Amazon cover image
Image from Amazon.com

The Tao of open source intelligence / Stewart K. Bertram.

By: Material type: TextTextPublisher: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2015Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781849287296
  • 1849287295
  • 9781849287302
  • 1849287309
  • 1849287287
  • 9781849287289
Subject(s): Genre/Form: Additional physical formats: Print version:: Tao of Open Source Intelligence.DDC classification:
  • 327.12 23
LOC classification:
  • JF1525.I6
Online resources:
Contents:
Cover; Title; Copyright; Preface; About the Author; Acknowledgements; Dedication; Contents; Introduction: "What Can Open Source Intelligence Do For Me?"; Four key concepts; What to expect from the rest of this book; Chapter 1: The Surface Web; Web browsers -- the first steps; Flexibility; Extendibility with Add-Ons; Speed; Search engines; Search engines -- meta search engines; Cyber geography; (Slightly below) the Surface Web; Metadata (subsurface data); Specialist search syntax; Specialist web investigation tools; Suggested search and the knowledge of the crowd; Conclusion; Chapter 2: Deep Web.
The Deep Web and social media technologyThe core principles of networks and how they affect investigations on Deep Web social media platforms; Theory into practice; Platform-specific search tools; The importance of identity online; Final theoretical points; Conclusion; Chapter 3: The Dark Web; What is the Dark Web and where did it come from?; The importance of The Onion Router (TOR) to the Dark Web; The .onion pseudo-Top Level Domain; So much for the theory -- now what?; Ticket to ride -- now where?; Investigating the Dark Web; Tor2web and the growth of the 'Borderlands'; Conclusion.
Chapter 4: Internet Security for the Smart InvestigatorSecurity: two brief principles; Creating a dedicated research infrastructure; Giving away your identity on the Internet; Going underground -- Virtual Private Networks; Advanced concepts of surveillance and detection; Leaving no trace (mitigating scenario 2):; Counterintelligence within OSINT; Encryption; Smart security -- using the appropriate solution at the appropriate time; Conclusion; "What can OSINT do for me?"; Annex A: Tips for Building a Credible Sock Puppet; ITG Resources.
Summary: How do you conduct an online investigation when much of the Internet isn't indexed by search engines yet? Accessing and using the information that's freely available online is about more than just relying on the first page of Google results. This book provides a guide to Open Source Intelligence (OSINT) techniques for the investigator. Topics include: tools and investigative approaches that are required when conducting research within the surface, deep and dark webs; how to scrutinise criminal activity without compromising your anonymity - and your investigation; relevance of cyber geography and how to get around its limitations; useful add-ons for common search engines, as well as metasearch engines; deep-web social media platforms and platform-specific search tools; Internet security, how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices and debunking myths about online privacy. -- Edited summary from book.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Description based on online resource; title from title page (Safari, viewed November 6, 2015).

How do you conduct an online investigation when much of the Internet isn't indexed by search engines yet? Accessing and using the information that's freely available online is about more than just relying on the first page of Google results. This book provides a guide to Open Source Intelligence (OSINT) techniques for the investigator. Topics include: tools and investigative approaches that are required when conducting research within the surface, deep and dark webs; how to scrutinise criminal activity without compromising your anonymity - and your investigation; relevance of cyber geography and how to get around its limitations; useful add-ons for common search engines, as well as metasearch engines; deep-web social media platforms and platform-specific search tools; Internet security, how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices and debunking myths about online privacy. -- Edited summary from book.

Cover; Title; Copyright; Preface; About the Author; Acknowledgements; Dedication; Contents; Introduction: "What Can Open Source Intelligence Do For Me?"; Four key concepts; What to expect from the rest of this book; Chapter 1: The Surface Web; Web browsers -- the first steps; Flexibility; Extendibility with Add-Ons; Speed; Search engines; Search engines -- meta search engines; Cyber geography; (Slightly below) the Surface Web; Metadata (subsurface data); Specialist search syntax; Specialist web investigation tools; Suggested search and the knowledge of the crowd; Conclusion; Chapter 2: Deep Web.

The Deep Web and social media technologyThe core principles of networks and how they affect investigations on Deep Web social media platforms; Theory into practice; Platform-specific search tools; The importance of identity online; Final theoretical points; Conclusion; Chapter 3: The Dark Web; What is the Dark Web and where did it come from?; The importance of The Onion Router (TOR) to the Dark Web; The .onion pseudo-Top Level Domain; So much for the theory -- now what?; Ticket to ride -- now where?; Investigating the Dark Web; Tor2web and the growth of the 'Borderlands'; Conclusion.

Chapter 4: Internet Security for the Smart InvestigatorSecurity: two brief principles; Creating a dedicated research infrastructure; Giving away your identity on the Internet; Going underground -- Virtual Private Networks; Advanced concepts of surveillance and detection; Leaving no trace (mitigating scenario 2):; Counterintelligence within OSINT; Encryption; Smart security -- using the appropriate solution at the appropriate time; Conclusion; "What can OSINT do for me?"; Annex A: Tips for Building a Credible Sock Puppet; ITG Resources.

Includes bibliographical references.

Powered by Koha