2016
DOI: 10.1007/978-3-319-47671-1_5
|View full text |Cite
|
Sign up to set email alerts
|

Taking Stock of Subjective Narratives Surrounding Modern OSINT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…As opposed to the above advantageous uses, OSINT sources can be used in malicious ways, and terrorist organizations can use OSINT sources to plan attacks. ey can gather information about the target (when investigating the target location) before attacking, analyze social media sites to secure more fighters, obtain military information disclosed accidentally by the government (e.g., a method of making explosives), and use various media channels to spread propaganda around the world [13,14]. Furthermore, data collected by OSINT can become a cornerstone for committing various cybercrimes (See Section 3).…”
Section: Examples Of Using Osintmentioning
confidence: 99%
See 1 more Smart Citation
“…As opposed to the above advantageous uses, OSINT sources can be used in malicious ways, and terrorist organizations can use OSINT sources to plan attacks. ey can gather information about the target (when investigating the target location) before attacking, analyze social media sites to secure more fighters, obtain military information disclosed accidentally by the government (e.g., a method of making explosives), and use various media channels to spread propaganda around the world [13,14]. Furthermore, data collected by OSINT can become a cornerstone for committing various cybercrimes (See Section 3).…”
Section: Examples Of Using Osintmentioning
confidence: 99%
“…Furthermore, if data collected by OSINT were used properly in the security aspect, cybercrimes, such as cyber security threats and cyber terrorism activities, that might occur in cyberspace could be prevented in advance. At present, studies have been continuously conducted to respond to cyberattacks using OSINT [14]. According to a report by the U.S. Office of Homeland Security, the use of data collected by OSINT included general intelligence, advanced warnings, domestic counterterrorism, protection of important infrastructures (including cyberspace), protection against critical terrorism, and emergencies in the domain of important missions [16].…”
Section: Importance Of Osint For Cybersecuritymentioning
confidence: 99%
“…The riots, however, did bring attention to the value of open-source intelligence (OSINT) and all territorial police forces have since developed OSINT capacities. Other evidence of investment in this realm includes the widespread use of social media monitoring software COSAIN by various territorial police forces (Fielding, 2021;Wells, 2016). The riots have perhaps reshaped conceptualisations of 'intelligence' as a discipline traditionally operating in the shadows, with associated covert action, to a discipline that increasingly recognises the value of opensource information.…”
Section: The 2011 England Riotsmentioning
confidence: 99%
“…The software product COSAIN provides another example. This product enables LEAs to perform sentiment analysis on social media platforms such as Facebook, Instagram, and Twitter and identify relevant content (Fielding, 2021;Wells, 2016). Interviews conducted by the author with senior officers and staff members at LEAs revealed that several agencies have started utilising this programme to gather intelligence leads.…”
Section: Introductionmentioning
confidence: 99%