Open-Source Intelligence (OSINT) Flashcards
what is Open source intelligence (OSINT)
is unclassified information
that discovered, has been deliberately discriminated, distilled, and disseminated to a select audience in order to address a specific question.
T/F osint It is not a tool, it is not a website, it is not with fee, it is not free…
T
what is Open on (Open source intelligence)?
refers to overt, publicly available sources (as opposed to covert or clandestine sources). [It is not related to open-source software or public intelligence].
What is Threat Intelligence / Cyber Intelligence?
Based on the collection of intelligence using:
- Open source intelligence (OSINT)
- Social media intelligence (SOCMINT)
- Human Intelligence (HUMINT)
- Technical intelligence
- Intelligence from the deep and dark web.
in Threat Intelligence / Cyber Intelligence Research and analyze trends and technical
developments in three areas:
- Cybercrime
- Hacktivism
- Cyber espionage
(e.g. Advanced Persistent Threat-APT-)
Actionsable intelligence
-Relevant
-Accurate
-Analyzed
-Predective
-Contextualized
-Timely
Why OSINT?
In a world that changes rapidly, we need to have high quality information in the exact moment we need it.
Offensive:
* Information Gathering
* Industrial Espionage
Defensive:
* Penetration Testing
* Breach detection
* Chatter Monitoring
During WWII, foreign Agents Collected:
- Print publications
- Newspaper
- Enemy propaganda
- Radio transmissions
- Obituary notices
what is Social Media ?
platforms that enable users to create and share content.
what is SOCMINT
collection of tools that allow organizations to monitor social media channels and
conversation, respond to social signals and synthetize social data points into meaningful analysis
based on the user’s needs.
T/F SOCMINT allows to collect intelligence gathering from social media sites, using both intrusive or
non-intrusive means, from open and closed social networks.
T
SOCMINT – Surveillance
- Chat monitoring
- Geolocation
- Face recognition
- Augmented reality
Big Data’s 4 V Big Challenges
Volume – Data Size
Velocity – Data Streaming Speed
Variety – Data Formats
Veracity – Data Trustworthiness
SOCMINT – Opinion mining
Also known as Sentiment analysis, refers to the use of Natural Language Processing (NLP), text analysis, computational linguistics, and biometrics to systematically identify, extract and study affective states and subjective information
Volume – Data Size
40 Zettabytes (1021) of data is predicted to be
created by 2020.
* 2.5 Exabytes (1018) of data are created every
day.
* 6 Billion (109) people have mobile phones.
* 100 Terabytes (1012) of data (at least) is stored
by most U.S. companies.
* 966 Petabytes (1015) was the approximate
storage size of the American manufacturing
industry in 2009
Variety – Data Formats
- 150 Exabytes (1018) was the estimated size of
data for health care throughout the world in
2011. - More than 4 Billion (109) hours each month are
used in watching YouTube. - 30 Billion (109) contents are exchanged every
month on Facebook. - 200 Million (106) monthly active users exchange
400 Million tweets every day
Velocity – Data Streaming Speed
- 1 Terabyte (1012) of trade information is
exchanged during every trading session at the
New York Stock Exchange. - 100 sensors (approximately) are installed in
modern cars to monitor fuel level, tire pressure,
etc. - 18.9 Billion (109) network connections are
predicted to exist by 2016.
Veracity – Data Trustworthiness
- 1 out of 3 business leaders have experienced
trust issues with their data when trying to make
a business decision. - 3.1 Trillion (1012) a year is estimated to be
wasted in the U.S. economy due to poor data
quality
OSINT Process
1-Planning
2-Source Identification
3-Data Harvesting
4-Data Processing
5-Data Analysis
6- Results Delivery
OSINT Process: Planning
- What are we looking for?
- Which strategy is the best?
- What about the cost?
- … and time?
OSINT Process: Source Identification
- Who is the target?
- Which source should we consider?
- How many data are available?
- How accurate are the data?
OSINT Process: Data Harvesting
- Collect data from the sources
- The more information we are able to gather, the more vectors of attack you may be able to use in the future
OSINT Process: Data Processing
- Distinguish mere information from facts
- Untrusted vs. trusted
- Irrelevant vs. relevant
- Current vs. outdated
- Unimportant vs. important
- Cleansing
- Formatting
OSINT: Data Analysis
- Analyze, evaluate, integrate data
- Validity, relevance, reliability
- Evaluate the implications
- Visualize results in an effective way