthe formats for images, sound, and ancillary tags used by digital cameras(including smartphones), scanners and other systemshandling image and sound files recorded by digital cameras. Thespecification uses the following existing file formats with the addition of specific metadata tags. 33. Research, collection & documentation Research and Documentation andcollection Forms - Date and time of research - Criteria used - Results - Type of data collected - Method of collection - Date and time of collection 34. So I have all this publicinfo, now what? Preserve the data Copy links Print screen vs. capture programs Screen hunter 5.1 Adobe www.camstudio.org www.free-screen-capture.com Print screen is still free Youtube or other video source, downloadand rip 35. Proper management begins with knowing what not to say or write Care must be taken when creating ESI inany form, but especially with socialmedia.- Unfortunately, while most peopleunderstand thisidea, they donot govern their mouths or fingersaccordingly.- Every form of ESI you create couldend up in court.- You can take steps to minimize thefrequency ofembarrassingmiscues.- Adopt best practices when creatingverbal or writtenESI. 36. How to avoid creating incriminating ESI Treat social media communications asformal, business communications. Use proper etiquette with allcommunications. Avoid red flag words.- Its possible to find incriminating ESIby searching for commonly used words andphrases.- Those conducting searches dont needto know details about a case, justunfortunate words used all too frequently. 37. Stupid Shocked Huge mistake Speechless Big mistake Too late Dumb Uncomfortable Cant believe Not comfortable Cannon believe I dont think we Serious troubleshould Big trouble Very sensitive Unsalvageable Highly sensitive Just between you Very confidentialand me Do not share this Just between us Dont share this 38. Auto claim examples 39. Youtube and MetaCafYoutube Visualizer 40. Auto claim example 41. Homeowner example 42. Twitter safety 43. Be specific when you search Be strategic, ask for email addresses uponintake Think outside of the box (include searchingfor subjects hobbies) Seek email addresses from the subject &relatives of the subject Use variations of names when searching Caution connecting virtual dots may bringyou to offensive (adult themed) websites Remember the web is an investigative toolNOT an investigation Document your findings Leave no virtual stone unturned 44. Questions? Please call me directly @ 267-975-6880 or via email @[email protected] or via Twitter at#michael_petrie ; or for any additionalinformation.