Academic literature on the topic 'Open-Source intelligence (OSInt)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Open-Source intelligence (OSInt).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Open-Source intelligence (OSInt)"

1

Miller, Bowman H. "Open Source Intelligence (OSINT): An Oxymoron?" International Journal of Intelligence and CounterIntelligence 31, no. 4 (2018): 702–19. http://dx.doi.org/10.1080/08850607.2018.1492826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Herrera-Cubides, Jhon Francined, Paulo Alonso Gaona-García, and Salvador Sánchez-Alonso. "Open-Source Intelligence Educational Resources: A Visual Perspective Analysis." Applied Sciences 10, no. 21 (2020): 7617. http://dx.doi.org/10.3390/app10217617.

Full text
Abstract:
Given the growing application of open-source intelligence (OSINT), which has facilitated fast decision-making, this study aims to explore how research and educational material production in OSINT has evolved. For this analysis, two OSINT material sources are examined: the research dissemination databases and educational resources repositories. Considering that web information may or may not be publicly available, web Scraping and querying web interface strategies are used to metadata extraction. Finally, we suggest a findings hierarchical classification for the metadata retrieval results. Our
APA, Harvard, Vancouver, ISO, and other styles
3

Binney, Connor, David Medina, John Silvers, Nicholas Steinhaus, and Patrick DuBois. "Integrating Open Source Intelligence into the Brigade Combat Team at Combat Training Centers." Industrial and Systems Engineering Review 8, no. 1 (2021): 24–30. http://dx.doi.org/10.37266/iser.2020v8i1.pp24-30.

Full text
Abstract:
Open source intelligence (OSINT) is a rapidly expanding intelligence discipline in the Intelligence Community (IC), both in scope and impact to national security. US Army organizations conduct pre-deployment training and validation at combat training centers (CTC) across the full spectrum of warfare. Military intelligence professionals are tested on their ability to collect and analyze data using each of the intelligence disciplines. However, OSINT is the only intelligence discipline that is not currently graded at CTCs. Although there are various reasons why OSINT is not being sufficiently ev
APA, Harvard, Vancouver, ISO, and other styles
4

Le Deuff, Olivier, and Rayya Roumanos. "Open Source Intelligence (OSINT) : retour aux sources." I2D - Information, données & documents 1, no. 1 (2021): 8–12. http://dx.doi.org/10.3917/i2d.211.0008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hernandez Mediná, Martin Jose, Cristian Camilo Pinzón Hernández, Daniel Orlando Díaz López, Juan Carlos Garcia Ruiz, and Ricardo Andrés Pinto Rico. "Open source intelligence (OSINT) in a colombian context and sentiment analysis." Revista vínculos 15, no. 2 (2018): 195–214. http://dx.doi.org/10.14483/2322939x.13504.

Full text
Abstract:
Open source intelligence (OSINT) is used to obtain and analyze information related to adversaries, so it can support risk assessments aimed to prevent damages against critical assets. This paper presents a research about different OSINT technologies and how these can be used to perform cyber intelligence tasks. One of the key components in the operation of OSINT tools are the “transforms”, which are used to establish relations between entities of information from queries to different open sources. A set of transforms addressed to the Colombian context are presented, which were implemented and
APA, Harvard, Vancouver, ISO, and other styles
6

Deschamps, Christophe. "Open Source Intelligence (OSINT), veille et intelligence économique : des croisements féconds." I2D - Information, données & documents 1, no. 1 (2021): 67–72. http://dx.doi.org/10.3917/i2d.211.0067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schwarz, Klaus, Franziska Schwarz, and Reiner Creutzburg. "Conception and implementation of professional laboratory exercises in the field of open source intelligence (OSINT)." Electronic Imaging 2020, no. 3 (2020): 278–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.3.mobmu-277.

