OSINT –Open Source Intelligence€¦ · OSINT –Origins •The term 'OSINT' originates from...
Transcript of OSINT –Open Source Intelligence€¦ · OSINT –Origins •The term 'OSINT' originates from...
Pattern Recognition and Applications Lab
Universitàdi Cagliari, Italia
Dipartimento di Ingegneria Elettrica
ed Elettronica
OSINT – Open Source Intelligence
Giorgio Fumera
Source: Davide Ariu – [email protected]
http://pralab.diee.unica.it
Intelligence
• Definition: the process and product of identifying, collecting, analyzing and refining information to make it useful to policymakers in making decisions — specifically, about potential threats to national security
• Intelligence gathering– clandestine operations, secret or covert means, known only at the highest levels of
government– information that is widely available
• Can be used for both legitimate and nefarious purposes
https://www.fbi.gov/about-us/intelligence 2
http://pralab.diee.unica.it
Intelligence Collection Disciplines (*INT)
Five intelligence collection disciplines:1. HUMan INTelligence (HUMINT): the process of gaining intelligence from humans or
individuals by analyzing behavioral responses through direct interaction2. SIGnal INTelligence (SIGINT): electronic transmissions that can be collected by ships,
planes, ground sites, or satellites – Communications Intelligence (COMINT): interception of communications between two parties
3. IMagery INTelligence (IMINT), or PHOTo INTtelligence (PHOTINT)4. Measurement And Signatures INTelligence (MASINT): advanced processing and use of
data gathered from overhead and airborne IMINT and SIGINT collection systems– TELemetry INTelligence (TELINT): data relayed by weapons during tests– ELectronic INTelligence (ELINT): electronic emissions picked up from modern weapons
and tracking systemsAn example: identifying chemical weapons
5. Open Source INTelligence (OSINT): the process of gathering intelligence from publicly available resources (including Internet)
3
http://pralab.diee.unica.it
OSINT - Definitions
• Open Source Information (OSINF): publicly available data –not necessarily free
• OSINF collection: monitoring, selecting, retrieving, tagging, cataloguing, visualising & disseminating data
• Open Source Intelligence (OSINT): proprietary intelligence recursively derived from OSINF, as a result of expert analysis
Slide credit: C.H. Best, JRC – European Commission
4
http://pralab.diee.unica.it
OSINT – Origins
• The term 'OSINT' originates from Security Services• The practice of using OSINT to build intelligence is not new
– Italy: OVRA (Organizzazione per la Vigilanza e la Repressione dell'Antifascismo) used OSINF since 1930
– Cold war: American and German secret services vs Russia• HUMINT, SIGINT and Classified information was largey preferred• Paradigm change:
– 9/11: OSINT could have been use to foresee attacks– fast growth of the Internet, appearance of Social Networks
• The 9/11 Commission Report:The need to restructure the intelligence community grows out of six problems that have become apparent before and after 9/11– Structural barriers to performing joint intelligence work– Lack of common standards and practice across the foreign-domestic divide– Divided management of national intelligence capabilities– Weak capacity to set priorities and to move resources– Too many jobs– Too complex and secret
5
http://pralab.diee.unica.it
OSINT – Who is Involved?
Tool Builder/Developer
MinisterGeneral
CommissionerCEO
Analyst
Classified Information
OSINF Collector/Researcher
Slide credit: C.H. Best, JRC – European Commission
6
http://pralab.diee.unica.it
Who uses OSINT?
• Security Services, Law Enforcement Agencies and Military Bodies
• Governmental Organisations– EU, NATO, AU Situation Centre– IAEA – Nuclear Safeguard– UN Department for Peacekeeping Operations– World Health Organisation– NGOs
• All the Large Companies
7
http://pralab.diee.unica.it
OSINT Sources of Information - 1• Media
– Newspapers, magazines, radio, television, etc.
