OSINT | part of Practical Cyber Intelligence: A Hands-on Guide to Digital Forensics | Wiley Data and Cybersecurity books | IEEE Xplore

Chapter Abstract:

Summary Open‐source intelligence (OSINT) is pivotal in modern investigations, encompassing the collection, processing, and analysis of publicly available information. The...Show More

Chapter Abstract:

Summary

Open‐source intelligence (OSINT) is pivotal in modern investigations, encompassing the collection, processing, and analysis of publicly available information. The boundary of "publicly available" is debated‐does a $5 data access fee still fall under OSINT? The surge in internet data underscores OSINT's significance, aiding diverse investigations such as user profiling. Effective OSINT hinges on a well‐defined Request for Information (RFI), considering the dynamic nature of online data. This article explores the OSINT methodology's planning, collection, and analysis phases, emphasizing meticulous documentation. It highlights resources such as username search, search for network‐connected devices, securing oneself through Operational Security (OPSEC) is imperative, involving virtual environments, VPNs, strong passwords, and avoiding information reuse. Search engines play a pivotal role, with Google's operators detailed, along with specialized engines like Bing, Tineye, and Shodan. Profiling involves scrutinizing usernames, emails, and conducting threat profiling. Tools like Epieos for email investigations, leveraging the "forgot password" feature.

Page(s): 177 - 209
Copyright Year: 2024
Edition: 1
ISBN Information:

Contact IEEE to Subscribe