Full text
Abstract:
A large amount of personal and very incriminating data is currently stored on websites, apps and social media platforms. Users often update these data daily, and this data is open source. This information can become evidence for citizens, governments, and businesses to use in solving real financial, employment, and crime problems with the help of a professional information collector. To respond to this new situation, it is important to have well-trained staff. The fact that many authorities and companies work with very sensitive data makes it necessary to train their employees in Open Source I
APA, Harvard, Vancouver, ISO, and other styles
8

ZIÓŁKOWSKA, Agata. "OPEN SOURCE INTELLIGENCE (OSINT) AS AN ELEMENT OF MILITARY RECON." Security and Defence Quarterly 19, no. 2 (2018): 65–77. http://dx.doi.org/10.5604/01.3001.0012.1474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Le Deuff, Olivier. "Le chevalier Dupin comme métaphore d’une Open Source Intelligence (OSINT) lucide." I2D - Information, données & documents 1, no. 1 (2021): 40–44. http://dx.doi.org/10.3917/i2d.211.0040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dos Passos, Danielle Sandler. "Big Data, Data Science e seus contributos para o avanço no uso da Open Source Intelligence." Sistemas & Gestão 11, no. 4 (2017): 392–96. http://dx.doi.org/10.20985/1980-5160.2016.v11n4.1026.

Full text
Abstract:
Diante do crescente avanço tecnológico e da ampla disponibilização de dados pelos meios de comunicação aberta, vê-se surgir a necessidade de novos mecanismos que auxiliem a captar e analisar corretamente tais informações, tirando o máximo de proveito que a Open Source Intelligence (OSINT) pode oferecer. O objetivo de estudo deste artigo é descobrir as vantagens do uso da OSINT pelas agências de inteligência, organizações e empresas, e como os mecanismos de Big Data e Data Science podem auxiliar na sua propagação e torná-la cada vez mais eficaz.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Open-Source intelligence (OSInt)"

1

Gibson, S. D. "Open source intelligence (OSINT) : a contemporary intelligence lifeline." Thesis, Cranfield University, 2011. http://dspace.lib.cranfield.ac.uk/handle/1826/6524.

Full text
Abstract:
Traditionally, intelligence has been distinguished from all other forms of information working by its secrecy.Secret intelligence is about the acquisition of information from entities that do not wish that information to be acquired and,ideally,never know that it has. However, the transformation in information and communication technology(ICT)over the last two decades challenges this conventionally held perception of intelligence in one critical aspect: that information can increasingly be acquired legally in the public domain-‘open source intelligence’(OSINT). The intelligence community has r
APA, Harvard, Vancouver, ISO, and other styles
2

Belghith, Yasmine. "The Social Structures of OSINT: Examining Collaboration and Competition in Open Source Intelligence Investigations." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103944.

Full text
Abstract:
Investigations are increasingly conducted online by not only novice sleuths but also by professionals -- in both competitive and collaborative environments. These investigations rely on publicly available information, called open source intelligence (OSINT). However, due to their online nature, OSINT investigations often present coordination, technological, and ethical challenges. Through semi-structured interviews with 14 professional OSINT investigators from nine different organizations, we examine the social collaboration and competition patterns that underlie their investigations. Instead
APA, Harvard, Vancouver, ISO, and other styles
3

Meyers, Jared James. "Training Security Professionals in Social Engineering with OSINT and Sieve." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6863.

Full text
Abstract:
This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself
APA, Harvard, Vancouver, ISO, and other styles
4

Skepetzis, Vasilios, and Pontus Hedman. "The Effect of Beautification Filters on Image Recognition : "Are filtered social media images viable Open Source Intelligence?"." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44799.

Full text
Abstract:
In light of the emergence of social media, and its abundance of facial imagery, facial recognition finds itself useful from an Open Source Intelligence standpoint. Images uploaded on social media are likely to be filtered, which can destroy or modify biometric features. This study looks at the recognition effort of identifying individuals based on their facial image after filters have been applied to the image. The social media image filters studied occlude parts of the nose and eyes, with a particular interest in filters occluding the eye region. Our proposed method uses a Residual Neural Net
APA, Harvard, Vancouver, ISO, and other styles
5

Nicart, Esther. "Qualitative reinforcement for man-machine interactions." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMC206/document.

