Linked e-resources
Details
Table of Contents
Part 1: Introduction
OSINT as an integral part of the national security apparatus
Open Source Intelligence and the protection of national security
Police use of Open Source Intelligence: The longer arm of law
OSINT as part of the strategic national security landscape
Taking stock of subjective narratives around modern OSINT
Part 2: Methods, Tools and Techniques.-Acquisition and preparation of data for OSINT investigations
Analysis, interpretation and validation of open source data
OSINT and the dark web
Fusion of OSINT and non-OSINT data
A framework for assessing OSINT tools.-Design considerations for OSINT tools and processes
Part 3: Practical Application and Cases
A new age of Open Source Investigation: International examples
Use cases and best practices for LEAs
OSINT in the context of cyber-security
Combatting cybercrime and sexual exploitation of children: An open source toolkit.-Identifying illegal cartel activities using open source intelligence
Part 4: Legal Considerations
Legal considerations for using open source intelligence in the context of cybercrime and cyberterrorism
Following the breadcrumbs: Using Open Source Intelligence as evidence in criminal proceedings.
OSINT as an integral part of the national security apparatus
Open Source Intelligence and the protection of national security
Police use of Open Source Intelligence: The longer arm of law
OSINT as part of the strategic national security landscape
Taking stock of subjective narratives around modern OSINT
Part 2: Methods, Tools and Techniques.-Acquisition and preparation of data for OSINT investigations
Analysis, interpretation and validation of open source data
OSINT and the dark web
Fusion of OSINT and non-OSINT data
A framework for assessing OSINT tools.-Design considerations for OSINT tools and processes
Part 3: Practical Application and Cases
A new age of Open Source Investigation: International examples
Use cases and best practices for LEAs
OSINT in the context of cyber-security
Combatting cybercrime and sexual exploitation of children: An open source toolkit.-Identifying illegal cartel activities using open source intelligence
Part 4: Legal Considerations
Legal considerations for using open source intelligence in the context of cybercrime and cyberterrorism
Following the breadcrumbs: Using Open Source Intelligence as evidence in criminal proceedings.