Abstract
The impact of cyber-crime has necessitated intelligence and law enforcement agencies across the world to tackle cyber threats. All sectors are now facing similar dilemmas of how to best mitigate against cyber-crime and how to promote security effectively to people and organizations. Extracting unique and high value intelligence by harvesting public records to create a comprehensive profile of certain targets is emerging rapidly as an important means for the intelligence community. As the amount of available open sources rapidly increases, countering cyber-crime increasingly depends upon advanced software tools and techniques to collect and process the information in an effective and efficient manner. This chapter reviews current efforts of employing open source data for cyber-criminal investigations developing an integrative OSINT Cybercrime Investigation Framework.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
PricewaterhouseCoopers.
- 2.
In this chapter, the terms computer crime, internet crime, online crimes, hi-tech crimes, information technology crime and cyber-crimes are being used interchangeably.
- 3.
White-collar crime is financial crime committed by upper class members of society for personal or organizational gain. White-collar criminals are individuals who tend to be wealthy, highly educated, and socially connected, and they are typically employed by and in legitimate organizations..
References
Adeva JJG, Atxa JMP (2007) Intrusion detection in web applications using text mining. Eng Appl Artif Intell 20:555–566
Agarwal VK, Garg SK, Kapil M, Sinha D (2014) Cyber crime investigations in India: rendering knowledge from the past to address the future. ICT and critical infrastructure: proceedings of the 48th annual convention of CSI, vol 2, Springer International Publishing Switzerland, pp. 593–600. doi:10.1007/978-3-319-03095-1_64
Ames DP, Horsburgh JS, Cao Y, Kadlec J, Whiteaker T, Valentine D (2012) Hydro desktop: web services-based software for hydrologic data discovery, download, visualization, and analysis. Environ Model Software 37:146–156
Ansari AQ, Patki T, Patki AB, Kumar V (2007) Integrating fuzzy logic and data mining: impact on cyber security. Fourth international conference on fuzzy systems and knowledge discovery (FSKD 2007). IEEE Computer Society
Appel EJ (2011) Behavior and technology, Internet Searches for Vetting, Investigations, and Open-Source Intelligence. Taylor and Fransic Group, pp. 3–17. ISBN 978-1-4398-2751-2
Boncella RJ (2003) Competitive intelligence and the web. Commun AIS 12:327–340
Bradbury D (2011) In plain view: open source intelligence. Comput Fraud Secur 5–9
Brantingham PL (2011) Computational Criminology. 2011 European intelligence and security informatic conference. IEEE Computer Society. doi:10.1109/EISIC.2011.79
Burden K, Palmer C (2003) Internet crime: cyber crime—A new breed of criminal? Comput Law Secur Rep 19(3):222–227
Buneman P, Khanna S, Chiew Tan W (2000) Data provenance: some basic issues. University of pennsylvania scholarly commons. Retrieved from http://repository.upenn.edu/cgi/viewcontent.cgi?article=1210&context=cis_papers
Burwell HP (2004) Online competitive intelligence: increase your profits using cyber-intelligence. Facts on Demand Press, Tempe, AZ
Chauhan S, Panda K (2015) Open source intelligence and advanced social media search. Hacking web intelligence open source intelligence and web reconnaissance concepts and techniques. Elsevier, pp. 15–32. ISBN: 978-0-12-801867-5
Chauhan S, Panda K (2015) Understanding browsers and beyond. Hacking web intelligence open source intelligence and web reconnaissance concepts and techniques. Elsevier, pp. 33–52. ISBN: 978-0-12-801867-5
Chen A, Gao Sh, Karampelas P, Alhajj R, Rokne J (2011) Finding hidden links in terrorist networks by checking indirect links of different sub-networks. In: Kock Wiil U (ed) Counterterrorism and open source intelligence. Springer Vienna, pp. 143–158. doi:10.1007/978-3-7091-0388-3_8
Chen H, Chiang RHL, Storey VC (2012) Business intelligence and analytics: from big data to big impact. Bus Intell Res 36(4):1–24
Chen LP, Zhang CY (2014) Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Inform Sci 314–347
Chertoff M, Simon T (2015) The impact of the dark web on internet governance and cyber security. Global Commission on Internet Governance. No. 6
Chonka A, Xiang Y, Zhou W, Bonti A (2011) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Comput Appl 34:1097–1107
Clark RM (2004) Intelligence analysis: a target-centric approach. CQ Press, Washington, DC
