Forensics for Vigilantes

October 17, 2016 | Views: 7033

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Rule #1.
Remains anonymous
– A vigilante always logs into anonymous accounts.

Rule #2.
Know the law

– A vigilante knows the law and knows how to identify crimes that she/he would like to pursue.

Rule #3.Collect data and file reports

– When you meet a perpetrator on-line, collect all evidence to incriminate the person enough to file a report.

Rule #4.
Don’t get intimidated.

– When you warn people about their behavior they get upset. Remind them about the injustice by pointing out what is morally wrong about their behavior. Don’t provoke the subject.


Remember, you are the sheriff in cyberspace.
You are the one to tell law enforcement that you are a vigilante when people report your accounts. When you get banned from a chat or forum, you have already collected the data in your brain. You don’t need files to accurately portray a criminal.
Probably you have read about profiling and the law.

Then you are indeed a vigilante.
Those that exercise their own right, by carrying right, and they are indeed called Vigilante.

— casus —
You read a post on a forum, by a little kid crying, that they are constantly being bullied on-line, cursed at and verbally abused. There is something wrong here.
— casus —

Pedophile-hater you are, you go talk to the kid, if you can. Only one time, or as many as necessary to obtain the right information.

If not…

You still go to that public forum or chat/web-site.
You look for the name of the person in question mentioned.  Also, you will keep a log from the session.
Then confront them with what you know about them.

Of course first, you have already sought out any relating connection to the key information.

A lot of times, the people in question like to remain anonymous.
You know they are really hated by the law when they are intelligent beings. In fact, you will keep asking them and don’t take in account your own reputation. You are anonymous, and you never hand out data about yourself.

You consider everybody equal, even suspects. So you will first anger them, by asking them about what crime they committed. Say you heard, or there is a rumor about the person in question (involving the allegation).

Here’s what you do:
Take screen-shots
Record all evidence.
Handle it on your own, call in friends or other vigilantes when you post on line, raising awareness.-Use your own tracking knowledge, hack a suspect in the last resort, yet know how to pry loose information.
Utilize 31337 h4x0rs
Deliver all evidence gathered (in sometimes years) about a portrayed criminal subject
Record the crimes committed by documenting all digital evidence

Files have timestamps so you don’t need to write everything down.
You don’t need to look at juvenile porn to become a suspect yourself.

Usually, there are people that feed you these links.
Don’t trust any hyper link you get.
You must know how to read where a URL is going.
Save a copy to the link in a .txt file and include it with the rest of the evidence.

Then what to do?

If you’re a vigilante, you are on your own.
You need to decide what to do, and how to handle it ethically without punishing the subject.
Just report the crime, and call in law enforcement.

You will not be found because you remain anonymous. And you know when you are indeed anonymous. Because people will approach you and ask about your age (you can tell just not your birth-date). Ask you where you live, or what city. Ask you for your Skype, e-mail, and you don’t give it.

You forgot, …

Your name is probably ‘maggy15’. And you are talking to Johnn the Ripper, and you know he is drunk so you keep flirting. Or this time, you are ‘femme29’ or <pick your own nick&gt, and then that moment comes where you want to be the moment.

You get that email/Skype/real name/age/ip.

You set up your own services in the cloud, or wherever you can lose data assets. Where you record the IP of the suspect. When you are basically through and worn out by all the aggression on line you receive. And don’t participate. Although you can, yet, it will not make a pretty picture.

Then leave for a vacation to some site.
Maybe a day, maybe a month, maybe half a year, but the suspect could be gone.
As long as the big mouth is still there, he will not leave, when he can pick on you.

So Maggy.
You become his “friend”.

As soon as you are his friend, you can leave. And they won’t be bothered anymore with you.
That’s when you know they have broken. And have another look at life.

As long as they are not your friend.
They are enemies.

And they should be documented and recorded.


Scrutinized by Law.


[catcopy] VIGILANTE



Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. me gusta lo que explica es bueno

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?