O'Reilly logo

Low Tech Hacking by Sean Lowther, Russ Rogers, Jennifer Jabbusch, Terry Gudaitis, Jack Wiles

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Low tech targeting and surveillance
How much could they find out about you?
Information in this chapter
• Initial Identification
• Property Records, Employment, and Neighborhood Routes
• Disclosure on Social Networks and Social Media
• Financials, Investments, and Purchase Habits
• Frequented Locations and Travel Patterns
• Third-Party Disclosures
• Use of Signatures
• Automated Surveillance
• Target Interaction
• Scanners and Miniatures
Years ago, surveillance required an ample investment in time, expertise, energy, and usually money on the part of the person(s) conducting the surveillance. Today, anyone can do it with just a laptop, iPad, or smartphone and an Internet connection. Surveillance techniques have expanded along with the amount of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required