Tao of Open Source Intelligence  
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781849287302
Pages: 0

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781849287302 Price: INR 3144.75
Add to cart Buy Now
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community.The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability.
Rating
Description
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community.The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability.
Table of contents
  • Cover
  • Title
  • Copyright
  • Preface
  • About the Author
  • Acknowledgements
  • Dedication
  • Contents
  • Introduction: “What Can Open Source Intelligence Do For Me?”
    • Four key concepts
    • What to expect from the rest of this book
  • Chapter 1: The Surface Web
    • Web browsers – the first steps
    • Flexibility
    • Extendibility with Add-Ons
    • Speed
    • Search engines
    • Search engines – meta search engines
    • Cyber geography
    • (Slightly below) the Surface Web
    • Metadata (subsurface data)
    • Specialist search syntax
    • Specialist web investigation tools
    • Suggested search and the knowledge of the crowd
    • Conclusion
  • Chapter 2: Deep Web
    • The Deep Web and social media technology
    • The core principles of networks and how they affect investigations on Deep Web social media platforms
    • Theory into practice
    • Platform-specific search tools
    • The importance of identity online
    • Final theoretical points
    • Conclusion
  • Chapter 3: The Dark Web
    • What is the Dark Web and where did it come from?
    • The importance of The Onion Router (TOR) to the Dark Web
    • The .onion pseudo-Top Level Domain
    • So much for the theory – now what?
    • Ticket to ride – now where?
    • Investigating the Dark Web
    • Tor2web and the growth of the ‘Borderlands’
    • Conclusion
  • Chapter 4: Internet Security for the Smart Investigator
    • Security: two brief principles
    • Creating a dedicated research infrastructure
    • Giving away your identity on the Internet
    • Going underground – Virtual Private Networks
    • Advanced concepts of surveillance and detection
    • Leaving no trace (mitigating scenario 2):
    • Counterintelligence within OSINT
    • Encryption
    • Smart security – using the appropriate solution at the appropriate time
  • Conclusion
    • “What can OSINT do for me?”
  • Annex A: Tips for Building a Credible Sock Puppet
  • ITG Resources
User Reviews
Rating