• The Internet– News, Social Networks, Blogs, Video sharing sites, Thematic sites, etc.– Deep Web (not indexed by traditional search engines)
• Dynamic Web Pages • Sites behind Log-in• Sytes with a ROBOT.txt file properly configured
– Dark Nets/Web (TOR, I2P)
• Subscription Services– LexisNexis (http://www.lexisnexis.com) is a corporation providing computer-assisted legal
research as well as business research and risk management services. During the 1970s, LexisNexis pioneered the electronic accessibility of legal and journalistic documents
– Factiva (http://www.dowjones.com/products/product-factiva/) is the world’s leading source of premium news, data and insight, with access to thousands of premium news and information sources on more than 22 million public and private companies
– Jane's Information Group (www.janes.com) is a British publishing company specialising in military, aerospace and transportation topics
– BBC Monitoring (http://www.bbc.co.uk/monitoring) includes news, information and comment gathered from the mass media around the world for service subscribers
8
http://pralab.diee.unica.it
OSINT Sources of Information - 2
• Commercial Satellites– http://www.euspaceimaging.com/applications/fields/security-defense-intelligence– https://www.digitalglobe.com/markets/defense-and-intelligence
• Public Data– government reports, budgets, demographics, hearings, legislative debates, press
conferences, speeches, marine and aeronautical safety warnings, environmental impact statements and contract awards
• Professional and Academic– conferences, professional associations, academic papers, and subject matter experts
• Open Data– https://open-data.europa.eu/en/data– http://www.dati.gov.it– http://www.datiopen.it– Geospatial Data Providers – for an exhaustive list see:
https://en.wikipedia.org/wiki/List_of_GIS_data_sources
9
http://pralab.diee.unica.it
*INT Target: individuals
• Potentially interesting information– Physical locations– OSN profiles for checking on relationships, contacts, content sharing, preferred web
sites, etc. – E-mail addresses, users’ handles and aliases available on the Internet including
infrastructure owned by the individual such as domain names and servers– Associations and historical perspective of the work performed including background
details, criminal records, owned licenses, registrations, etc. This data is categorized into public data provided by official databases and private data provided by professional organizations
– Released intelligence such as content on blogs, journal papers, news articles, and conference proceedings
– Mobile information including phone numbers, device type, applications in use, etc
Source: Targeted Cyber Attacks Multi-staged - Attacks Driven by Exploits and Malware, Elsevier, 2014 10
http://pralab.diee.unica.it
*INT Targets: Corporates and Organisations
• Potentially interesting information– Determining the nature of business and work performed by target corporates and
organizations to understand the market vertically– Fingerprinting infrastructure including IP address ranges, network peripheral devices for
security and protection, deployed technologies and servers, web applications, informational web sites, etc.
– Extracting information from exposed devices on the network such as CCTV cameras, routers, and servers belonging to specific organizations
– Mapping hierarchical information about the target organizations to understand the complete layout of employees at different layers including ranks, e-mail addresses nature of work, service lines, products, public releases, meeting, etc.
– Collecting information about the different associations including business clients and business partners
– Extracting information out of released documents about business, marketing, financial, and technology aspects
– Gathering information about the financial stand of the organization from financial reports, trade reports, market caps, value history, etc.
Source: Targeted Cyber Attacks Multi-staged - Attacks Driven by Exploits and Malware, Elsevier, 2014 11
http://pralab.diee.unica.it
Domains registered by criminals for• counterfeiting goods• data exfiltration• exploit attacks• illegal pharma• infrastructure (ecrime name resolution)• malware C&C• malware distribution, ransomware• phishing, business email compromise• scams (419, reshipping, stranded
traveler…)
12
*INT Target Modes – Investigating cyber-attacks
http://pralab.diee.unica.it
OSINT Processes
Collect Transform Analyse Visualise& Report Collaborate
Slide credit: C.H. Best, JRC – European Commission
• Multilingual Information Retrieval
• Search• Crawl• News feeds
• Machine Translation
• Geo-tagging• Translation• Entity Extraction
• Entity Resolution
• Link Analysis• Relationships• Geolinking• Trends
• Statistics
“Connecting the dots”
• Networks• Relations• Time graphs
• Maps
“Generating actionable intelligence”
• Intel Wiki• IM• Case DB
• Publish
TECHNICAL ISSUES• Data Mapping• Data Deduping• Data Cleansing• Data Conversion• Data Linking• Data Normalisation
13
http://pralab.diee.unica.it
Information Collection – Issues (1)
Textual Information• How can I search it?
