Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Hello, everyone, welcome back in this lesson, which is dedicated on defining the sock puppet,
00:07
you will learn what a sock puppet is and where to start with creating a sock puppet off your own
00:13
to tell you what a sock puppet is. I would like to share an Oxford definition off it, which I think covers it best. A sock puppet is false online identity typically created by a person or group in order to promote their own opinions or views. For example, you create a fictional person with the linked in profile,
00:32
which looks legitimate, but that person does not really exist.
00:36
That profile could be used to connect with relevant people in your field off interest to get some information out of them, or to simply redirect people's opinions about something in the other direction. But it is imperative it cannot be linked back to you.
00:52
One other thing is that a sock puppet takes time
00:55
to grow it and to make its digital life credible on social networks join different groups, comment, different events and posts. Actually, it's okay to have a few social profiles, for example, one Lincoln and one on Facebook with real history and pictures from different places and so on.
01:12
You probably encountered a month old profiles. They started to comment and talk really convincing about something.
01:19
This kind of profiles probably won't fool anyone but can still stares things up.
01:25
I also have to mention that since I made my first version of this Olsen Fundamentals course, where I have also talked about sock puppets more than a few potential sock puppets candidates contacted me on Lincoln. A great example. Off a sock puppet is Robin Sage
01:41
Ah, fictional cyber Threat analyst, which was presented at a Black Hat USA in 2010.
01:47
Under its titled Getting In Bed With Robin Sage, I recommend to go through this case study where you will probably get the best overview off a sock puppet profile.
01:57
Many people fell for it. The profile had a few gaps but was overlooked by most. It got job offers, contacts, date requests and even Intel on operational security. As an interesting fact, her profile picture is from a poor insight. You're probably wondering now in this next bullet
02:15
why I put male Female
02:19
is a male person or a man. I have to say that female profiles have better success and connecting with people
02:25
because, in my opinion, the huge majority of men are like and to be more vulnerable to a direct approach from a pretty girl. You may be tried this on different check platforms to pretend that you are someone else, and I will now mention a few tools and tips and creating your own sock puppet.
02:42
I didn't want to make a separate video out off it just because I think this will be enough for your further studies on the subject.
02:50
An interesting tool for choosing a profile picture is the website. This person does not exist dot com. The name sounds cool. It's a machine learning project that synthesizes artificial samples off images and produces artificial authentic images. I recommend for you to check it out.
03:07
An additional side note about this current with some social networks can spot a fake profile picture so you're immediately bad.
03:15
They can even ask for video few as the profile owner, but I think that is a big invasion of privacy. Next, use a burner email address if possible. Mawr and Mawr Online services are banning them because they want your really mail address but you can always try it. I used the free disposable email service
03:35
33 male dot com,
03:36
but I would suggest to check a couple of them to see which one works for you best
03:40
next. I would like to mention location, and by that I mean on the I P, from which you will create that email account. Or you will do that. Sign up to, AH, Social service social network. I would recommend for you to not to use a VPN or other I p masking services. Will you do that?
03:59
Because that is one of the reasons your account might get on their radar as a fake one.
04:03
Also, use a clean browser without cash or any other taps where you are long. Then in the end, if you go into the sock puppet business, it is always better to have a few of them, because when you use one for some purpose, you probably won't be able to reuse it again.
04:19
Because remember, internet is forever and all your activities leave a footprint.
04:24
Also, whatever you do, do not interact with any of your other accounts, contacts or peers. Your puppets should be stand alone I entities in their own right. In this video we covered about a sock puppet is with a cool case study example and a few tips for creating your own.
04:41
And in the next video, we will touch on a few ways how to spot them,
04:45
So see you there.

Up Next

Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By

Instructor Profile Image
Tino Sokic
CEO at DobarDan
Instructor