000806611 000__ 04461cam\a2200493Mi\4500 000806611 001__ 806611 000806611 005__ 20230306143823.0 000806611 006__ m\\\\\o\\d\\\\\\\\ 000806611 007__ cr\un\nnnunnun 000806611 008__ 170106s2016\\\\sz\\\\\\o\\\\\000\0\eng\d 000806611 019__ $$a967656043 000806611 020__ $$a9783319476711$$q(electronic book) 000806611 020__ $$a3319476718$$q(electronic book) 000806611 020__ $$z331947670X 000806611 020__ $$z9783319476704 000806611 035__ $$aSP(OCoLC)ocn967761116 000806611 035__ $$aSP(OCoLC)967761116$$z(OCoLC)967656043 000806611 040__ $$aYDX$$beng$$epn$$cYDX$$dN$T$$dIDEBK$$dGW5XE$$dOCLCQ$$dNJR$$dCNCGM$$dOCLCF$$dSTF$$dN$T$$dOCLCQ$$dUAB 000806611 049__ $$aISEA 000806611 050_4 $$aQA76.9.A25 000806611 08204 $$a005.8$$223 000806611 24500 $$aOpen source intelligence investigation /$$cBabak Akhgar, P. Saski Bayerl, Fraser Sampson, editors. 000806611 260__ $$aCham :$$bSpringer,$$c2016. 000806611 300__ $$a1 online resource. 000806611 336__ $$atext$$btxt$$2rdacontent 000806611 337__ $$acomputer$$bc$$2rdamedia 000806611 338__ $$aonline resource$$bcr$$2rdacarrier 000806611 4901_ $$aAdvanced sciences and technologies for security applications 000806611 5050_ $$aPart 1: Introduction -- OSINT as an integral part of the national security apparatus -- Open Source Intelligence and the protection of national security -- Police use of Open Source Intelligence: The longer arm of law -- OSINT as part of the strategic national security landscape -- Taking stock of subjective narratives around modern OSINT -- Part 2: Methods, Tools and Techniques.-Acquisition and preparation of data for OSINT investigations -- Analysis, interpretation and validation of open source data -- OSINT and the dark web -- Fusion of OSINT and non-OSINT data -- A framework for assessing OSINT tools.-Design considerations for OSINT tools and processes -- Part 3: Practical Application and Cases -- A new age of Open Source Investigation: International examples -- Use cases and best practices for LEAs -- OSINT in the context of cyber-security -- Combatting cybercrime and sexual exploitation of children: An open source toolkit.-Identifying illegal cartel activities using open source intelligence -- Part 4: Legal Considerations -- Legal considerations for using open source intelligence in the context of cybercrime and cyberterrorism -- Following the breadcrumbs: Using Open Source Intelligence as evidence in criminal proceedings. 000806611 506__ $$aAccess limited to authorized users. 000806611 520__ $$aOne of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand. Open Source Intelligence (OSINT) provides an invaluable avenue to access and collect such information in addition to traditional investigative techniques and information sources. This book offers an authoritative and accessible guide on how to conduct Open Source Intelligence investigations from data collection to analysis to the design and vetting of OSINT tools. In its pages the reader will find a comprehensive view into the newest methods for OSINT analytics and visualizations in combination with real-life case studies to showcase the application as well as the challenges of OSINT investigations across domains. Examples of OSINT range from information posted on social media as one of the most openly available means of accessing and gathering Open Source Intelligence to location data, OSINT obtained from the darkweb to combinations of OSINT with real-time analytical capabilities and closed sources. In addition it provides guidance on legal and ethical considerations making it relevant reading for practitioners as well as academics and students with a view to obtain thorough, first-hand knowledge from serving experts in the field. 000806611 588__ $$aDescription based on print version record. 000806611 650_0 $$aCyber intelligence (Computer security) 000806611 650_0 $$aComputer crimes$$xInvestigation. 000806611 650_0 $$aCriminology$$xMethodology. 000806611 7001_ $$aAkhgar, Babak,$$eeditor. 000806611 7001_ $$aBayerl, P. Saskia,$$eeditor. 000806611 7001_ $$aSampson, Fraser,$$eeditor. 000806611 77608 $$iPrint version:$$tOpen source intelligence investigation.$$dCham : Springer, 2016$$z331947670X$$z9783319476704$$w(OCoLC)958357073 000806611 830_0 $$aAdvanced sciences and technologies for security applications. 000806611 852__ $$bebk 000806611 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-47671-1$$zOnline Access$$91397441.1 000806611 909CO $$ooai:library.usi.edu:806611$$pGLOBAL_SET 000806611 980__ $$aEBOOK 000806611 980__ $$aBIB 000806611 982__ $$aEbook 000806611 983__ $$aOnline 000806611 994__ $$a92$$bISE