Linked e-resources

Details

Part 1: Introduction
OSINT as an integral part of the national security apparatus
Open Source Intelligence and the protection of national security
Police use of Open Source Intelligence: The longer arm of law
OSINT as part of the strategic national security landscape
Taking stock of subjective narratives around modern OSINT
Part 2: Methods, Tools and Techniques.-Acquisition and preparation of data for OSINT investigations
Analysis, interpretation and validation of open source data
OSINT and the dark web
Fusion of OSINT and non-OSINT data
A framework for assessing OSINT tools.-Design considerations for OSINT tools and processes
Part 3: Practical Application and Cases
A new age of Open Source Investigation: International examples
Use cases and best practices for LEAs
OSINT in the context of cyber-security
Combatting cybercrime and sexual exploitation of children: An open source toolkit.-Identifying illegal cartel activities using open source intelligence
Part 4: Legal Considerations
Legal considerations for using open source intelligence in the context of cybercrime and cyberterrorism
Following the breadcrumbs: Using Open Source Intelligence as evidence in criminal proceedings.

Browse Subjects

Show more subjects...

Statistics

from
to
Export