Skip to product information
1 of 1
Regular price £22.59 GBP
Regular price £29.99 GBP Sale price £22.59 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 10 days lead

Automating Open Source Intelligence
Algorithms for OSINT

This book provides the state-of-the-art on the algorithms necessary for open source intelligence gathering, presenting information on the extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media.

Robert Layton (Author), Paul A Watters (Author)

9780128029169, Elsevier Science

Paperback, published 10 December 2015

222 pages
23.5 x 19 x 1.5 cm, 0.45 kg

"Each chapter can stand alone, but together they give an accurate view of the current situation - it's a good mix of theory and practice(s)…an interesting read for researchers and digital investigators...an eye-opening one for Internet users in general..." --Help Net Security

Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process.

The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline.

Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data.

Ch 1. Introduction to OSINT

Ch 2. Advances in Automated OSINT

Ch 3. Named Entity Resolution in Social Media

Ch 4. Relative Cyberattack Attribution

Ch 5. Evidence Accumulation Strategies for OSINT

Ch 6. Analyzing Social Media Campaigns for Group Size Estimation

Ch 7. Crawling the Dark Web

Ch 8. Case Study: The Digital Underground

Ch 9. Graph Creation and Analysis for Linking Actors

Ch 10. Case Study Predicting Crime with OSINT

Ch 11. Ethical Considerations w/Public Data

Ch 12: Limitations of automating OSINT

Ch 13. Geospatial Reasoning of Open Data

Ch 14: Future Trends

Subject Areas: Information architecture [UYZM], Expert systems / knowledge-based systems [UYQE], Artificial intelligence [UYQ], Computer security [UR]

View full details