Danowski JA (2011) Counterterrorism mining for individuals semantically-similar to watchlist members. In: Kock Wiil U (ed) Counterterrorism and open source intelligence. Springer Berlin Heidelberg, pp. 223–247. doi:10.1007/978-3-7091-0388-3_12
Dou L, Cao G, Morris PJ, Morris RA, Ludäscher B, Macklin JA, Hanken J (2012) Kurator: a Kepler package for data curation workflows. International Conference on Computational Science, ICCS 2012, Procedia Computer Science, vol 9, pp. 1614–1619. doi:10.1016/j.procs.2012.04.177
Enbody R, Soodo A (2014) Intelligence gathering. Elsevier Inc, Targeted cyber attacks. ISBN 9780128006047
Fallah M (2010). A puzzle-based defence strategy against flooding attacks using game theory. IEEE Trans Dependable Secure Comput 7:5–19
FlashPoint (2015) Illuminating The Deep & Dark Web: the next Frontier in Comprehensive IT Security. FlashPoint
Fleisher C (2008) OSINT: its implications for business/competitive intelligence analysis and analysts. Inteligencia Y Seguridad 4:115–141
Ghel R (2014) Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network. New media and society
Google 2014 Learn about Sitemaps. ps://support.google.com/webmasters/answer/156184?hl=en
Gottschalk P (2010) White-collar crome: detection, prevention and strategy in business enterprises. Universal-Publishers, Boca Raton, Florida, USA. ISBN-10: 1599428393, ISBN-13: 9781599428390
Gottschalk P, Filstad C, Glomseth R, Solli-Sæther H (2011) Information management for investigation and prevention of white-collar crime. Int J Inf Manage 31:226–233
Govil J, Govil J (2007) Ramifications of cyber crime and suggestive preventive measures. Electro/information technology. Chicago, pp 610–615. IEEE. doi:10.1109/EIT.2007.4374526
Gregory M, Glance D (2013) Cyber-crime, cyber security and cyber warfare. Security and networked society. Springer, pp 51–95. ISBN: 978-3-319-02389-2
Harvey C (2012) 50 top open source tools for big data. Retrieved 01 July 2015, from http://www.datamation.com/data-center/50-top-open-source-tools-for-big-data-1(2,3).html
He P, Karabatis G (2012) Using semantic networks to counter cyber threats. IEEE. doi:10.1109/ISI.2012.6284294
Hobbs Ch, Morgan M, Salisbury D (2014) Open source intelligence in the twenty-first century. Palgrave, pp. 1–6. ISBN 978-0-230-00216-6
Hoque N, Bhuyan H, Baishya RC, Bhattacharyya DK, Kalita JKV (2014) Network attacks: taxonomy, tools and systems. J Netw Comput Appl 40:307–324. doi:10.1016/j.jnca.2013.08.001
Igbal F, Fung BCM, Debbabi M (2012) Mining criminal networks from chat log. 2012 IEEE/WIC/ACM international conferences on web intelligence and intelligent agent technology. Macau, pp. 332–337. IEEE. doi:10.1109/WI-IAT.2012.68
Iqbal F, Binsalleeh H, Fung BCM, Debbabi M (2013) A unified data mining solution for authorship analysis in anonymous textual communications. Inf Sci 231:98–112
Jahankhani H, Al-Nemrat A, Hosseinian-Far A (2014) Cybercrime classification and characteristics. In: Akhgar B, Staniforth A, Bosco F (eds.) Cyber crime and cyber terrorism investigators’ handbook. Elsevier Inc., pp. 149–164. doi:10.1016/B978-0-12-800743-3.00012-8
Kang MJ (2012) Intelligence in the internet age: the emergence and evolution of Open Source Intelligence (OSINT). Comput Hum Behav 28:673–682. doi:10.1016/j.chb.2011.11.014
Kim W, Jeong OR, Kim Ch, So J (2011) The dark side of the Internet: attacks, costs and responses. Inform Syst 36:675–705
Kapow Software (2013) http://www.kofax.com/go/kapow/wp-building-your-osint-capability. Retrieved from http://www.kofax.com: http://www.kofax.com/go/kapow/wp-building-your-osint-capability
Katos V, Bednar PM (2008) A cyber-crime investigation framework. Comput Stand Interfaces 30:223–228. doi:10.1016/j.csi.2007.10.003
Koops BJ, Hoepman JH, Leenes R (2013) Open-source intelligence and privacy by design. Computer Law and Security Review. 2(9):676–688
Kshetri N (2005) Pattern of global cyber war and crime: a conceptual framework. J Int Manage 11:541–562
Koester B, Schmidt SB (2009) Information superiority via formal concept analysis. In. Argamon S, Howard N (eds) Computational methods for counterterrorism. Springer, pp. 143–171. doi:10.1007/978-3-642-01141-2_9
Kock Wiil U, Gniadek J, Memon N (2011) Retraction note to: a novel method to analyze the importance of links in terrorist networks. In: Wiil UK (ed) Counterterrorism and open source intelligence. Springer Vienna, p. E1. doi:10.1007/978-3-7091-0388-3_22
Lagazio M, Sherif N, Cushman M (2015) A multi-level approach to understanding the impact of cyber crime on the financial sector. Comput Secur 45:58–74
Li J, Li N, Wang X, Yu T (2009) Denial of service attacks and defenses in decentralized trust management. Int J Inf Secur 8:89–101. Springer
