Results 61 to 70 of about 4,943 (194)
The open source intelligence gathering has been a useful tool earlier, but the information revolution, the world wide web and the social media made it more essential. Meanwhile this opportunity includes many dangers and limits which the users may not be aware of. These few thoughts below could contribute to the raising of the awareness of those dangers
openaire +1 more source
WHAT IS REALLY “OPEN SOURCE INTELLIGENCE”? A CONCEPTUAL ANALYSIS OF THE DIFFERENT NOTIONS OF OSINT [PDF]
The recent Ukrainian conflict has spurred innovative uses of Open Source Intelligence (OSINT) and nurtured several academic articles on the topic. It is just the last example of an overall rapid evolution of OSINT since the emergence of the Internet in ...
Ainara BORDES PEREZ
doaj
Zainteresowanie CIA krajami postradzieckimi z perspektywy zasobów globalnego Internetu [PDF]
The activities of the secret services are a difficult subject of research due to the secrecy of information. However, there is an indirect way to obtain data on the activities of the secret services, namely through white intelligence (OSINT).
Jan A. Wendt
doaj
Critical success factors for OSINT Driven Situational Awareness [PDF]
A critical element of successful intelligence-led law enforcement operations is the ability of the police and other security services to obtain timely, reliable and actionable intelligence concerning the problem, incident or investigation under focus. As
Akhgar, Babak, Wells, Douglas
core
Privacy in public spaces: what expectations of privacy do we have in social media intelligence? [PDF]
In this paper we give an introduction to the transition in contemporary surveillance from top down traditional police surveillance to profiling and “pre-crime” methods.
Edwards, Lilian, Urquhart, Lachlan
core +3 more sources
Intelligence in international society: An English school perspective on the ‘five eyes’
Abstract Despite the recent prominence of intelligence in post‐Ukraine global policy, it is a Cinderella in international relations studies. Using English School (ES) theorisation, we locate intelligence within the constellation of primary and secondary institutions in international society.
Robert Schuett, John Williams
wiley +1 more source
Інструменти OSINT: фіксація воєнних злочинів в Україні
Стаття присвячена аналізу інструментів OSINT (розвідки з відкритих джерел) та їх застосування, як перспективного інструменту моніторингу фіксації воєнних злочинів в контексті забезпечення національної безпеки.
M. G. Toma, O. V. Vasylova
doaj +1 more source
Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri
Son yıllarda siber suçun gittikçe büyüyen etkisi, siber tehditlerin üstesinden gelmek için dünya çapında istihbaratve kanun uygulayıcı kurumlar ortaya çıkartmıştır.
Ali Eksim, Mustafa Kara
doaj +1 more source
An NLP‐Based Framework to Spot Extremist Networks in Social Media
Governments and law enforcement agencies (LEAs) are increasingly concerned about growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism, and cyberwarfare. In the particular context of cyberterrorism, hostile social manipulation (HSM) represents a strategy that employs different manipulation methods, mostly through
Andrés Zapata Rozo +5 more
wiley +1 more source
Analysis of modern systems for information from users of social networks [PDF]
This paper summarizes different approaches to collecting road traffic information from second-generation cellular systems (GSM) and point out the possibilities that arise when third generation systems (UMTS) are used.
Drapak, R., Драпак, Р. І.
core +2 more sources

