scholarly journals Open source intelligence

Author(s):  
Isabelle Böhm ◽  
Samuel Lolagar

AbstractOpen Source Intelligence (OSINT) has gained importance in more fields of application than just in intelligence agencies. This paper provides an overview of the fundamental methods used to conduct OSINT investigations and presents different use cases where OSINT techniques are applied. Different models of the information cycle applied to OSINT are addressed. Additionally, the terms data, information, and intelligence are explained and correlated with the intelligence cycle. A classification system for entities during OSINT investigations is introduced. By presenting the capabilities of modern search engines, techniques for research within social networks and for penetration tests, the fundamental methods used for information gathering are explained. Furthermore, possible countermeasures to protect one’s privacy against the misuse of openly available information as well as the legal environment in Germany, and the ethical perspective are discussed.

The Dark Web ◽  
2018 ◽  
pp. 255-289
Author(s):  
Shalin Hai-Jew

People have long gone online to groom their online identities, to communicate some aspects of themselves in the real. The information shared is purposive and strategic. Inevitably, the information is selective and incomplete. The cyber may evoke something about the physical only to a degree, in the cyber-physical confluence. In an asymmetrical information environment, those who have the most accurate and requisite information often have the advantage. It is said that much of intelligence is conducted using Open-Source Intelligence (OSINT), which suggests a need for reading between the lines of publicly released information; indeed, much of life is conducted in online public spaces. A number of tools enable the extraction and analysis of information from public sites. When used in combination, these tools may create a fairly clear sense of the online presences of various individuals or organizations or networks online for increased transparency. This chapter describes some of the tools (Maltego Radium™ and Network Overview, Discovery, and Exploration for Excel/NodeXL™) that may be used to increase the knowability of others in the creation of various profiles. This includes some light applications of “inference attacks” based on publicly available information. Further information may be captured from the Hidden Web through tools designed to crawl that understructure, and this potential is addressed a little as well.


Author(s):  
Shalin Hai-Jew

People have long gone online to groom their online identities, to communicate some aspects of themselves in the real. The information shared is purposive and strategic. Inevitably, the information is selective and incomplete. The cyber may evoke something about the physical only to a degree, in the cyber-physical confluence. In an asymmetrical information environment, those who have the most accurate and requisite information often have the advantage. It is said that much of intelligence is conducted using Open-Source Intelligence (OSINT), which suggests a need for reading between the lines of publicly released information; indeed, much of life is conducted in online public spaces. A number of tools enable the extraction and analysis of information from public sites. When used in combination, these tools may create a fairly clear sense of the online presences of various individuals or organizations or networks online for increased transparency. This chapter describes some of the tools (Maltego Radium™ and Network Overview, Discovery, and Exploration for Excel/NodeXL™) that may be used to increase the knowability of others in the creation of various profiles. This includes some light applications of “inference attacks” based on publicly available information. Further information may be captured from the Hidden Web through tools designed to crawl that understructure, and this potential is addressed a little as well.


2021 ◽  
Author(s):  
Francisco José Cesteros García

Social Networks has changed the way of developing an investigation as far as people use to explain, graph, show and give details about their life. It is so because people need to communicate and need to share feelings and passionate life. Based on these facts, private investigation uses the information in public databases to make an approach to people, their facts and their details that they publically expose to the rest of the world. So, this chapter explains how to use the OSINT (Open Source INTelligence) methodology for legally become part of the steps on a private investigation. The information is growing up and people expose their images, comment and reference to other ones so it facilities the investigation of getting results. Actually OSINT is the first step that private investigation must consider and this chapter covers and explains why and how to do this.


Sign in / Sign up

Export Citation Format

Share Document