000 03593cam a2200217 i 4500
999 _c16203
_d16203
020 _a9780128029169
020 _a0128029161
082 _a327.12028
245 0 0 _aAutomating open source intelligence :
300 _ax, 211 pages :
_billustrations ;
490 0 _aSyngress Advanced Topics in Information Security
505 0 _aMachine generated contents note: ch. 1 The Automating of Open Source Intelligence / Agate M. Ponder-Sutton -- The commercial angle -- Algorithms -- References -- ch. 2 Named Entity Resolution in Social Media / Paul A. Watters -- Introduction -- Discussion -- References -- ch. 3 Relative Cyberattack Attribution / Robert Layton -- Introduction -- Basic attack structure -- Anonymization on the internet -- Weaknesses in anonymization -- Attribution as a concept -- Absolute attribution -- Relative attribution -- Relative attribution concepts -- Inherent versus learnt behaviors -- Hiding behavior -- Consistency of behavior -- Relative attribution techniques -- Authorship analysis -- