• Corpus ID: 67020522

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

@inproceedings{Bazzell2012OpenSI,
  title={Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information},
  author={Michael Bazzell},
  year={2012}
}
Fifth Edition Sheds New Light on Open Source Intelligence Collection and Analysis.Author Michael Bazzell has been well known and respected in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout sixteen chapters of specialized websites, application programming interfaces, and software solutions. Based on his live and online… 

Open Source Intelligence and Cyber Crime: Social Media Analytics

TLDR
This chapter studies the problem of protecting Wikipedia articles from misinformation such as vandalism, libel, spam, etc, and addresses the problem from two perspectives: detecting malicious users to block such as spammers or vandals and detecting articles to protect, i.e., placing restrictions on the type of users that can edit an article.

The Development of an Open Source Intelligence Gathering Exercise for Teaching Information Security & Privacy

TLDR
This research-in-progress paper describes the development of a pedagogical exercise on open source intelligence gathering (OSINT), which will not only teach students how to find public information, but also help students realize the importance of protecting such information.

Expanded Workflow Development for OSINT(Open Source Intelligence)-based Profiling with Timeline

TLDR
A Korean-style OSINT-based profiling technique that considers the Korean web environment and provides timeline information, focusing on the improved workflow and the database schema to improve the efficiency of profiling is presented.

Open source intelligence Introduction , legal , and ethical considerations

TLDR
An overview of the fundamental methods used to conduct OSINT investigations and different use cases where OSINT techniques are applied are presented and possible countermeasures to protect one's privacy against the misuse of openly available information as well as the legal environment in Germany, and the ethical perspective are discussed.

Analyst as data scientist: surfing vs drowning in the information environment

TLDR
This paper will highlight exemplar methods and tools and provide contextualized examples of how they improve the ability to describe and diagnose, and, ultimately, make meaning about actors, events and influence.

Incidental Data: Observation of Privacy Compromising Data on Social Media Platforms

TLDR
It is shown that only 2 hours of manually fetching data are needed in order to unveil private personal information that was not intended to be published by the person, and a thirteen-step awareness guideline is described and proposed a change of law within Austrian legislation.

The Paradox of Open Source: An Interview with Douglas J. Naquin

The Associated Press (AP) reported on 8 November 2005 that, as part of post-11 September 2001 (9=11) United States intelligence reform efforts, the Director of National Intelligence (DNI) had

Structured Approach to the Social Network Analysis of Information About a Certain Individual

This paper describes an Internet-based structured method for data collection and analysis in relation to a certain individual. It includes a classification of open information sources and a brief

Mapping the online presence and activities of the Islamic State’s unofficial propaganda cell: Ahlut-Tawhid Publications

TLDR
It is argued that Ahlut-Tawhid Publications (AHP) was part of the ongoing online campaign of the Islamic State in the World Wide Web in 2018 and 2019, and maintained quite an impressive and long-lasting online presence.

Leveraging Social Network Analysis and Cyber Forensics Approaches to Study Cyber Propaganda Campaigns

TLDR
This research studies the online deviant groups who created a lot of cyber propaganda that were projected against the NATO’s Trident Juncture Exercise 2015 (TRJE 2015) on both Twitter and blogs and analyzes the sentiment diffusion in the community.