– Search Engines• General: Google, Yahoo, Bing, Baidu (Chinese, Japanese), Sogou (Chinese), Soso.com
(Chinese)• Thematic:
– Computers and Devices - Shodan– Maps – Bing, Google, Nokia, Yahoo! Maps– People - Spokeo– Source Code – Koders, Krugle, Google Code Search
– Libraries (e.g., Lexis Nexis, IEEE Xplore, ACM Digital Library)
• How can I extract it?– API – information access constraints; subject to change; platform specific– Scraping (ad-hoc source code for each platform; noise has to be removed; open
solutions exist à need to merge results)
14
http://pralab.diee.unica.it
Information Collection – Issues (2)
Non-textual Information (extraction difficult to automate)• Images
– People (who)? Places? Texts? Objects?
• Videos– People (who)? Places? Text? Objects? (same as for images)– Video contains audio?
• Transcription• Translation• Who are the speakers?
• Audio Traces– Transcription– Translation
• Other files– e.g., executables files; proprietary formats
15
http://pralab.diee.unica.it
Language Issues (1)Information Collection
16
• Culture• Art• Religion-Thought• University
Howzeh
• Hi-Tech• Health-Environment• Society• Economy• Markets
• Sport• Politic• International• Provinces• Photo• Video
• Magazine• Short news
http://pralab.diee.unica.it
Language Issues (2)Information Collection
17
https://en.mehrnews.com/
Slide Credit: C.H. Best, JRC – European Commission
• News• Culture• Literature• Religion• University• Social• Economic• Political• International• Sport• Nuclear• Photo
http://www.mehrnews.com/
http://pralab.diee.unica.it
Language Issues (3)Information Collection
18
Slide Credit: C.H. Best, JRC – European Commission
http://pralab.diee.unica.it
Social Network Analysis – IssuesInformation Collection
• Privacy Restrictions– third party application developers create applications that ask for unneeded permissions
to gain additional information• Platform Restrictions
– based on social relationships, user-based privacy settings, rate limiting, activity monitoring, and IP address based restrictions
• Data Availability– users did not provide information– the target information exists, but is "hidden" by privacy and platform restrictions
• Data Longevity– relationship dynamics change frequently, profiles are updated constantly– each data access is a snapshot of the social graph at collection time
• Legal Issues– disallowing screen scrapers and other data mining tools through ToS agreements, but
legal enforceability remains unclear• Ethical Issues
– Crawling social networks for personal information is an ethically sensitive area
19
Source: B. R. Holland, Enabling Open Source Intelligence (OSINT) in private social networks
http://pralab.diee.unica.it
World Map of Social Networks (1)Information Collection
20
http://pralab.diee.unica.it
World Map of Social Networks (2)Information Collection
21
http://pralab.diee.unica.it
Linguistic RequirementsInformation Transformation
Foreign language skills and knowledge proficiency: – Transcription: both listening and writing proficiency in the source language are essential– Interpretation: both listening in the source language and speaking proficiency in the
target language are essential– Translation: bilingual competence is a prerequisite for translation.
