Open source intelligence investigation : investigation from strategy to implementation /: investigation from strategy to implementation. (2016)
- Record Type:
- Book
- Title:
- Open source intelligence investigation : investigation from strategy to implementation /: investigation from strategy to implementation. (2016)
- Main Title:
- Open source intelligence investigation : investigation from strategy to implementation
- Further Information:
- Note: Babak Akhgar, P. Saskia Bayerl, Fraser Sampson, editors.
- Editors:
- Akhgar, Babak
Bayerl, P. Saskia
Sampson, Fraser - Contents:
- Part 1: Introduction -- OSINT as an integral part of the national security apparatus -- Open Source Intelligence and the protection of national security -- Police use of Open Source Intelligence: The longer arm of law -- OSINT as part of the strategic national security landscape -- Taking stock of subjective narratives around modern OSINT -- Part 2: Methods, Tools and Techniques.-Acquisition and preparation of data for OSINT investigations -- Analysis, interpretation and validation of open source data -- OSINT and the dark web -- Fusion of OSINT and non-OSINT data -- A framework for assessing OSINT tools.-Design considerations for OSINT tools and processes -- Part 3: Practical Application and Cases -- A new age of Open Source Investigation: International examples -- Use cases and best practices for LEAs -- OSINT in the context of cyber-security -- Combatting cybercrime and sexual exploitation of children: An open source toolkit.-Identifying illegal cartel activities using open source intelligence -- Part 4: Legal Considerations -- Legal considerations for using open source intelligence in the context of cybercrime and cyberterrorism -- Following the breadcrumbs: Using Open Source Intelligence as evidence in criminal proceedings.
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2016
- Copyright Date:
- 2016
- Extent:
- 1 online resource (302 pages), illustrations (some color)
- Subjects:
- 327.1202854678
Computer science
Cyber intelligence (Computer security)
Computer crimes -- Investigation
Criminology -- Methodology
Computer security
Data mining
Computer crimes
Social sciences_xData processing
Computer crimes -- Investigation
Criminology -- Methodology
Cyber intelligence (Computer security)
Computers -- Database Management -- Data Mining
Social Science -- Criminology
Computers -- Data Processing
Law -- International
Technology & Engineering -- Engineering (General)
Data mining
Crime & criminology
Society & social sciences
International criminal law
Security & fire alarm systems
Computers -- Security -- General
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 3319476718
9783319476711 - Related ISBNs:
- 331947670X
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.357094
- Ingest File:
- 04_021.xml