How the FBI Catches Cyber Criminals - Email Hacking Forensics

4,522
4
Published 2024-08-03
Disclaimer: I am not a lawyer or law enforcement officer and this video is for demonstration and entertainment purposes only.

Ever wondered how the police and special agents determine who committed a computer crime? In this video, I teach you how the FBI and other law enforcement agencies track down cyber criminals through email forensics!

ARIN IP Lookup: search.arin.net/rdap/

Download a Subpoena: www.uscourts.gov/forms/notice-lawsuit-summons-subp…

Visual Trace Route Tool: visualtraceroute.net/

FBI and Partners Target Darknet Opioid Traffickers:    • FBI and Partners Target Darknet Opioi...  

Email Attacks
- Spamming
- Phishing
- Mail bombing
- Cyberstalking
- Child abduction

Steps for conducting email crime investigations
1. Seizing the computer and email accounts
2. Acquiring the email data
3. Examining email messages
4. Retrieving email headers
5. Analyzing email headers
6. Recovering deleted email messages

All Comments (15)
  • This was neat. I have no idea how I arrived here, but hey! Thanks for the information!!
  • @chillphil967
    16:41 lol “…if you’re a civilian, i do not recommend you go any further…” pencils down, class. cool video though 👍
  • @PirateAlgeria
    Thank you for this video, its really helpful, more than you think
  • @PirateAlgeria
    please make more videos like this would be happy to learn
  • @moneyman6227
    So if I hypothetically make my own subpoena on a vpn and send it to Verizon how do they check if im actually law enforcement or do they not… 😁
  • @gabrielt5784
    Thanks - how does it work though if its a cloud email that was composed, like gmail - the end ip address is not your computer...
  • @Tom-sg4iv
    Your trace route has nothing to do with the route the email took to your inbox.
  • @harrydo4200
    I followed the steps to get the header from gmail but only see the IP of the server :/
  • @PaulinaVenezia
    They definitely keep tabs on people who watch porn. The majority of Americans are listed as porn watchers in their personal FBI file.
  • What if the person use a cheap burner phone with no SIM card and create a cloud email on a Starbucks WiFi?
  • This sounds like you sat through a for pay hacking web series or seminar by folks that know F-all about cybersecurity nor how those 3 letter agencies gather their information and intel. What you are describing is what a small police force would use or ask of a moderate sized police force not the FBI/NSA/CIA/DOD uses at all.