Lindelauf R, Borm P, Hamers H (2011) Understanding terrorist network topologies and their resilience against disruption. In: Kock Wiil U (ed.) Counterterrorism and open source intelligence. Springer, Vienna, pp 61–72. doi:10.1007/978-3-7091-0388-3_5
Loshin D (2015) How big data analytics tools can help your organization. Retrieved from http://searchbusinessanalytics.techtarget.com/feature/How-big-data-analytics-tools-can-help-your-organization
Matusitz J (2009) A postmodern theory of cyberterrorism: game theory. Inform Secur J: Glob Perspect 18:273–281. Taylor and Francis. doi:10.1080/19393550903200474
Mukhopadhyay A, Chatterjee S, Saha D, Mahanti A, Sadhukhan SK (2013) Cyber-risk decision models: To insure IT or not? Decis Support Syst 56:11–26. Retrieved from http://dx.doi.org/10.1016/j.dss.2013.04.004
Nykodym N, Taylor R, Vilela J (2005) Criminal profiling and insider cyber crime. Digital Invest 2:261–267. Elsevier
Omand D, Miller C, Bartlett J (2014) Towards the discipline of social media intelligence (2014). In: Hobbs, Morgan, Salisbury (eds.) Open source intelligence in the twenty-first century. Palgrave, 24–44. ISBN 978-0-230-00216-6
Petersen RR, Rhodes CJ, Kock Wiil U (2011) Node removal in criminal networks. 2011 European intelligence and security informatics conference. IEEE Computer Society, pp. 360–365.
PWC cyber security (2015) https://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2015-us-cybercrime-survey.pdf. Retrieved from http://www.pwc.com/cybersecurity
Simmons C, Ellis C, Shiva S, Dasgupta D, Wu Q (2014) AVOIDIT: a cyber attack taxonomy. Annual symposium on information assurance. Office of Naval Research (ONR).
Song J (2011) The analysis of military intelligence early warning based on open source intelligence. Int Conf Intell Secur Inform (ISI). p. 226. IEEE
Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoric defence framework against DoS/DDoS cyber attacks. Comput Secur 38:39–50
Staniforth A (2014) Police investigation processes: practical tools and techniques for tackling cyber crime. In: Akhgar B (ed.) Cyber crime and cyber terrorism investigator’s handbook. Elsevier, pp. 31–42
Srihari RK (2009) Unapparent information revelation: text mining for counterterrorism. In: Argamon S, Howard N (eds) Computational methods for counterterrorism. Springer, Berlin Heidelberg, pp 67–87
Steele RD (2006) Open source intelligence. In Johnson LK (ed.) Strategic intelligence: understanding the hidden side of government (intelligence and the quest for security). Praeger, pp. 95–116
Sui D, Cavarlee J, Rudesill D (2015) The deep web and the darknet: a look inside the internet’s massive black box. Wilson Center, Washington
Szomszor M, Moreau L (2003) Recording and reasoning over data provenance in web and grid services. On the move to meaningful internet systems, pp. 603–620.
Tilmes C, Yesha Ye, Halem M (2010) Distinguishing provenance equivalence of earth science data. Int Conf Comput Sci (ICCS). p. 1–9
Vitolo C, Elkhatib Y, Reusser D, Macleod CJA, Buytaert W (2015) Web technologies for environmental Big Data. Environ Model Softw 63:185–198
Wall DS (2005) The internet as a conduit for criminal activity. In: Pattavina A (ed) Information technology and the criminal justice system. Sage Publications, USA. ISBN 0-7619-3019-1
Wall DS (2007) Hunting shooting, and phishing: new cybercrime challenges for cybercanadians in the 21st century. The ECCLES centre for american studies
Wall DS (2008) Hunting shooting, and phishing: new cybercrime challenges for cyber canadians in the 21st Century. The Eccles Centre for American Studies. www.bl.uk/ecclescentre. The British Library Publication
Wang SJ (2007) Measures of retaining digital evidence to prosecute computer-based cyber-crimes. Comput Stand Interfaces 29:216–223. Elsevier
Webopedia.com. (n.d.). Webopedia.com
Wu J, Zhang L, Qu S (2010) A comparative study for fast-flux service networks detection. Netw Comput Adv Inf Manage (NCM). pp 346–350. IEEE
Yuan T, Chen P (2012) Data mining applications in E-Government information security, 2012 international workshop on information and electronics engineering (IWIEE). Proc Eng 29:235–240
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this chapter
Cite this chapter
Tabatabaei, F., Wells, D. (2016). OSINT in the Context of Cyber-Security. In: Akhgar, B., Bayerl, P., Sampson, F. (eds) Open Source Intelligence Investigation. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-47671-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-47671-1_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47670-4
Online ISBN: 978-3-319-47671-1
eBook Packages: Computer ScienceComputer Science (R0)