AVOIDING DATA SOURCING PITFALLS
A common pitfall of investigators using OSINT as part of their investigation is the reliance on data that has been identified from a single source. It is important for all OSINT investigators to appreciate that just because you are able to locate information through open-source methods does not mean it should be relied upon as part of an investigation.
During an investigation where OSINT methodology is being used, it is important to identify and categorize your data, not just in terms of the data type and how it applies to the circumstances of your case, but also in terms of the sourcing and confidence level of the data.
This presentation will focus on the process and methodology that should be followed by OSINT investigators in assessing the confidence level of the data they are gathering. We will also discuss the importance and need to double source information that is going to be used as part of an investigative report and how single sourced data should be appropriately documented if used during an investigation and documented in a report.
Learning Objectives
- Understand the importance of assessing data sourced.
- Learn how to appropriately assess confidence levels of gathered data.
- Understand the different ways single sourced and double sourced data should be used in an investigation.
JON SCHERR
Jon Scherr is a certified fraud examiner with more than 15 years of investigative experience. He has been appointed as an expert on more than 20 occasions. Jon has testified as an expert in a matter involving insurance fraud and has acted as an expert in disputed matters with values of up to $250 million. He works on all facets of forensic investigations preparing information requests, performing forensic accounting analysis, and drafting expert reports. His casework includes the insurance, entertainment, logistics, manufacturing, government services, pharmaceutical, retail, and financial industries. Throughout his career, Jon has provided expert investigative advisory services in matters of employee malfeasance, executive breach of fiduciary duties, money laundering, and anti-bribery and corruption. He has also assisted clients with fraud risk mitigation, internal controls, and policies and procedures related to anti-money laundering, anti-terrorist financing, and anti-bribery and corruption. Jon expertise encompasses both domestic and international matters including fraud investigations and litigation support. He has conducted corporate and white-collar fraud investigations involving Ponzi schemes, the Foreign Corrupt Practices Act (FCPA), the UK Bribery Act (UKBA), anti-money laundering, and fraud risk mitigation. He also provides risk assessments and internal controls evaluations for design and operating effectiveness.