Results 61 to 70 of about 4,943 (194)

Az OSINT határai

open access: yesNemzetbiztonsági szemle, 2019
The open source intelligence gathering has been a useful tool earlier, but the information revolution, the world wide web and the social media made it more essential. Meanwhile this opportunity includes many dangers and limits which the users may not be aware of. These few thoughts below could contribute to the raising of the awareness of those dangers
openaire   +1 more source

WHAT IS REALLY “OPEN SOURCE INTELLIGENCE”? A CONCEPTUAL ANALYSIS OF THE DIFFERENT NOTIONS OF OSINT [PDF]

open access: yesRomanian Intelligence Studies Review
The recent Ukrainian conflict has spurred innovative uses of Open Source Intelligence (OSINT) and nurtured several academic articles on the topic. It is just the last example of an overall rapid evolution of OSINT since the emergence of the Internet in ...
Ainara BORDES PEREZ
doaj  

Zainteresowanie CIA krajami postradzieckimi z perspektywy zasobów globalnego Internetu [PDF]

open access: yesPrzegląd Geopolityczny, 2022
The activities of the secret services are a difficult subject of research due to the secrecy of information. However, there is an indirect way to obtain data on the activities of the secret services, namely through white intelligence (OSINT).
Jan A. Wendt
doaj  

Critical success factors for OSINT Driven Situational Awareness [PDF]

open access: yes, 2018
A critical element of successful intelligence-led law enforcement operations is the ability of the police and other security services to obtain timely, reliable and actionable intelligence concerning the problem, incident or investigation under focus. As
Akhgar, Babak, Wells, Douglas
core  

Privacy in public spaces: what expectations of privacy do we have in social media intelligence? [PDF]

open access: yes, 2015
In this paper we give an introduction to the transition in contemporary surveillance from top down traditional police surveillance to profiling and “pre-crime” methods.
Edwards, Lilian, Urquhart, Lachlan
core   +3 more sources

Intelligence in international society: An English school perspective on the ‘five eyes’

open access: yesGlobal Policy, Volume 15, Issue 2, Page 223-233, May 2024.
Abstract Despite the recent prominence of intelligence in post‐Ukraine global policy, it is a Cinderella in international relations studies. Using English School (ES) theorisation, we locate intelligence within the constellation of primary and secondary institutions in international society.
Robert Schuett, John Williams
wiley   +1 more source

Інструменти OSINT: фіксація воєнних злочинів в Україні

open access: yesАналітично-порівняльне правознавство
Стаття присвячена аналізу інструментів OSINT (розвідки з відкритих джерел) та їх застосування, як перспективного інструменту моніторингу фіксації воєнних злочинів в контексті забезпечення національної безпеки.
M. G. Toma, O. V. Vasylova
doaj   +1 more source

Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2019
Son yıllarda siber suçun gittikçe büyüyen etkisi, siber tehditlerin üstesinden gelmek için dünya çapında istihbaratve kanun uygulayıcı kurumlar ortaya çıkartmıştır.
Ali Eksim, Mustafa Kara
doaj   +1 more source

An NLP‐Based Framework to Spot Extremist Networks in Social Media

open access: yesComplexity, Volume 2024, Issue 1, 2024.
Governments and law enforcement agencies (LEAs) are increasingly concerned about growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism, and cyberwarfare. In the particular context of cyberterrorism, hostile social manipulation (HSM) represents a strategy that employs different manipulation methods, mostly through
Andrés Zapata Rozo   +5 more
wiley   +1 more source

Analysis of modern systems for information from users of social networks [PDF]

open access: yes, 2016
This paper summarizes different approaches to collecting road traffic information from second-generation cellular systems (GSM) and point out the possibilities that arise when third generation systems (UMTS) are used.
Drapak, R., Драпак, Р. І.
core   +2 more sources

Home - About - Disclaimer - Privacy