Skip to main content

OSINT in the Context of Cyber-Security

  • Chapter
  • First Online:

Abstract

The impact of cyber-crime has necessitated intelligence and law enforcement agencies across the world to tackle cyber threats. All sectors are now facing similar dilemmas of how to best mitigate against cyber-crime and how to promote security effectively to people and organizations. Extracting unique and high value intelligence by harvesting public records to create a comprehensive profile of certain targets is emerging rapidly as an important means for the intelligence community. As the amount of available open sources rapidly increases, countering cyber-crime increasingly depends upon advanced software tools and techniques to collect and process the information in an effective and efficient manner. This chapter reviews current efforts of employing open source data for cyber-criminal investigations developing an integrative OSINT Cybercrime Investigation Framework.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    PricewaterhouseCoopers.

  2. 2.

    In this chapter, the terms computer crime, internet crime, online crimes, hi-tech crimes, information technology crime and cyber-crimes are being used interchangeably.

  3. 3.

    White-collar crime is financial crime committed by upper class members of society for personal or organizational gain. White-collar criminals are individuals who tend to be wealthy, highly educated, and socially connected, and they are typically employed by and in legitimate organizations..

References

  • Adeva JJG, Atxa JMP (2007) Intrusion detection in web applications using text mining. Eng Appl Artif Intell 20:555–566

    Article  Google Scholar 

  • Agarwal VK, Garg SK, Kapil M, Sinha D (2014) Cyber crime investigations in India: rendering knowledge from the past to address the future. ICT and critical infrastructure: proceedings of the 48th annual convention of CSI, vol 2, Springer International Publishing Switzerland, pp. 593–600. doi:10.1007/978-3-319-03095-1_64

    Google Scholar 

  • Ames DP, Horsburgh JS, Cao Y, Kadlec J, Whiteaker T, Valentine D (2012) Hydro desktop: web services-based software for hydrologic data discovery, download, visualization, and analysis. Environ Model Software 37:146–156

    Google Scholar 

  • Ansari AQ, Patki T, Patki AB, Kumar V (2007) Integrating fuzzy logic and data mining: impact on cyber security. Fourth international conference on fuzzy systems and knowledge discovery (FSKD 2007). IEEE Computer Society

    Google Scholar 

  • Appel EJ (2011) Behavior and technology, Internet Searches for Vetting, Investigations, and Open-Source Intelligence. Taylor and Fransic Group, pp. 3–17. ISBN 978-1-4398-2751-2

    Google Scholar 

  • Boncella RJ (2003) Competitive intelligence and the web. Commun AIS 12:327–340

    Google Scholar 

  • Bradbury D (2011) In plain view: open source intelligence. Comput Fraud Secur 5–9

    Google Scholar 

  • Brantingham PL (2011) Computational Criminology. 2011 European intelligence and security informatic conference. IEEE Computer Society. doi:10.1109/EISIC.2011.79

  • Burden K, Palmer C (2003) Internet crime: cyber crime—A new breed of criminal? Comput Law Secur Rep 19(3):222–227

    Article  Google Scholar 

  • Buneman P, Khanna S, Chiew Tan W (2000) Data provenance: some basic issues. University of pennsylvania scholarly commons. Retrieved from http://repository.upenn.edu/cgi/viewcontent.cgi?article=1210&context=cis_papers

  • Burwell HP (2004) Online competitive intelligence: increase your profits using cyber-intelligence. Facts on Demand Press, Tempe, AZ

    Google Scholar 

  • Chauhan S, Panda K (2015) Open source intelligence and advanced social media search. Hacking web intelligence open source intelligence and web reconnaissance concepts and techniques. Elsevier, pp. 15–32. ISBN: 978-0-12-801867-5

    Google Scholar 

  • Chauhan S, Panda K (2015) Understanding browsers and beyond. Hacking web intelligence open source intelligence and web reconnaissance concepts and techniques. Elsevier, pp. 33–52. ISBN: 978-0-12-801867-5

    Google Scholar 

  • Chen A, Gao Sh, Karampelas P, Alhajj R, Rokne J (2011) Finding hidden links in terrorist networks by checking indirect links of different sub-networks. In: Kock Wiil U (ed) Counterterrorism and open source intelligence. Springer Vienna, pp. 143–158. doi:10.1007/978-3-7091-0388-3_8

