This book provides the state-of-the-art on the algorithms necessary for open source intelligence gathering, presenting information on the extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media.
Ch 1. Introduction to OSINT
Ch 2. Advances in Automated OSINT
Ch 3. Named Entity Resolution in Social Media
Ch 4. Relative Cyberattack Attribution
Ch 5. Evidence Accumulation Strategies for OSINT
Ch 6. Analyzing Social Media Campaigns for Group Size
Estimation
Ch 7. Crawling the Dark Web
Ch 8. Case Study: The Digital Underground
Ch 9. Graph Creation and Analysis for Linking Actors
Ch 10. Case Study Predicting Crime with OSINT
Ch 11. Ethical Considerations w/Public Data
Ch 12: Limitations of automating OSINT
Ch 13. Geospatial Reasoning of Open Data
Ch 14: Future Trends
Dr. Robert Layton is a Research Fellow at the Internet Commerce Security Laboratory (ICSL) at Federation University Australia. Dr Layton’s research focuses on attribution technologies on the internet, including automating open source intelligence (OSINT) and attack attribution. Dr Layton’s research has led to improvements in authorship analysis methods for unstructured text, providing indirect methods of linking profiles on social media. Paul A. Watters is a Professor of Information Technology at Massey University. He was previously Associate Professor of Information Security at the University of Ballarat, and co-founded the Cybercrime Research Laboratory at Macquarie University. His research interests are human factors in security and open source intelligence, and in measuring the risks associated with cybercrime, especially to children and young people. He is a Fellow of the British Computer Society and his work has been cited 1,249 times He has worked closely with government and industry on many projects, including Westpac, IBM, and the Australian Federal Police (AFP).
"Each chapter can stand alone, but together they give an accurate view of the current situation - it's a good mix of theory and practice(s)…an interesting read for researchers and digital investigators...an eye-opening one for Internet users in general..." --Help Net Security
![]() |
Ask a Question About this Product More... |
![]() |