Linguists must be able to• read and comprehend the source language• write comprehensively in the target language• choose the equivalent expression in the target language that fully conveys and best
matches the meaning intended in the source language
22
Source: Open-Source Intelligence, Federation of American Scientists, 2012
http://pralab.diee.unica.it
Entity ResolutionInformation Transformation
• The problem of identifying and linking/grouping different manifestationsof the same real world object
• Examples of manifestations and objects:– Different ways of addressing (names, email addresses, FaceBook accounts) the same
person in text– Web pages with differing descriptions of the same business– Different photos of the same object
23
Source: L. Getoor, A. Machanavajjhala - Entity Resolution Tutorial
http://pralab.diee.unica.it
Entity Resolution – ExampleInformation Transformation
24
Enzo Ferrari e i suoi piloti«Un padrone delle ferriere». Era questo il modo singolare, ma per certi versi affettuoso, con cui Clay Regazzoni amava definire Enzo Ferrari. E che il Drake fosse un vero padrone, e fatto che nessuno dei piloti che hanno fatto tappa a Maranello puo mettere in discussione. Era lui, Ferrari, che stabiliva simpatie e antipatie, ordini e concessioni, stipendi e provvigioni. Su una cosa soltanto non concedeva margini neppure a se stesso: il valore di chi correva per lui. A patto, pero, che il nome del pilota non avesse il sopravvento, nella popolarita, sul nome delle macchine.Arrivando a tempi piu recenti, il pilota che piu affascinò Enzo Ferrari fu Niki Lauda. Fortemente parsimonioso e terribilmente abile nella trattativa economica, in cui eccelleva peraltro anche il Drake, Niki racconta che Ferrari ad un certo punto gli affibbio un curioso soprannome: «Mi chiamava ebreo, probabilmente perche mi riteneva anche un buon commerciante della mia professionalità. A fine luglio 1977, quando l'ex campione del mondo aveva gia firmato per la Brabham Alfa Romeo, Ferrari rivelo un'ammissione di Lauda. «Fino a quando lei sara vivo io guidero per lei», questo disse Niki al Drake, nel frattempo da dieci anni ingegnere honoris causa. Ma alla fine di agosto, Lauda si recò a Maranello e disse a Ferrari che non avrebbe guidato piu le sue macchine. «Se Lauda fosse restato con noi avrebbe almeno eguagliato il record di Fangio di cinque titoli mondiali vinti», confesso Ferrari tempo dopo. Non perdonò mai Lauda e non lo rivolle in Ferrari quando l'austriaco si offerse. Il perdono arrivò anni dopo, poco prima della morte del Drake.L'ultimo pilota, nella classifica degli amori tecnici di Enzo Ferrari, fu Gilles Villeneuve. Il Grande Vecchio era un umorale, quando Lauda lo lasciò fece una scommessa con se stesso: prender un signor nessuno e portarlo al titolo mondiale.
http://pralab.diee.unica.it
Entity Resolution – ExampleInformation Transformation
25
Enzo Ferrari e i suoi piloti«Un padrone delle ferriere». Era questo il modo singolare, ma per certi versi affettuoso, con cui Clay Regazzoni amava definire Enzo Ferrari. E che il Drake fosse un vero padrone, e fatto che nessuno dei piloti che hanno fatto tappa a Maranello puo mettere in discussione. Era lui, Ferrari, che stabiliva simpatie e antipatie, ordini e concessioni, stipendi e provvigioni. Su una cosa soltanto non concedeva margini neppure a se stesso: il valore di chi correva per lui. A patto, pero, che il nome del pilota non avesse il sopravvento, nella popolarita, sul nome delle macchine.Arrivando a tempi piu recenti, il pilota che piu affascinò Enzo Ferrari fu Niki Lauda. Fortemente parsimonioso e terribilmente abile nella trattativa economica, in cui eccelleva peraltro anche il Drake, Niki racconta che Ferrariad un certo punto gli affibbio un curioso soprannome: «Mi chiamava ebreo, probabilmente perche mi riteneva anche un buon commerciante della mia professionalità. A fine luglio 1977, quando l'ex campione del mondo aveva gia firmato per la Brabham Alfa Romeo, Ferraririvelo un'ammissione di Lauda. «Fino a quando lei sara vivo io guidero per lei», questo disse Niki al Drake, nel frattempo da dieci anni ingegnere honoris causa. Ma alla fine di agosto, Lauda si recò a Maranello e disse a Ferrari che non avrebbe guidato piu le sue macchine. «Se Lauda fosse restato con noi avrebbe almeno eguagliato il record di Fangio di cinque titoli mondiali vinti», confessò Ferrari tempo dopo. Non perdonò mai Lauda e non lo rivolle in Ferrari quando l'austriaco si offerse. Il perdono arrivò anni dopo, poco prima della morte del Drake.L'ultimo pilota, nella classifica degli amori tecnici di Enzo Ferrari, fu Gilles Villeneuve. Il Grande Vecchio era un umorale, quando Lauda lo lasciò fece una scommessa con se stesso: prender un signor nessuno e portarlo al titolo mondiale.
