Sabotage
In this scenario, an organization is alerted that one or more stakeholders are attempting to disrupt operations. The stakeholder might be being used as a proxy.
Objective
To solve the problem in these investigations, the organization has these objectives:
- Identify the saboteur.
- Understand the techniques that were employed by the saboteur.
- Assess the impact and scope of the disruption.
- Pinpoint vulnerabilities that were exploited by the saboteur
Investigation
Use the tools on the Forensics tab to help you investigate.

- Use free-form search to search for symptoms of the sabotage.
- Examine suspect content that is flagged by the product.
- Use visual navigation, Digital Impression, and content filtering to explore the symptoms and detect identifiers of the saboteur.
- Use Surveyor to trace the activities of the saboteur.
- Use data reconstruction to discover saboteur roles and motivations.
- Use data reconstruction to review the content that the saboteur used.
- Use free-form search, Surveyor, and suspect content to reveal the compromised systems and procedures that enabled the sabotage.