Skip to main content
Completion requirements

Definitions and Descriptions.


Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

H

Hashing

Forensic hashing is the process of creating a digital fingerprint, or hash, of a file or piece of evidence in order to verify its authenticity and integrity. Hashing algorithms, such as MD5 or SHA-1, create a unique string of characters that represents the contents of a file. If even a single bit of the file is changed, the resulting hash will be completely different.

Forensic hashing is used in digital forensics to ensure that evidence has not been tampered with or altered in any way. For example, if a suspect's computer is seized as evidence, a forensic analyst may create hashes of the files on the computer in order to verify their integrity. If the hashes match the original hashes created at the time of seizure, it is an indication that the files have not been tampered with.

Forensic hashing is also used to identify duplicates of a file. If two files have the same hash, it is highly likely that they are identical copies. This can be useful in cases where there may be multiple copies of a file, such as a piece of malware or a stolen document.

In addition to verifying the authenticity and integrity of evidence, forensic hashing can also be used to identify known malicious files. Many antivirus software programs maintain databases of known malicious hashes, which allows them to quickly identify and block these files.

Overall, forensic hashing is an important tool in digital forensics, as it allows analysts to verify the authenticity and integrity of evidence and identify known malicious files.



Human Smuggling

Human smuggling is the illegal transportation of individuals across international borders, often for the purpose of exploitation or profit. It can involve a variety of methods, such as hiding people in the back of a truck or smuggling them on a boat or plane.

Here are some examples of human smuggling:

  1. Forced labor: Human smugglers may transport individuals across borders and then sell them into forced labor situations, such as factories or agriculture.

  2. Sex trafficking: Human smugglers may transport individuals, often women and children, across borders and sell them into the sex trade.

  3. Illegal immigration: Some people may turn to human smugglers in order to illegally enter a country in search of work or a better life.

  4. Political asylum: Human smugglers may transport individuals who are seeking political asylum from persecution or violence in their home country.

Human smuggling is a serious crime that often involves significant risks for the individuals being smuggled. It can lead to exploitation, abuse, and even death. It is also a major problem for many countries, as it can contribute to illegal immigration and other related issues.



Human Trafficking

Human trafficking is a serious crime that involves the exploitation of people for the purpose of forced labor or sexual exploitation. It is often referred to as modern-day slavery, as it involves the use of force, coercion, or deception to control and exploit individuals.

Here are some examples of human trafficking:

  1. Forced labor: This refers to the use of force or coercion to make someone work against their will, often in conditions that are dangerous, unhealthy, or abusive. Examples of forced labor can include working in factories, farms, or mines, or performing domestic work or other services.

  2. Sexual exploitation: This involves the use of force, coercion, or deception to make someone engage in sexual activities against their will, such as prostitution or pornography. This can also include forced marriage or other forms of sexual slavery.

  3. Organ trafficking: This involves the buying and selling of organs, often through the use of force or coercion. This can include organs such as kidneys, livers, or hearts, and often involves individuals who are desperate for money or in vulnerable situations.

  4. Child trafficking: This refers to the exploitation of children for the purpose of forced labor or sexual exploitation. This can include children who are forced to work in dangerous conditions, such as in factories or mines, or children who are forced into prostitution or pornography.

Human trafficking is a global problem that affects millions of people around the world. It is often linked to other crimes, such as drug trafficking and organized crime, and can have serious consequences for the physical and mental health of the individuals who are exploited.

From an investigator standpoint (always be carefuland practice OSINT): 

  1. Identify online platforms and communities that are popular traffickers: Traffickers often use online forums, websites, and social media platforms to advertise illicit services, recruit victims and communicate with potential clients. Research which websites and platforms traffickers are frequenting and sign up to them as an anonymous user to gain access to information.
  2. Monitor discussion boards to capture real-time data: Traffickers often use hidden message board codes to communicate. Monitor discussion boards, including general and specialized forums and closed groups, to capture real-time data and clues regarding trafficking activity.
  3. Use sophisticated keyword searches: Use advanced search engine query techniques to run keyword searches related to human trafficking on social media. Monitor search results and keep a log of anything suspicious.
  4. Track hashtag campaigns: Traffickers might use certain hashtag campaigns to bring attention to their offerings. Track these hashtags and try to uncover any related data or victims.
  5. Utilize mapping tools: Use online tools that allow you to map activity and trends related to human trafficking. Identify hot spots of activity and patterns in the data.
  6. Scour public safety websites and databases: Regularly visit public safety websites, such as those for local law enforcement, for data related to human trafficking. Cross-reference this information with your own data and research to draw further conclusions.
  7. Engage online: When applicable and appropriate, open yourself up to contact with potential traffickers and/or victims by providing a safe space for them to share their stories, thoughts and feelings. Take what they disclose and document it accordingly.


HUMINT

Human Intelligence (HUMINT) refers to information gathered and analyzed by human sources, rather than through electronic or technical means. It involves the collection and analysis of information from people, either directly through conversation or observation, or indirectly through documents, images, or other materials.

Examples of HUMINT include:

  1. Interrogation: Information gathered through questioning or interviewing people, often for intelligence purposes.
  2. Espionage: The act of gathering information from an enemy or foreign power through covert means, such as spying or infiltration.
  3. Network analysis: Examining the relationships between individuals and organizations in order to gather intelligence on their activities and intentions.
  4. Human reconnaissance: Observing and gathering information on a location or situation through the use of human eyes and ears, rather than through technical means such as drones or satellite imagery.
  5. Cultural analysis: Examining the customs, beliefs, and behaviors of a particular group or culture in order to better understand and predict their actions.

HUMINT is often used in conjunction with other forms of intelligence gathering, such as technical intelligence (TECHINT) or open-source intelligence (OSINT). It can be a valuable tool in understanding the motivations and intentions of individuals or groups, as well as in developing strategies for intelligence gathering and analysis.



loader image