Fr. 59.50

Deep Dive: Exploring the Real-World Value of Open Source Intelligence

English · Paperback / Softback

Shipping usually within 1 to 3 working days

Description

Read more

Learn to gather and analyze publicly available data for your intelligence needsIn Deep Dive: Exploring the Real-world Value of Open Source Intelligence, veteran open-source intelligence analyst Rae Baker explains how to use publicly available data to advance your investigative OSINT skills and how your adversaries are most likely to use publicly accessible data against you. The author delivers an authoritative introduction to the tradecraft utilized by open-source intelligence gathering specialists while offering real-life cases that highlight and underline the data collection and analysis processes and strategies you can implement immediately while hunting for open-source info.In addition to a wide breadth of essential OSINT subjects, you'll also find detailed discussions on ethics, traditional OSINT topics like subject intelligence, organizational intelligence, image analysis, and more niche topics like maritime and IOT. The book includes: Practical tips for new and intermediate analysts looking for concrete intelligence-gathering strategies Methods for data analysis and collection relevant to today's dynamic intelligence environment Tools for protecting your own data and information against bad actors and potential adversaries An essential resource for new intelligence analysts, Deep Dive: Exploring the Real-world Value of Open Source Intelligence is also a must-read for early-career and intermediate analysts, as well as intelligence teams seeking to improve the skills of their newest team members.

List of contents

Foreword xix
 
Preface xxi
 
Introduction xxv
 
Part I Foundational OSINT 1
 
Chapter 1 Open Source Intelligence 3
 
1.1 What Is OSINT? 3
 
1.2 A Brief History of OSINT 6
 
The Past 6
 
The Present 8
 
The Future 10
 
1.3 Critical Thinking 14
 
1.4 Mental Health 16
 
1.5 Personal Bias 17
 
1.6 Ethics 19
 
Chapter 2 The Intelligence Cycle 23
 
2.1 What Is the Intelligence Cycle? 23
 
2.2 Planning and Requirements Phase 24
 
2.3 Collection Phase 26
 
The Art of Pivoting 27
 
Overcoming OSINT Challenges 33
 
RESET Technique 33
 
Gap Analysis 34
 
Why We Have So Much Data 37
 
2.4 Documentation Methods 39
 
2.5 Processing and Evaluation Phase 44
 
Scoping 45
 
Data Enrichment 45
 
2.6 Analysis and Production Phase 47
 
Visualizations 47
 
2.7 Reporting 50
 
Report Tone 51
 
Report Design 51
 
Example Report 54
 
2.8 Dissemination and Consumption Phases 54
 
Tippers 55
 
Feedback Phase 55
 
Challenges in the Intelligence Cycle 55
 
Chapter 3 The Adversarial Mindset 57
 
3.1 Getting to Know the Adversary 57
 
3.2 Passive vs. Active Recon 64
 
Chapter 4 Operational Security 67
 
4.1 What Is OPSEC? 67
 
Threat Modeling 68
 
Persona Non Grata Method 68
 
Security or "Baseball" Cards 69
 
Attack Trees 71
 
4.2 Steps for OPSEC 72
 
Outlining the Five Steps of OPSEC 72
 
Step 1: Define Critical Information 72
 
Step 2: Analyze the Threat 72
 
Step 3: Determine Vulnerabilities 73
 
Step 4: Risk Assessment 73
 
Step 5: Apply Countermeasures 74
 
4.3 OPSEC Technology 77
 
Virtual Private Network 77
 
Why Use a VPN? 77
 
Choosing a VPN 78
 
VPN Concerns 78
 
Privacy Browsers 79
 
Tor 79
 
Freenet 80
 
I2p 82
 
Virtual Machine 83
 
Mobile Emulator 85
 
4.4 Research Accounts 85
 
4.5 Congratulations! 90
 
Part II OSINT Touchpoints 91
 
Chapter 5 Subject Intelligence 97
 
5.1 Overview 97
 
What Is Subject Intelligence? 98
 
Digital Footprint 98
 
Examining a Subject's Pattern of Life 102
 
5.2 Names 106
 
Subject Names 106
 
Naming Conventions 107
 
Arabic Naming Conventions 107
 
Chinese Naming Conventions 109
 
Russian Naming Conventions 109
 
Name Searching Techniques 110
 
5.3 Subject Usernames 110
 
Username Searching Techniques 111
 
Correlating Accounts and Subject Information by Username 112
 
5.4 Subject Emails 116
 
How to begin connecting accounts 117
 
Correlating Accounts and Subject Information by Email 117
 
Google Accounts 119
 
Correlating an Email with a Domain 120
 
Email Verification 122
 
Privacy Emails 124
 
Data Breaches 125
 
5.5 Subject Phone Numbers 129
 
Typing Phone Numbers to additional selectors 129
 
Correlating a Phone Number with a Subject 129
 
Phone Number Spoofing 131
 
5.6 Public Records and Personal Disclosures 132
 
Methods for incorporating public records searches 132
 
Collecting Public Records Associated with a Subject 132
 
U.S. Official Public Record Sources 134
 
U.S. Unofficial Sources 142
 
Chapter 6 Social Media Analysis 145
&n

Product details

Authors Baker, Rae Baker, Rae L Baker, Rae L. Baker, Micah Hoffman
Assisted by Micah Hoffman (Foreword)
Publisher Wiley, John and Sons Ltd
 
Languages English
Product format Paperback / Softback
Released 01.08.2023
 
EAN 9781119933243
ISBN 978-1-119-93324-3
No. of pages 528
Dimensions 186 mm x 234 mm x 28 mm
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Computersicherheit, Informatik, computer science, Computer Security & Cryptography, Computersicherheit u. Kryptographie, Networking / Security, Netzwerke / Sicherheit

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.