You are previewing The Tao of Open Source Intelligence.
O'Reilly logo
The Tao of Open Source Intelligence

Book Description

The Tao of Open Source Intelligence The Internet has become the defining medium for information exchange in the modern world, and the unprecedented success of new web publishing platforms such as those associated with social media has confirmed its dominance as the main information exchange platform for the foreseeable future. But how do you conduct an online investigation when so much of the Internet isn’t even indexed by search engines? Accessing and using the information that’s freely available online is about more than just relying on the first page of Google results. Open source intelligence (OSINT) is intelligence gathered from publically available sources and is the key to unlocking this domain for the purposes of investigation. Product overview The Tao of Open Source Intelligence provides a comprehensive guide to OSINT techniques, for the investigator: It catalogues and explains the tools and investigative approaches that are required when conducting research within the surface, deep and dark webs. It explains how to scrutinize criminal activity without compromising your anonymity – and your investigation. It examines the relevance of cyber geography and how to get around its limitations. It describes useful add-ons for common search engines, as well as considering metasearch engines (including Dogpile, Zuula, PolyMeta, iSeek, Cluuz, and Carrot2) that collate search data from single-source intelligence platforms such as Google. It considers deep-web social media platforms and platform-specific search tools, detailing such concepts as concept mapping, entity extraction tools, and specialist search syntax (Google kung fu). It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use, and functionality, giving tips on counterintelligence, safe practices, and debunking myths about online privacy. OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community. The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability. About the author Stewart K. Bertram is a career intelligence analyst who has spent over a decade working across the fields of counterterrorism, cybersecurity , corporate investigations and geopolitical analysis. The holder of a master’s degree in computing and a master of letters in terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience, having used open source intelligence on such diverse real-world topics as the terrorist use of social media in Sub-Saharan Africa and threat assessment at the London Olympic Games. Stewart teaches courses on open source intelligence as well as practicing what he preaches in his role as a cyber threat intelligence manager for some of the world’s leading private-sector intelligence and security agencies. Buy The Tao of Open Source Intelligence for your guide to cutting edge information collection capability. Tao Taoism is a philosophical framework for seeing the world as a complete whole, composed of interrelated pieces - doubles and counterparts, if you will. Within the Tao worldview, these pieces reveal more of themselves when examined together. While we're familiar with the notions of ying and yang, and how one cannot exist without the other, Taoism needs to be understood as incorporating 'correct action' to identify these interrelated pieces and how they fit together into the unified whole.

Table of Contents

  1. Cover
  2. Title
  3. Copyright
  4. Preface
  5. About the Author
  6. Acknowledgements
  7. Dedication
  8. Contents
  9. Introduction: “What Can Open Source Intelligence Do For Me?”
    1. Four key concepts
    2. What to expect from the rest of this book
  10. Chapter 1: The Surface Web
    1. Web browsers – the first steps
    2. Flexibility
    3. Extendibility with Add-Ons
    4. Speed
    5. Search engines
    6. Search engines – meta search engines
    7. Cyber geography
    8. (Slightly below) the Surface Web
    9. Metadata (subsurface data)
    10. Specialist search syntax
    11. Specialist web investigation tools
    12. Suggested search and the knowledge of the crowd
    13. Conclusion
  11. Chapter 2: Deep Web
    1. The Deep Web and social media technology
    2. The core principles of networks and how they affect investigations on Deep Web social media platforms
    3. Theory into practice
    4. Platform-specific search tools
    5. The importance of identity online
    6. Final theoretical points
    7. Conclusion
  12. Chapter 3: The Dark Web
    1. What is the Dark Web and where did it come from?
    2. The importance of The Onion Router (TOR) to the Dark Web
    3. The .onion pseudo-Top Level Domain
    4. So much for the theory – now what?
    5. Ticket to ride – now where?
    6. Investigating the Dark Web
    7. Tor2web and the growth of the ‘Borderlands’
    8. Conclusion
  13. Chapter 4: Internet Security for the Smart Investigator
    1. Security: two brief principles
    2. Creating a dedicated research infrastructure
    3. Giving away your identity on the Internet
    4. Going underground – Virtual Private Networks
    5. Advanced concepts of surveillance and detection
    6. Leaving no trace (mitigating scenario 2):
    7. Counterintelligence within OSINT
    8. Encryption
    9. Smart security – using the appropriate solution at the appropriate time
  14. Conclusion
    1. “What can OSINT do for me?”
  15. Annex A: Tips for Building a Credible Sock Puppet
  16. ITG Resources