Abstract
While the internet and online social networks have positively enriched societal communications and economic opportunities, these technological advancements have changed—and continue to change—the very nature of crime, serving to breed a new sophisticated and technically capable criminal. Furthermore, the borderless nature of the phenomenon of cybercrime and the transnational dimensions of human trafficking, drugs importation and the illegal movement of firearms, cash and stolen goods means that criminals can plan their crimes from jurisdictions across the world, making law enforcement particularly challenging, the very reason why LEAs must maximise the potential of OSINT and seek new and innovative ways to prevent crime. Hence, it is essential for all practitioners, policy-makers and policing professionals to understand what OSINT is and what it is not, how it can be used and the limitations or conditions on it, as well as understanding more about the scale, scope and complexity of the threats from criminals whose methods of operating are becoming increasingly sophisticated. The purpose of this chapter is to explain the role and function of OSINT within the context of policing and existing intelligence collection disciplines, as well as to define OSINT from an LEA perspective and describe its position within the intelligence profession of policing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Federal Bureau of Investigation, Intelligence Branch, Intelligence Collection Disciplines https://www.fbi.gov/about-us/intelligence/disciplines.
- 2.
Federal Bureau of Investigation, Intelligence Branch, Intelligence Collection Disciplines https://www.fbi.gov/about-us/intelligence/disciplines.
- 3.
Federal Bureau of Investigation, Intelligence Branch, Intelligence Collection Disciplines https://www.fbi.gov/about-us/intelligence/disciplines.
References
Brown SD (ed) (2008) Combating international crime: the longer arm of the law. Routledge
Centrex ACPO (2005) Guidance on the national intelligence model. Wyboston: Centrex/NCPE (available online at www.acpo.police.uk/asp/policies/Data/nim2005.pdf)
Cook T, Hibbitt S, Hill M (2013) Blackstone’s crime investigator’s handbook. Oxford University Press, Oxford
Cope N (2004) Intelligence led policing or policing led intelligence? ’Integrating volume crime analysis into policing. B J Criminol 44(2):188–203
Harfield C, Harfield K (2008) Intelligence: investigation, community and partnership. OUP Oxford, Oxford
Innes M, Fielding N, Cope N (2005) The appliance of science? The theory and practice of crime intelligence analysis. Br J Criminol 45(1):39–57
Kleiven ME (2007) Where’s the intelligence in the national intelligence model? Int J Police Sci Manage 9(3):257–273
Ratcliffe JH (2010) Intelligence-led policing: anticipating risk and influencing action intelligence
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this chapter
Cite this chapter
Staniforth, A. (2016). Police Use of Open Source Intelligence: The Longer Arm of Law. In: Akhgar, B., Bayerl, P., Sampson, F. (eds) Open Source Intelligence Investigation. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-47671-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-47671-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47670-4
Online ISBN: 978-3-319-47671-1
eBook Packages: Computer ScienceComputer Science (R0)