    Google Scholar 

  • Chen H, Chiang RHL, Storey VC (2012) Business intelligence and analytics: from big data to big impact. Bus Intell Res 36(4):1–24

    Google Scholar 

  • Chen LP, Zhang CY (2014) Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Inform Sci 314–347

    Google Scholar 

  • Chertoff M, Simon T (2015) The impact of the dark web on internet governance and cyber security. Global Commission on Internet Governance. No. 6

    Google Scholar 

  • Chonka A, Xiang Y, Zhou W, Bonti A (2011) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Comput Appl 34:1097–1107

    Article  Google Scholar 

  • Clark RM (2004) Intelligence analysis: a target-centric approach. CQ Press, Washington, DC

    Google Scholar 

  • Danowski JA (2011) Counterterrorism mining for individuals semantically-similar to watchlist members. In: Kock Wiil U (ed) Counterterrorism and open source intelligence. Springer Berlin Heidelberg, pp. 223–247. doi:10.1007/978-3-7091-0388-3_12

    Google Scholar 

  • Dou L, Cao G, Morris PJ, Morris RA, Ludäscher B, Macklin JA, Hanken J (2012) Kurator: a Kepler package for data curation workflows. International Conference on Computational Science, ICCS 2012, Procedia Computer Science, vol 9, pp. 1614–1619. doi:10.1016/j.procs.2012.04.177

    Google Scholar 

  • Enbody R, Soodo A (2014) Intelligence gathering. Elsevier Inc, Targeted cyber attacks. ISBN 9780128006047

    Google Scholar 

  • Fallah M (2010). A puzzle-based defence strategy against flooding attacks using game theory. IEEE Trans Dependable Secure Comput 7:5–19

    Google Scholar 

  • FlashPoint (2015) Illuminating The Deep & Dark Web: the next Frontier in Comprehensive IT Security. FlashPoint

    Google Scholar 

  • Fleisher C (2008) OSINT: its implications for business/competitive intelligence analysis and analysts. Inteligencia Y Seguridad 4:115–141

    Google Scholar 

  • Ghel R (2014) Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network. New media and society

    Google Scholar 

  • Google 2014 Learn about Sitemaps. ps://support.google.com/webmasters/answer/156184?hl=en

    Google Scholar 

  • Gottschalk P (2010) White-collar crome: detection, prevention and strategy in business enterprises. Universal-Publishers, Boca Raton, Florida, USA. ISBN-10: 1599428393, ISBN-13: 9781599428390

    Google Scholar 

  • Gottschalk P, Filstad C, Glomseth R, Solli-Sæther H (2011) Information management for investigation and prevention of white-collar crime. Int J Inf Manage 31:226–233

    Article  Google Scholar 

  • Govil J, Govil J (2007) Ramifications of cyber crime and suggestive preventive measures. Electro/information technology. Chicago, pp 610–615. IEEE. doi:10.1109/EIT.2007.4374526

  • Gregory M, Glance D (2013) Cyber-crime, cyber security and cyber warfare. Security and networked society. Springer, pp 51–95. ISBN: 978-3-319-02389-2

    Google Scholar 

  • Harvey C (2012) 50 top open source tools for big data. Retrieved 01 July 2015, from http://www.datamation.com/data-center/50-top-open-source-tools-for-big-data-1(2,3).html

  • He P, Karabatis G (2012) Using semantic networks to counter cyber threats. IEEE. doi:10.1109/ISI.2012.6284294

    Google Scholar 

  • Hobbs Ch, Morgan M, Salisbury D (2014) Open source intelligence in the twenty-first century. Palgrave, pp. 1–6. ISBN 978-0-230-00216-6

    Google Scholar 

  • Hoque N, Bhuyan H, Baishya RC, Bhattacharyya DK, Kalita JKV (2014) Network attacks: taxonomy, tools and systems. J Netw Comput Appl 40:307–324. doi:10.1016/j.jnca.2013.08.001