Full text
Abstract:
Nous modélisons une chaîne de traitement de documents comme un processus de décision markovien, et nous utilisons l’apprentissage par renforcement afin de permettre à l’agent d’apprendre à construire des chaînes adaptées à la volée, et de les améliorer en continu. Nous construisons une plateforme qui nous permet de mesurer l’impact sur l’apprentissage de divers modèles, services web, algorithmes, paramètres, etc. Nous l’appliquons dans un contexte industriel, spécifiquement à une chaîne visant à extraire des événements dans des volumes massifs de documents provenant de pages web et d’autres so
APA, Harvard, Vancouver, ISO, and other styles
6

Rodrigues, Bernardo de Simas Gaspar. "Open-source intelligence em sistemas SIEM." Master's thesis, 2015. http://hdl.handle.net/10451/20145.

Full text
Abstract:
Tese de mestrado, Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2015<br>A OSINT é uma interminável fonte de informação valiosa, em qualquer que seja o contexto, no qual exista a necessidade de lidar com ameaças humanas e imprevisíveis. A segurança informática não é excepção a esta regra e o uso de informação proveniente de canais OSINT tem-se, como temos vindo a observar com o advento da Threat Intelligence, firmado como um componente fundamental. Propomo-nos, com este trabalho, a integrar este canal de valioso conhecimento no SIEM (um paradigma também indispensável da
APA, Harvard, Vancouver, ISO, and other styles
7

Azevedo, Rui Correia Neves Cordeiro de. "Leveraging OSINT to improve threat intelligence quality." Master's thesis, 2019. http://hdl.handle.net/10451/37202.

Full text
Abstract:
Tese de mestrado, Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2019<br>The Impact of cyber-attacks and its cost has become a top priority for most organizations. To more aptly protect themselves, organizations are moving from reactive to proactive defensive measures, investing in cyber threat intelligence (CTI) to provide them forewarning about the risks they face, as well as to accelerate their response times in the detection of attacks. One means to obtain CTI is the collection of open source intelligence (OSINT) feeds via threat intelligence platforms and their rep
APA, Harvard, Vancouver, ISO, and other styles
8

Starr, Colter Roy. "Considerations for open source intelligence through the lens of information and communication technology." 2013. http://hdl.handle.net/2152/22697.

Full text
Abstract:
Open source intelligence (OSINT) has always been strongly tied to the information and communication technology (ICT) of the day. This paper is an examination of the current state of OSINT as it relates to ICTs by looking at overarching problems that exist across multiple types of collection methods, as well as looking at specific cases where there are issues, such as China and the Middle East, and ending with some minor recommendations on how to fix or minimize the issues highlighted.<br>text
APA, Harvard, Vancouver, ISO, and other styles
9

Duvenage, Petrus Carolus. "Open-source environmental scanning and risk assessment in the statutory counterespionage milieu." Thesis, 2011. http://hdl.handle.net/2263/30840.

Full text
Abstract:
The research focuses on the utilisation of open-source information in augmentation of the all-source counterespionage endeavour. The study has the principal objective of designing, contextualising and elucidating a micro-theoretical framework for open-source environmental scanning within the civilian, statutory counterespionage sphere. The research is underpinned by the central assumption that the environmental scanning and the contextual analysis of overt information will enable the identification, description and prioritisation of espionage risks that would not necessarily have emerg
APA, Harvard, Vancouver, ISO, and other styles
10

Martins, Cláudio Dinis Neves. "Generating Threat Intelligence based on OSINT and a Cyber Threat Unified Taxonomy." Master's thesis, 2020. http://hdl.handle.net/10451/45122.