http://pralab.diee.unica.it
Entity Resolution – ExampleInformation Transformation
26
Enzo Ferrari e i suoi piloti«Un padrone delle ferriere». Era questo il modo singolare, ma per certi versi affettuoso, con cui Clay Regazzoni amava definire Enzo Ferrari. E che il Drake fosse un vero padrone, e fatto che nessuno dei piloti che hanno fatto tappa a Maranello puo mettere in discussione. Era lui, Ferrari, che stabiliva simpatie e antipatie, ordini e concessioni, stipendi e provvigioni. Su una cosa soltanto non concedeva margini neppure a se stesso: il valore di chi correva per lui. A patto, pero, che il nome del pilota non avesse il sopravvento, nella popolarita, sul nome delle macchine.Arrivando a tempi piu recenti, il pilota che piu affascinò Enzo Ferrari fu Niki Lauda. Fortemente parsimonioso e terribilmente abile nella trattativa economica, in cui eccelleva peraltro anche il Drake, Niki racconta che Ferrari ad un certo punto gli affibbio un curioso soprannome: «Mi chiamava ebreo, probabilmente perche mi riteneva anche un buon commerciante della mia professionalità. A fine luglio 1977, quando l'ex campione del mondo aveva gia firmato per la Brabham Alfa Romeo, Ferrari rivelo un'ammissione di Lauda. «Fino a quando lei sara vivo io guidero per lei», questo disse Niki al Drake, nel frattempo da dieci anni ingegnere honoris causa. Ma alla fine di agosto, Lauda si recò a Maranello e disse a Ferrari che non avrebbe guidato piu le sue macchine. «Se Lauda fosse restato con noi avrebbe almeno eguagliato il record di Fangio di cinque titoli mondiali vinti», confesso Ferrari tempo dopo. Non perdonò mai Lauda e non lo rivolle in Ferrari quando l'austriaco si offerse. Il perdono arrivò anni dopo, poco prima della morte del Drake.L'ultimo pilota, nella classifica degli amori tecnici di Enzo Ferrari, fu Gilles Villeneuve. Il Grande Vecchio era un umorale, quando Lauda lo lasciò fece una scommessa con se stesso: prender un signor nessuno e portarlo al titolo mondiale.
http://pralab.diee.unica.it
Entity Resolution – ExampleInformation Transformation
27
Before After
Slide Credit: L. Getoor, A. Machanavajjhala - Entity Resolution Tutorial
http://pralab.diee.unica.it
Traditional Challenges in Entity ResolutionInformation Transformation
Name/Attribute Ambiguity
28
Michael Jordan
Tom Cruise
Slide Credit: L. Getoor, A. Machanavajjhala - Entity Resolution Tutorial
http://pralab.diee.unica.it
Entity Resolution – Other ChallengesInformation Transformation
• Errors due to data entry
• Changing Attributes
• Abbreviations/Data Truncation
29
V. Rossi
Valentino Rossi Vasco Rossi Valeria Rossi
http://pralab.diee.unica.it
Entity Resolution – Abstract Problem StatementInformation Transformation
30
Slide Credit: L. Getoor, A. Machanavajjhala - Entity Resolution Tutorial
http://pralab.diee.unica.it
Entity Resolution – DeduplicationInformation Transformation
31
• Cluster the record mentions that correspond to the same entity
Slide Credit: L. Getoor, A. Machanavajjhala - Entity Resolution Tutorial
http://pralab.diee.unica.it
Entity Resolution – DeduplicationInformation Transformation
32
• Cluster the record mentions that correspond to the same entity• Compute a cluster representative
Source: L. Getoor, A. Machanavajjhala - Entity Resolution Tutorial
http://pralab.diee.unica.it
Entity Resolution – LinkageInformation Transformation
33
• Link Records that match across databases
Source: L. Getoor, A. Machanavajjhala - Entity Resolution Tutorial
http://pralab.diee.unica.it
Entity ResolutionInformation Transformation
34
Slide Credit: L. Getoor, A. Machanavajjhala - Entity Resolution Tutorial
http://pralab.diee.unica.it
Open Source Information Reliability (1) Analysis
• The types of sources used to evaluate information are– Primary sources: a document or physical object that was written or created during the
time under study– Original documents (excerpts or translations) such as diaries, constitutions, research
journals, speeches, manuscripts, letters, oral interviews, news film footage, autobiographies, and official records.
