25 Sep 2025

Security Investigators and threat searchers use Digital Investigation tools.

This document refers to current threats that require technologies and human intelligence to predict or find the crime and stop it- protecting sites and saving lives.

On social media people ‘telegraph’ their intentions, emotions, abuse, and their loyalties to the world. In other words they display their religious beliefs, moral code or political affiliations.

The reason why the word ‘telegraph’ is used above is because not only are words used but also people click the like, dislike or on an emoji. They display how they feel about something that is on the picture or video clip which could be, someone burning a flag, raising the flag, abusing or hugging others, painting graffiti on a building or statue, just to mention but a few.

The technologies can assist greatly for example, when the digital investigation tools match people with people or people with objects. By using such technology, one could scan images of something which could be masked/unmasked people or people carrying specific flags.

With the current threats a specific threat namely ‘espionage’ especially during war time, it is advised that investigators should be made aware of FIST (foreign instrument surveillance technologies) besides knowing why certain technologies are banned from government sites. This is important to know for two reasons, namely
1. For Digital Forensics and Digital Evidence CCTV brands that have been banned from Government sites that are used for forensic investigation could be easily monitored real time through the algorithm’s backdoor.
2. Secondly, the digital forensic evidence could be pulled from the CCTV that has been banned from government sites could be erased, manipulated or doctored and presented by the opposing lawyers causing the evidence to be deemed unreliable.

The above scenarios display that various or a variety of resources should be used at the same time which is required to mitigate the challenges of today.

One of the x factors is the biggest nightmare…. etc can be found on this link besides all the necessary research manuscripts for security criminology-risk investigation.