Full text
Abstract:
Tese de mestrado em Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2020<br>As ameaças cibernéticas atuais utilizam múltiplos meios de propagação, tais como a engenharia social, vulnerabilidades de e-mail e aplicações e, muitas vezes, operam em diferentes fases, tais como o comprometimento de um único dispositivo, o movimento lateral na rede e a exfiltração de dados. Estas ameaças são complexas e dependem de táticas bem avançadas, por forma a passarem despercebidas nas defesas de segurança tradicionais, como por exemplo firewalls. Um tipo de ameaças que tem tido um impact
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Open-Source intelligence (OSInt)"

1

Automating Open Source Intelligence: Algorithms for OSINT. Elsevier Science & Technology Books, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Williams, Heather, and Ilana Blum. Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise. RAND Corporation, 2018. http://dx.doi.org/10.7249/rr1964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

OSINT: A Hacker's Guide to Open Source Intelligence Gathering for Digital Investigations. Wiley & Sons, Incorporated, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kubecka, Chris. Down the Rabbit Hole An OSINT Journey: Open Source Intelligence Gathering for Penetration Testing. Chris Kubecka, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Open-Source intelligence (OSInt)"

1

Day, Tony, Helen Gibson, and Steve Ramwell. "Fusion of OSINT and Non-OSINT Data." In Open Source Intelligence Investigation. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47671-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Revell, Quentin, Tom Smith, and Robert Stacey. "Tools for OSINT-Based Investigations." In Open Source Intelligence Investigation. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47671-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kalpakis, George, Theodora Tsikrika, Neil Cunningham, et al. "OSINT and the Dark Web." In Open Source Intelligence Investigation. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47671-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tabatabaei, Fahimeh, and Douglas Wells. "OSINT in the Context of Cyber-Security." In Open Source Intelligence Investigation. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47671-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wells, Douglas. "Taking Stock of Subjective Narratives Surrounding Modern OSINT." In Open Source Intelligence Investigation. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47671-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gibson, Helen. "Acquisition and Preparation of Data for OSINT Investigations." In Open Source Intelligence Investigation. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47671-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Marzell, Laurence. "OSINT as Part of the Strategic National Security Landscape." In Open Source Intelligence Investigation. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47671-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Akhgar, Babak. "OSINT as an Integral Part of the National Security Apparatus." In Open Source Intelligence Investigation. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47671-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

William Wong, B. L. "Fluidity and Rigour: Addressing the Design Considerations for OSINT Tools and Processes." In Open Source Intelligence Investigation. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47671-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Quick, Darren, and Kim-Kwang Raymond Choo. "Digital Forensic Data and Open Source Intelligence (DFINT+OSINT)." In SpringerBriefs on Cyber Security Systems and Networks. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0263-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Open-Source intelligence (OSInt)"

1

Dokman, Tomislav, and Tomislav Ivanjko. "Open Source Intelligence (OSINT): issues and trends." In 7th International Conference The Future of Information Sciences INFuture2019: Knowledge in the Digital Age. Faculty of Humanities and Social Sciences, University of Zagreb Department of Information and Communication Sciences, FF press, 2020. http://dx.doi.org/10.17234/infuture.2019.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

DiBona, Phil, Hillary Holloway, and Jorge Tierno. "Hypothesis management for open source intelligence (OSINT) with the Sensemaking for OSINT eXploitation (SOX) tool (Conference Presentation)." In Next-Generation Analyst VI, edited by James Llinas and Timothy P. Hanratty. SPIE, 2018. http://dx.doi.org/10.1117/12.2304031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pfeiffer, Mark, Marco Avila, Gerhard Backfried, Norbert Pfannerer, and Juergen Riedler. "Next Generation Data Fusion Open Source Intelligence (OSINT) System Based on MPEG7." In 2008 IEEE Conference on Technologies for Homeland Security. IEEE, 2008. http://dx.doi.org/10.1109/ths.2008.4534420.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Open-Source intelligence (OSInt)"

1

Hannas, William, and Huey-Meei Chang. China’s STI Operations: Monitoring Foreign Science and Technology Through Open Sources. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20200049.

Full text
Abstract:
Open source intelligence (OSINT) and science and technology intelligence (STI) are realized differently in the United States and China, China putting greater value on both. In the United States’ understanding, OSINT “enables” classified reporting, while in China it is the intelligence of first resort. This contrast extends to STI which has a lower priority in the U.S. system, whereas China and its top leaders personally lavish great attention on STI and rely on it for national decisions. Establishing a “National S&amp;T Analysis Center” within the U.S. government could help to address these ch
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!