– Creative works such as poetry,drama,novels,music,and art. – Relics or artifacts such as pottery, furniture, clothing, artifacts, and buildings. – Personal narratives and memoirs. – Person of direct knowledge.
– Secondary Sources• Journals that interpret findings• Textbooks• Magazine Articles• Commentaries• Histories• Criticism• Encyclopedias
35
Source: Open-Source Intelligence, Federation of American Scientist, 2012
http://pralab.diee.unica.it
Open Source Information Reliability (2)Analysis
36
Source: Open-Source Intelligence, Federation of American Scientist, 2012
http://pralab.diee.unica.it
Open Source Information Content CredibilityAnalysis
37
Source: Open-Source Intelligence, Federation of American Scientist, 2012
http://pralab.diee.unica.it
Link AnalysisAnalysis
• Basic problem for intelligence analysts: putting information together in an organized way to make it easier extracting meaning, into a graphicformat
• Link analysis can be applied to relationships among identified entities: 1. Assemble all raw data 2. Determine focus of the chart 3. Construct an association matrix4. Code the associations in the matrix5. Determine the number of links for each entity6. Draw a preliminary chart (not covered in these slides)7. Clarify and re-plot the chart (not covered in these slides)
38
Source: Criminal Intelligence – United Nations Office of Drugs and Crime
http://pralab.diee.unica.it
Link Analysis – ExampleAnalysis
39
Source: Criminal Intelligence – United Nations Office of Drugs and Crime
http://pralab.diee.unica.it
Link Analysis – ExampleAnalysis
1. Assemble all raw data– Assemble all relevant files, field reports, informant reports, records, etc.
2. Determine the focus of the chart – Identify the entities that will be the focus of your chart (names of people and/or
organizations, auto license numbers, addresses, etc.)
3. Construct an association matrix– an essential, interim step to identify associations between entities
40
Source: Criminal Intelligence – United Nations Office of Drugs and Crime
http://pralab.diee.unica.it
Link Analysis – ExampleAnalysis
4. Code the associations in the matrix
41
Source: Criminal Intelligence – United Nations Office of Drugs and Crime
http://pralab.diee.unica.it
Link Analysis – ExampleAnalysis
5. Determine the number of links for each entity
42
Source: Criminal Intelligence – United Nations Office of Drugs and Crime
http://pralab.diee.unica.it
Preparation & Tools
43
http://pralab.diee.unica.it
Questions to ask before an investigation
• Should you hide your activities from bad actors?– Criminals may block IPs of known investigators– They may also monitor activity
• Do you want to leave crumbs associated with investigations that are traceable back to you?– Log records, metadata at third party intelligence sources
• Do you want resources you use to leave crumbs on your devices– Cookies, plug-ins, or worse…
44
http://pralab.diee.unica.it 45
http://www.securityskeptic.com/2016/01/how-to-turn-a-nexx-wt3020-router-into-a-tor-router.html
1. Buy a $20 micro router or Raspberry Pi2. Install OpenWRT and OnionWRT3. Investigate over TOR from behind router4. Put all your devices behind your router
WiFi Encryption
OnionWRT: Tor router
http://pralab.diee.unica.it
•https://www.torproject.org/projects/projects.html.en
– Amnesic Incognito Live System (TAILS) Linux distribution
– Tor browser
• Disposable, anonymous inboxes– https://mailinator.com/
• Browser tricks– Incognito/private mode can still be tracked
– User agent changes (can do with cURL as well)
46
Software to anonymize traffic
http://pralab.diee.unica.it
Recon-Ng
• https://bitbucket.org/LaNMaSteR53/recon-ng/downloads/
• A full-featured Web Reconnaissance framework written in Python– geolocating an IP address– finding the domains associated with a given email address– ...
