![]() ![]() There are relatively simple steps behind securing most content on Google Maps, but certain security settings must be engaged by the user directly. This comparatively open flow of information on Google Maps is both a great benefit for researchers, who can access geotagged, geolocated, and roughly dated information uploaded by individuals, but also a risk to users and organizations who don’t take proper precautions when uploading content. Like other platforms, Google Maps provide users with the ability not only to upload media and other content directly to a location-based GIS map, but also to place text reviews at various businesses and geo-locations around the world. One of the biggest potential security vulnerabilities to an individual user, and thus one of the most useful tools for an OSINT researcher to verify information with, is Google Maps. In many cases, these users are enabled by app and device features which encourage participation and the submission of content. Google’s expansive location tracking via Android has been widely criticized, and although the company has taken steps in recent weeks to secure the privacy of its users on the Google platform, a major threat to Google’s user security still exists: the users themselves. In June of 2019, Facebook deactivated most of their graph search functionality, in a move which was intended to increase the privacy of users but which also left many investigators without the essential tools needed to perform their research. Companies have taken various steps to address this, with some notable examples. OSINT researchers can easily utilize Google Maps tools to verify information and establish suspect timelines.įor years, social media companies like Facebook have come under increased pressure for the amount of publicly shared and openly accessible user data available for search on their platforms.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |