Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
56 views10 pages

The Role of Open

The role of open source intelligence OSINT in modern criminal investigations. This is a ten paged thesis I submitted in partial fulfillment of the course requirement: Security Intelligence and Investigative Practice Level 2.

Uploaded by

8jghbs5rqt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views10 pages

The Role of Open

The role of open source intelligence OSINT in modern criminal investigations. This is a ten paged thesis I submitted in partial fulfillment of the course requirement: Security Intelligence and Investigative Practice Level 2.

Uploaded by

8jghbs5rqt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

THE ROLE

OF

OPEN-SOURCE INTELLIGENCE (OSINT) IN MODERN


CRIMINAL INVESTIGATIONS

BY

EFFIONG OKON ENEMA

SUBMITTED IN PARTIAL FULFILMENT OF THE COURSE


REQUIREMENT:

SECURITY INTELLIGENCE AND INVESTIGATIVE


PRACTICE (LEVEL 2).

15th October, 2024


ABSTRACT

Open-Source Investigations (OSINT) has emerged as a valuable tool in modern criminal


investigations, enabling law enforcement agencies to gather information from publicly available
sources such as newspapers, social media, books and websites. This research intends to explore
the significance of OSINT in enhancing the effectiveness and efficiency of criminal investigations,
providing insights into its methodologies, challenges and successes in comparison to traditional
intelligence methods. One of the most important aspects for a successful security and intelligence
operation, is the ability for the law enforcement authorities to obtain timely, reliable and actionable
intelligence related to the investigation or incident at hand. Open-source intelligence (OSINT)
provides an invaluable avenue to access and collect such information in addition to traditional
investigative techniques and information sources.

Word count: 122 Words


INTRODUCTION

Open-Source Intelligence (OSINT) is a discipline used to collect information about places,


individuals, organizations and other objects from free public sources such as books, magazines,
newspapers, websites or social media networks. Most intelligence experts extend that definition to
include intended for public consumption.

In recent years, the digital age has revolutionized the way information and intelligence are accessed
and shared, presenting both opportunities and challenges for criminal investigations.

OSINT refers to the collection, analysis and interpretation of publicly available data in order to
produce actionable intelligence. Holding the ability to collect and analyse guiding available data,
OSINT is inspiring a transformative shift in the way law enforcement agencies approach crime
prevention and investigations they look to utilize comprehensive, real-time insights. In this study
we shall explore several OSINT technologies, these include computer preparations, internet
browsers, Google searches and operators, reverse image searches, Google maps and street view.
This research intends to explore these techniques and how their application enhance modern
criminal investigations.

Law enforcement authorities attempt to ensure perpetrators are held responsible for their crimes
which has seen rapid advancements in the past century, and it shows no signs of slowing down.
Now, with the emergence of digital technologies gaining momentum, law enforcement agencies
and security practioners all over the World are increasingly looking to utilize every useful data and
information available to ensure justice is delivered. In this era where information is both abundant
and accessible, the role of Open-Source Intelligence (OSINT) in preventing, detecting and
combating criminal endeavors has become indispensable. This research work intends to delve into
the evolving role of OSINT in modern criminal investigations and law enforcement, highlighting
its contributions to solving crimes, identifying suspects and preventing criminal activities. This
research work will also highlight the comparative advantage of OSINT over Traditional
intelligence methods. Where traditional intelligence methods relied on covert and classified
operations, OSINT allows law enforcement authorities to tap into a wide array of sources available
to analyse with internet access, enabling them to build a digital picture or footprint of a suspect’s
involvement. Whether it be a social media platform, via news reports or online forums or even
public records, everyone leaves a digital footprint, and where criminals are concerned,
investigation can use these domains to paint an online picture of their actions. By monitoring these
sources, authorities can identify patterns, track movements and uncover connections that might
otherwise have remained hidden to the naked eye. By leveraging OSINT, law enforcement
authorities and security practitioners can revolutionize how they manage and respond to criminal
risks. By monitoring data, security operatives are able to anticipate and therefore mitigate potential
threats with unprecedented precision. As well as helping authorities to identify potential suspects
and under criminal network it also enhances situational awareness.

LITERATURE REVIEW

Numerous studies have underscored the importance, effectiveness and challenges of OSINT in
criminal investigations and in augmenting traditional investigative techniques. For example, a
study by Smith et al., (2018) demonstrated how social media in platforms can be leveraged to track
criminals and their organizations and predict their activities. Also, Jones (2019) explored the use
of OSINT in combating cybercrime, showcasing the efficacy in tracing digital footprints and
uncovering online criminal networks. In another study, Hassan (2019) describes that OSINT has
become the eyes of police to protect citizens from different types of crime. Klippenstein (2020)
also mentions the benefits of using public content from social media in criminal investigations.
Hassan and Hijazi (2018) elaborate on the different OSINT techniques used in digital forensics
such as search engine techniques, social media intelligence, people search engines, public records,
online maps and foot printing techniques. According to Pastor-Galindo et al. (2020) the typical
OSINT process is to identify, harvest, process, analyse and report data obtained from open data
sources. Gibson (2014) in another study shows that OSINT plays an important role in gathering
evidence for police and law enforcement agencies.

METHODOLOGY

This research intends to employ both the qualitative and quantitative approach. Conducting
interviews with law enforcement professionals and security experts to gather insights on their
utilization of OSINT tools and techniques. A quantitative study will be carried out to explore the
challenges, effectiveness and efficacy of OSINT in comparison to traditional intelligence methods.
Furthermore, a case study of successful criminal investigations aided by OSINT will be analysed
to elucidate its practical applications and outcomes.
Open-Source Intelligence (0SINT) Techniques

The typical OSINT process is to identify, convert, process, analyse and report data obtained from
open data sources such as the mass media, social networks, forums and blogs, websites, public
government data, publications or commercial data. Ther are many OSINT technologies used such
as search engine techniques, social media intelligence, people search engines, public records,
online maps and foot printing methods. In this research work I will explore the several OSINT
techniques which are relevant to security, policing and digital forensics.

a) Computer Preparations: using OSINT techniques for digital forensic requires the
investigator to prepare hardware, software and skills. Key topics that should be considered
during this initial phase are questions about what information we are seeking, where we should
search for it, and whether it should be carried out without identifying an ongoing information
collection. Every methodical presentation of OSINT techniques should include: a discussion
of the correct set up of computer equipment. To make the best use of these anonymization
techniques, it is essential for the laws enforcement authorities to maintain pre- installed search
and analysis machines for use. There are several anonymization techniques, such as virtual
private network (VPN) and the use of dark wed browsers such as TOR. Investigations can also
use pre-paid SIM cards and mobile phones or hotspot connections for internet.
b) Social media monitoring: This entails the monitoring of social media platforms for
information related to suspects, persons of interest, witnesses or criminal activities. This
includes analysis posts, photos, videos and connectivity to gather intelligence. There are
challenges associated with this technique. For example, when creating a search profile for use
on Facebook the search account must be verified to a mobile phone number, while the OSINT
methodology requires anonymizing as much as possible. In the past, this verification could
also be done using an approved mail account but due to the constant tightening of Facebook
policy, it will be more difficult to succeed. Moreover, the phone numbers used to verify the
account should be connected to the investigator.
c) Reverse Image Searches: Google enables searches on the internet with an image as input. In
the academic community for digital policing, this technique is called reverse image search.
This search opens many possibilities one of which is to identify where a photo is taken or what
the module shows. This OSINT technique also allows investigations to identify an unknown
person on an existing image. To succeed with this, the person to be identified should be
represented with several images in various articles on the internet so the search engine gets an
identification.
d) Open-Source Data Analysis: Open-source data refers to data that is readily available to
anyone and can be accessed, used and shared. There are no restrictions in accessing the data.
The data can be used by anyone be it government, industries and individuals for any desired
purpose. This means that open data can include relevant information that can be converted into
artificial intelligence. The open-source data can be used, reused, and shared by other users.
Besides, the fact that open-source data is free to access, use and share, it also has some benefits
like increased transparency. The open-source data, while not containing sensitive information,
can include important economic data, relevant to the investigator. Another benefit is that it
provides more ways of interpreting the data because anyone can interprete the data, they can
choose different methods to highlight different aspects of the data that an investigator may not
have recognized. When using open-source data, an investigator has to put some things into
consideration, these include the first impression you get from the book or page containing the
data, it reflects the amount of effort put into preparing the dataset. A high-quality open-source
data set also has the following qualities:
i. Easily accessible
ii. Well-structured
iii. Clearly documented

Thes describe what you should see first before making use of the dataset. Usually, the
reputation of the source is enough to assume the investigator of the data set quality.

e) Online market place investigation: This OSINT is very essential in the investigation of stolen
goods, counterfeit items and other criminal activities. By utilizing the tool effectively and
efficiently an investigator can be able to gather information about missing or stolen items that
have been put up for sale by criminal individuals and, or organizations. This technique also
helps the investigator to monitor organizations or individuals who specialize in dealing on
stolen items. This technique can also be used to monitor criminal cartels who trade on restricted
items using dark web market place. This technique explores the connections and collaborations
between various vendors and sellers in the marketplace. It also enables an investigator to
analyse the flow of goods, services and financial transactions of a suspect or person of interest.
f) Dark Web Investigations: This OSINT technique involves the monitoring of dark web forums
and marketplaces for illicit activities such as human trafficking, cybercrime or drug sales. This
involves using specialized tools and techniques to access and analyse information from hidden
networks. This technique helps an investigator to uncover the presence and activities of illicit
organizations and individuals operating on the dark web. It ensures the continuous tracking of
the ever-evolving landscape of dark web and the users.
g) Data Aggregation Tools: The OSINT technique involves the use of tools like maltego,
spiderfoot, or the Hunchly and many others, to aggregate, visualize, and analyse data from
various sources. Data aggregation tools are software applications or platforms that collect,
process and present data from multiple sources in a unified format for analysis and decision-
making. These tools help gather information needed by an investigator from various channels
such as websites, social media, databases an APIs, to provide the investigator with a
comprehensive view of the data.
h) Deep Web Research: This OSINT technique requires the exploration of the hidden parts of
the internet that are not indexed by traditional search engines, the Google, Yahoo or Bing.
Unlike the surface web, which is easily accessible and searchable, the deep web consists of
unindexed web pages, data bases, and other content that require specific tools or permissions
to access. Some of the tools used for deep web investigation include TOR Browse, Deep wed
search engines, Virtual Private Network (VPN), Intel techniques like Maltego and Recon-ng,
secure communication tools, Purpose built tools. By employing these tools effectively, law
enforcement agencies and intelligence analyst can investigate the complexities of the deep
web, uncover hidden information, and mitigate potential risks associated with illicit activities
and threats in the hidden corners of the internet.

A COMPARATIVE ANALYSIS OF OPEN-SOURCE INTELLIGENCE AND


TRADITIONAL METHODS

The evolving landscape of intelligence gathering has seen the rise of Open-Source Intelligence
(OSINT) alongside traditional intelligence methods. OSINT utilizes information from publicly
accessible sources and can be a more affordable way to gather intelligence compared to traditional
methods. The real-time nature of OSINT allows for rapid analysis and decision making. An
examination of the advantages of OSINT reveals that OSINT is generally less expensive than
traditional intelligence gathering methods. OSINT has its limitations which cannot be overlooked.
OSINT sources may not always be reliable or accurate, requiring additional verification which
often times might be achieved using traditional intelligence methods. Also, OSINT data can be
influenced by personal or organizational biases which must be considered. The use of OSINT also
presents some legal and privacy concerns as its use may be subject to legal and privacy concerns
in certain jurisdiction.

Traditional intelligence methods have a long-standing history, dating back to ancient civilizations
and has been in existence all over the World long before the application of technology in
intelligence collection and analysis. Traditional intelligence methods rely on old time-tested skills
and knowledge. Traditional intelligence relies on classified sources of information, human
intelligence and rigorous analysis processes. Traditional intelligence methods are security focused,
prioritizing security and the protection of sensitive information. This method of intelligence
gathering has numerous advantage which I will mention just a few. One of the advantages of
traditional intelligence methods is the depth of analysis, this methos provides and in-depth analysis
and expertise on complex issues. Another advantage is security and credibility traditional
intelligence sources are carefully vetted ensuring a higher level of credibility compared to OSINT
Another advantage of traditional intelligence methods is the comprehensive approach to
intelligence, leveraging a range of classified and human sources for holistic view. Traditional
intelligence methods have some reliable limitations which adversely affect the outcome. Few
examples include: it is resource intensive; these methods often require significant finances and
personal resources in order to achieve a set objective and this can be a hinderance where there is
scarcity of funds or personnel. Another limitation of the traditional intelligence methods is the fact
that it engenders slower processes, the complex nature of traditional intelligence can lead to slower
decision-making timelines. Also, adaptability challenges which is a limitation of the traditional
intelligence method, as these methods may struggle to keep pace with time reality of a rapidly
evolving information and technology landscape.

OSINT and Traditional intelligence can be leveraged together to provide a more comprehensive
intelligence picture. Advanced analytics and visualized tools can facilitate the integration of
OSINT and traditional intelligence methods herby leading more accurate and excellent results.
While navigating legal, cultural and organizational barriers, the application of both OSINT and
traditional intelligence methods can guarantee the success of any intelligence operations.

The use of Open-Source Intelligence (OSINT) and traditional intelligence methods present their
unique and diverse challenges and opportunities. By leveraging the strengths of each approach,
organizations that can enhance their intelligence capabilities and make more informed decisions
in an evolving global landscape.

CONCLUSION

This research shows the significant role of open-source intelligence (OSINT) in the ever-evolving
global intelligence landscape. The relevant knowledge of OSINT methodology and techniques
must be maintained with good facilitation and expertise in law enforcement circles. From this
study, it is very understandable that OSINT has its advantages and disadvantages which leaves
room for more innovations and adaptations. The significant role played by traditional intelligence
methods over the centuries cannot be overlooked, likewise its continued importance in the
acquisition, processing and use of act5ionable intelligence. The integration of Open-Source
Intelligence (OSINT) and Traditional intelligence methods should be encouraged as this will
enhance detection and response to emerging threats. The integration will help in gaining a holistic
understanding of complex scenarios.
REFERENCES

Gibson, S.D. (2014). Exploring the role and value of open-source intelligence. Springer, 9-23

Hassan, N.A. (2019). Gathering Evidence from osint sources. Digital forensic Basics, Springer

pages. 311-322.

Hassan and Hijazi, (2018). Open-Source Intelligence Methods and tools. Springer

Jones, B (2019). “Unveiling the Dark Web: OSINT Strategies on Cybercrime


Investigations”. International Journal of Cybersecurity Research, 5(2)112-129.

Klippenstein, (2020) social media and criminal investigations: public content and its role in

solving crimes. 45, page 10

Pastor-Galindo, P. Nespoli, F. G Marmol, G. M Perez. (2020). The not yet exploited goldmine of

OSINT: opportunities, open challenges and future trends. Page 10282-10304.

Smith, A and Anderson M. (2018) ‘Social media Intelligence: A tool for Tracking Criminal

Networks’’ Journal of investigative Criminology, 2(1), 45-62,

Staniforth (2016), Police Use of Open-Source Intelligence: The Longer Arm of Law. Pages 21-31.

You might also like