• A completely modular framework with independent modules, database interaction, built in convenience functions
47
http://pralab.diee.unica.it
Recon-Ng - Modules– Discovery
• discovery/info_disclosure/interesting_files– Exploitation
• exploitation/injection/command_injector• exploitation/injection/xpath_bruter
– Import• import/csv_file• import/list
– Recon (60 modules)• recon/companies-multi/whois_miner• recon/domains-credentials/pwnedlist/leak_lookup• recon/hosts-hosts/ipinfodb• recon/profiles-profiles/twitter
– Reporting• reporting/csv• reporting/html• reporting/json• reporting/list
48
http://pralab.diee.unica.it
Case Study
49
http://pralab.diee.unica.it
Google “Nintendo Co. Ltd. Board”http://quotes.wsj.com/JP/7974/company-people
50
http://pralab.diee.unica.it
Data.com - Connect
51
http://pralab.diee.unica.it
Data.com – Nintendo Co. Ltd. Info
52
http://pralab.diee.unica.it
Data.com - Nintendo Co. Ltd. Locations
53
http://pralab.diee.unica.it
Data.com - Nintendo Co. Ltd. Locations
54
http://pralab.diee.unica.it
Data.com - Nintendo Co. Ltd. Locations
55
http://pralab.diee.unica.it
Data.com - Nintendo Co. Ltd. Internet Domains
56
http://pralab.diee.unica.it
Data.com - Nintendo Co. Ltd. Personnel Contact Info
57
http://pralab.diee.unica.it
About Data.com Points Earning
58
http://pralab.diee.unica.it
About Data.com Points Earning
59
http://pralab.diee.unica.it
Data.com - Nintendo Co. Ltd. Personnel
60
http://pralab.diee.unica.it
Data.com - Nintendo Co. Ltd. Personnel
61
http://pralab.diee.unica.it
Radaris.com - Kathryn Rigney 14/05/16 18:36Report for Kathryn Rigney
Page 1 of 2https://radaris.com/report/i-1683311
SERVICES RADAR APPS
agency and does not offer consumer reports. None of the information offered by Radaris is to be considered for purposes of determining any entity orperson's eligibility for credit, insurance, employment, housing, or for any other purposes covered under the FCRA.
Phones First reported Last reported
(253) 813-5796 06/01/1989 04/05/2016
(253) 277-0426 01/16/2011 02/15/2011
(206) 854-6297 – –
(760) 749-8776 – –
(714) 749-8776 – –
(253) 854-6297 – –
Emails
[email protected], [email protected], [email protected], [email protected]
Addresses First reported Last reported
226 R St, Auburn, WA 98002 > 06/30/2012 04/04/2016
802 45Th St # 11-20, Auburn, WA 98002 > 01/16/2011 02/15/2011
802 45Th St Apt 11-203, Auburn, WA 98002 > 04/01/1999 08/01/2010
802 45Th St, Auburn, WA 98002 > 09/12/2008 09/12/2008
802 45Th St Apt 8-106, Auburn, WA 98002 > 10/08/2005 07/01/2008
805 45Th St Stne 104, Auburn, WA 98002 > 12/01/1993 11/15/2007
802 45Th 106 St Apt 8, Auburn, WA 98002 > 04/26/2006 04/19/2007
1245 Po Box, Daphne, AL 36526 04/03/2006 04/15/2006
802 45Th St # 106, Auburn, WA 98002 > 04/01/1999 03/28/2005
802 45Th St Apt 8-102, Auburn, WA 98002 > 02/26/2002 04/30/2002
802 45Th St Stne 13, Auburn, WA 98002 > 01/01/2001 01/01/2001
4820 150Th Ave # 957, Redmond, WA 98052 > 11/01/1996 11/13/2000
3353 Las Vegas Dr, Oceanside, CA 92054 > 03/10/1989 05/29/1999
106 802Nd St 8, Auburn, WA 98002 > 03/01/1999 03/31/1999
106802 45Th St 8, Auburn, WA 98002 > 03/19/1999 03/19/1999
Kathryn RigneyAuburn, WA
Advanced People Search ReportReport date: May 14, 2016
1 person found.
Born: Nov 11, 1957 - 58 years old
1 Kathryn L Rigney
Public Records SearchBackground check, contact information, mentions monitoring and more..
62
http://pralab.diee.unica.it
Spokeo.com - Kathryn Rigneyhttp://www.spokeo.com/Kathryn-Rigney/Washington/Auburn/p18244555111
63
http://pralab.diee.unica.it
recon-NGrecon/contacts-profiles/fullcontact
64
http://pralab.diee.unica.it
recon-NGrecon/profiles-profiles/profiler
65
http://pralab.diee.unica.it
Recon-Ng: Show Contacts
66