    Article  Google Scholar 

  • Igbal F, Fung BCM, Debbabi M (2012) Mining criminal networks from chat log. 2012 IEEE/WIC/ACM international conferences on web intelligence and intelligent agent technology. Macau, pp. 332–337. IEEE. doi:10.1109/WI-IAT.2012.68

  • Iqbal F, Binsalleeh H, Fung BCM, Debbabi M (2013) A unified data mining solution for authorship analysis in anonymous textual communications. Inf Sci 231:98–112

    Article  Google Scholar 

  • Jahankhani H, Al-Nemrat A, Hosseinian-Far A (2014) Cybercrime classification and characteristics. In: Akhgar B, Staniforth A, Bosco F (eds.) Cyber crime and cyber terrorism investigators’ handbook. Elsevier Inc., pp. 149–164. doi:10.1016/B978-0-12-800743-3.00012-8

    Google Scholar 

  • Kang MJ (2012) Intelligence in the internet age: the emergence and evolution of Open Source Intelligence (OSINT). Comput Hum Behav 28:673–682. doi:10.1016/j.chb.2011.11.014

    Article  Google Scholar 

  • Kim W, Jeong OR, Kim Ch, So J (2011) The dark side of the Internet: attacks, costs and responses. Inform Syst 36:675–705

    Article  Google Scholar 

  • Kapow Software (2013) http://www.kofax.com/go/kapow/wp-building-your-osint-capability. Retrieved from http://www.kofax.com: http://www.kofax.com/go/kapow/wp-building-your-osint-capability

  • Katos V, Bednar PM (2008) A cyber-crime investigation framework. Comput Stand Interfaces 30:223–228. doi:10.1016/j.csi.2007.10.003

    Article  Google Scholar 

  • Koops BJ, Hoepman JH, Leenes R (2013) Open-source intelligence and privacy by design. Computer Law and Security Review. 2(9):676–688

    Article  Google Scholar 

  • Kshetri N (2005) Pattern of global cyber war and crime: a conceptual framework. J Int Manage 11:541–562

    Article  Google Scholar 

  • Koester B, Schmidt SB (2009) Information superiority via formal concept analysis. In. Argamon S, Howard N (eds) Computational methods for counterterrorism. Springer, pp. 143–171. doi:10.1007/978-3-642-01141-2_9

    Google Scholar 

  • Kock Wiil U, Gniadek J, Memon N (2011) Retraction note to: a novel method to analyze the importance of links in terrorist networks. In: Wiil UK (ed) Counterterrorism and open source intelligence. Springer Vienna, p. E1. doi:10.1007/978-3-7091-0388-3_22

    Google Scholar 

  • Lagazio M, Sherif N, Cushman M (2015) A multi-level approach to understanding the impact of cyber crime on the financial sector. Comput Secur 45:58–74

    Article  Google Scholar 

  • Li J, Li N, Wang X, Yu T (2009) Denial of service attacks and defenses in decentralized trust management. Int J Inf Secur 8:89–101. Springer

    Google Scholar 

  • Lindelauf R, Borm P, Hamers H (2011) Understanding terrorist network topologies and their resilience against disruption. In: Kock Wiil U (ed.) Counterterrorism and open source intelligence. Springer, Vienna, pp 61–72. doi:10.1007/978-3-7091-0388-3_5

    Google Scholar 

  • Loshin D (2015) How big data analytics tools can help your organization. Retrieved from http://searchbusinessanalytics.techtarget.com/feature/How-big-data-analytics-tools-can-help-your-organization

  • Matusitz J (2009) A postmodern theory of cyberterrorism: game theory. Inform Secur J: Glob Perspect 18:273–281. Taylor and Francis. doi:10.1080/19393550903200474

    Google Scholar 

  • Mukhopadhyay A, Chatterjee S, Saha D, Mahanti A, Sadhukhan SK (2013) Cyber-risk decision models: To insure IT or not? Decis Support Syst 56:11–26. Retrieved from http://dx.doi.org/10.1016/j.dss.2013.04.004

    Google Scholar 

  • Nykodym N, Taylor R, Vilela J (2005) Criminal profiling and insider cyber crime. Digital Invest 2:261–267. Elsevier

    Google Scholar 

  • Omand D, Miller C, Bartlett J (2014) Towards the discipline of social media intelligence (2014). In: Hobbs, Morgan, Salisbury (eds.) Open source intelligence in the twenty-first century. Palgrave, 24–44. ISBN 978-0-230-00216-6

    Google Scholar 

  • Petersen RR, Rhodes CJ, Kock Wiil U (2011) Node removal in criminal networks. 2011 European intelligence and security informatics conference. IEEE Computer Society, pp. 360–365.

