Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Dear Officers, I am extremely

delighted to launch my next book


titled "The UNDER Cover"
for our Law Enforcement Agencies and
Other Security Forces on innovative
cyber crimes, Innovative investigation
skills, surveillance and counter
intelligence & Security. This
revolutionary book is aimed to assist
our ground forces on actual needs
and will act as an actual guide
on crime detection using
cyber intelligence.

Ishaan sinha
Cyber Crime Investigator & Author

For Further Enquiry 


Contact  :8657823704/8750339277
Website : www.ishaansinha.com
Content be as follows:
Googlization Concepts, Intelligence Counter Spying Bugged Cellphones
Collection and Aid to Investigator Counter Spying Bugged Computers
IPDR Detailed Analysis   Counter Spying Infrastructure  
IPDR Dumps Analysis Anonymous Operating Systems
Spoof/Voip Call Analysis/Investigation   Decoy Hostpot Interception  
SIMBox and Virtual Gateway Investigation Portable Hostspot Tracking  
Website Hacking Investigation   Bugs in Different Formats  
Penetration Testing/Ethical Hacking Skills Treat To Individual From Open Networks  
Virtual Identity Tracking & Investigation Social Media Monitoring,
Email Hacking Investigation & Forensics Investigation Techniques  
 Malware Analysis Use of VPNs & Proxy Tracking
Latest Innovative Job Frauds & Investigation Metadata & Extracting Maximum
 Latest Innovative Bank Frauds   Information From Various Media
Open Source Intelligence Collection Tools   Memory Analysis & Investigation  
Open Source Forensic Toolkit For Every Investigator   Social Engineering Techniques Using Cyber
Cyber Espionage On Defence Forces Space
Crime and Criminal Mapping  Internet Interception Android Application Security Analysis
Dump Analysis   Securing My Browsing Activities
Spoof SMS/Fraud Investigation    Cyber Jihad
Different Types of FUDs, Detection and Investigation Phone Number Analysis  
Innovative Disposable Identities on Various Media Intelligence Gathering From Websites,
Tools Used By Smartest Criminals For Domains, IP Addresses  
Covert Communication Archived Identity Analysis  
 Disposable Social Networks Revenge Porn Case Investigation
Darknet  Matrimonial Sites Fraud

You might also like