This book provides the state-of-the-art on the algorithms necessary for open source intelligence gathering, presenting information on the extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media.
Ch 1. Introduction to OSINT Ch 2. Advances in Automated OSINT Ch 3. Named Entity Resolution in Social Media Ch 4. Relative Cyberattack Attribution Ch 5. Evidence Accumulation Strategies for OSINT Ch 6. Analyzing Social Media Campaigns for Group Size Estimation Ch 7. Crawling the Dark Web Ch 8. Case Study: The Digital Underground Ch 9. Graph Creation and Analysis for Linking Actors Ch 10. Case Study Predicting Crime with OSINT Ch 11. Ethical Considerations w/Public Data Ch 12: Limitations of automating OSINT Ch 13. Geospatial Reasoning of Open Data Ch 14: Future Trends
Dr. Robert Layton is a Research Fellow at the Internet Commerce Security Laboratory (ICSL) at Federation University Australia. Dr Layton's research focuses on attribution technologies on the internet, including automating open source intelligence (OSINT) and attack attribution. Dr Layton's research has led to improvements in authorship analysis methods for unstructured text, providing indirect methods of linking profiles on social media. Paul A. Watters is a Professor of Information Technology at Massey University. He was previously Associate Professor of Information Security at the University of Ballarat, and co-founded the Cybercrime Research Laboratory at Macquarie University. His research interests are human factors in security and open source intelligence, and in measuring the risks associated with cybercrime, especially to children and young people. He is a Fellow of the British Computer Society and his work has been cited 1,249 times He has worked closely with government and industry on many projects, including Westpac, IBM, and the Australian Federal Police (AFP).
"Each chapter can stand alone, but together they give an accurate view of the current situation - it's a good mix of theory and practice(s)...an interesting read for researchers and digital investigators...an eye-opening one for Internet users in general..." --Help Net Security