[Syngress advanced topics in information security] Layton, Robert_ Watters, Paul A - Automating open source intelligence _ algorithms for OSINT (2016, Elsevier, Syngress).pdf
(
6556 KB
)
Pobierz
Automating Open
Source Intelligence
Algorithms for OSINT
Edited By
Robert Layton
Paul A. Watters
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Syngress is an imprint of Elsevier
Acquiring Editor: Brian Romer
Editorial Project Manager: Anna Valutkevich
Project Manager: Mohana Natarajan
Cover Designer: Matthew Limbert
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
Copyright
©
2016 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying, recording, or any infor-
mation storage and retrieval system, without permission in writing from the pub-
lisher. Details on how to seek permission, further information about the Publisher’s
permissions policies and our arrangements with organizations such as the Copyright
Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copy-
right by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and
experience broaden our understanding, changes in research methods, professional
practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge
in evaluating and using any information, methods, compounds, or experiments de-
scribed herein. In using such information or methods they should be mindful of their
own safety and the safety of others, including parties for whom they have a professional
responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or
editors, assume any liability for any injury and/or damage to persons or property as a
matter of products liability, negligence or otherwise, or from any use or operation of
any methods, products, instructions, or ideas contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
ISBN: 978-0-12-802916-9
For information on all Syngress publications
visit our website at
http://store.elsevier.com/Syngress
List of Contributors
Brenda Chawner
School of Information Management, Victoria Business
School, Victoria University of Wellington, New Zealand
Shadi Esnaashari
School of Engineering and Advanced Technology, Massey
University, Auckland, New Zealand
Ernest Foo
School of Electrical Engineering and Computer Science – Science
and Engineering Faculty, Queensland University of Technology, Queensland,
Australia
Rony Germon
PSB Paris School of Business, Chair Digital Data Design
Iqbal Gondal
Internet Commerce Security Laboratory, Federation University,
Australia
Hans Guesgen
School of Engineering and Advanced Technology, Massey
University, New Zealand (Palmerston North campus)
Christian Kopp
Internet Commerce Security Laboratory, Federation Univer-
sity, Australia
Robert Layton
Internet Commerce Security Laboratory, Federation University,
Australia
Seung Jun Lee
School of Engineering & Advanced Technology, Massey
University, New Zealand
Charles Perez
PSB Paris School of Business, Chair Digital Data Design
Agate M. Ponder-Sutton
Information Technology & Centre for Information
Technology, School of Engineering and Advanced Technology, Massey Univer-
sity, New Zealand
Jim Sillitoe
Internet Commerce Security Laboratory, Federation University,
Australia
Jason Smith
School of Electrical Engineering and Computer Science – Science
and Engineering Faculty, Queensland University of Technology, Queensland,
Australia
Kristin Stock
School of Engineering and Advanced Technology, Massey Uni-
versity, New Zealand (Albany, Auckland campus)
ix
x
List of Contributors
Suriadi Suriadi
School of Engineering and Advanced Technology, College of
Sciences, Massey University, New Zealand
Paul A. Watters
School of Engineering & Advanced Technology, Massey
University, New Zealand
George R.S. Weir
Department of Computer and Information Sciences,
University of Strathclyde, Glasgow, UK
Ian Welch
School of Engineering and Computer Science, Victoria University
of Wellington, New Zealand
C H A P T ER 1
The Automating of Open Source
Intelligence
Agate M. Ponder-Sutton
Information Technology & Centre for Information Technology, School of Engineering
and Advanced Technology, Massey University, New Zealand
Open source intelligence (OSINT) is intelligence that is synthesized using pub-
licly available data (Hobbs,
Moran, & Salisbury, 2014).
It differs significantly
from the open source software movement. This kind of surveillance started
with the newspaper clipping of the first and second world wars. Now it is ubiq-
uitous within large business and governments and has dedicated study. There
have been impassioned, but simplified, arguments for and against the current
levels of open source intelligence gathering. In the post-Snowden leaks world
one of the questions is how to walk the line between personal privacy and
nation state safety. What are the advances? How do we keep up, keep relevant,
and keep it fair or at least ethical? Most importantly, how do we continue to
“make sense or add value” as Robert David Steele would say, (http://tinyurl.
com/EIN-UN-SDG).
I will discuss the current state of OSINT and data science.
The changes in the analysts and users will be explored. I will cover data anal-
ysis, automated data gathering, APIs, and tools; algorithms including super-
vised and unsupervised learning, geo-locational methods, de-anonymization.
How do these interactions take place within OSINT when including ethics and
context? How does OSINT answer the challenge laid down by Schneier in his
recent article elaborating all the ways in which big data have eaten away at the
privacy and stability of private life, “Your cell phone provider tracks your loca-
tion and knows who is with you. Your online and in-store purchasing patterns
are recorded, and reveal if you are unemployed, sick, or pregnant. Your emails
and texts expose your intimate and casual friends. Google knows what you are
thinking because it saves your private searches. Facebook can determine your
sexual orientation without you ever mentioning it.” (Schneier,
2015b).
These
effects can be seen in worries surrounding the recording and tracking done
by large companies to follow their customers discussed by
Schneier, (2015a,
2015b)
and others as the crossing of the uncanny valley from useful into dis-
turbing. These examples include the recordings made by a Samsung TV of con-
sumers in their homes (http://www.theguardian.com/media-network/2015/
feb/13/samsungs-listening-tv-tech-rights);
Privacy fears were increased by the
1
Plik z chomika:
Eroza800
Inne pliki z tego folderu:
Michael Bazzell - Open Source Intelligence Techniques_ Resources For Searching And Analyzing Online Information (2018, Createspace Independent Publishing Platform)_2.pdf
(113831 KB)
[Uffe_Kock_Wiil]_Counterterrorism_and_Open_Source_(BookFi).pdf
(11479 KB)
Nihad A. Hassan, Rami Hijazi - Open Source Intelligence Methods and Tools_ A Practical Guide to Online Intelligence (2018, Apress).pdf
(10710 KB)
Bulusu Lakshman - Open source data warehousing and business intelligence (2013, CRC Press).pdf
(6746 KB)
[Syngress advanced topics in information security] Layton, Robert_ Watters, Paul A - Automating open source intelligence _ algorithms for OSINT (2016, Elsevier, Syngress).pdf
(6556 KB)
Inne foldery tego chomika:
1_Security
2_Hack
Advanced_Malware_Analysis_Training_SecurityXploded
cheat-sheets
Crypto
Zgłoś jeśli
naruszono regulamin