    Google Scholar 

  • PWC cyber security (2015) https://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2015-us-cybercrime-survey.pdf. Retrieved from http://www.pwc.com/cybersecurity

  • Simmons C, Ellis C, Shiva S, Dasgupta D, Wu Q (2014) AVOIDIT: a cyber attack taxonomy. Annual symposium on information assurance. Office of Naval Research (ONR).

    Google Scholar 

  • Song J (2011) The analysis of military intelligence early warning based on open source intelligence. Int Conf Intell Secur Inform (ISI). p. 226. IEEE

    Google Scholar 

  • Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoric defence framework against DoS/DDoS cyber attacks. Comput Secur 38:39–50

    Article  Google Scholar 

  • Staniforth A (2014) Police investigation processes: practical tools and techniques for tackling cyber crime. In: Akhgar B (ed.) Cyber crime and cyber terrorism investigator’s handbook. Elsevier, pp. 31–42

    Google Scholar 

  • Srihari RK (2009) Unapparent information revelation: text mining for counterterrorism. In: Argamon S, Howard N (eds) Computational methods for counterterrorism. Springer, Berlin Heidelberg, pp 67–87

    Chapter  Google Scholar 

  • Steele RD (2006) Open source intelligence. In Johnson LK (ed.) Strategic intelligence: understanding the hidden side of government (intelligence and the quest for security). Praeger, pp. 95–116

    Google Scholar 

  • Sui D, Cavarlee J, Rudesill D (2015) The deep web and the darknet: a look inside the internet’s massive black box. Wilson Center, Washington

    Google Scholar 

  • Szomszor M, Moreau L (2003) Recording and reasoning over data provenance in web and grid services. On the move to meaningful internet systems, pp. 603–620.

    Google Scholar 

  • Tilmes C, Yesha Ye, Halem M (2010) Distinguishing provenance equivalence of earth science data. Int Conf Comput Sci (ICCS). p. 1–9

    Google Scholar 

  • Vitolo C, Elkhatib Y, Reusser D, Macleod CJA, Buytaert W (2015) Web technologies for environmental Big Data. Environ Model Softw 63:185–198

    Google Scholar 

  • Wall DS (2005) The internet as a conduit for criminal activity. In: Pattavina A (ed) Information technology and the criminal justice system. Sage Publications, USA. ISBN 0-7619-3019-1

    Google Scholar 

  • Wall DS (2007) Hunting shooting, and phishing: new cybercrime challenges for cybercanadians in the 21st century. The ECCLES centre for american studies

    Google Scholar 

  • Wall DS (2008) Hunting shooting, and phishing: new cybercrime challenges for cyber canadians in the 21st Century. The Eccles Centre for American Studies. www.bl.uk/ecclescentre. The British Library Publication

  • Wang SJ (2007) Measures of retaining digital evidence to prosecute computer-based cyber-crimes. Comput Stand Interfaces 29:216–223. Elsevier

    Google Scholar 

  • Webopedia.com. (n.d.). Webopedia.com

  • Wu J, Zhang L, Qu S (2010) A comparative study for fast-flux service networks detection. Netw Comput Adv Inf Manage (NCM). pp 346–350. IEEE

    Google Scholar 

  • Yuan T, Chen P (2012) Data mining applications in E-Government information security, 2012 international workshop on information and electronics engineering (IWIEE). Proc Eng 29:235–240

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fahimeh Tabatabaei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this chapter

Cite this chapter

Tabatabaei, F., Wells, D. (2016). OSINT in the Context of Cyber-Security. In: Akhgar, B., Bayerl, P., Sampson, F. (eds) Open Source Intelligence Investigation. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-47671-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47671-1_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47670-4

  • Online ISBN: 978-3-319-47671-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics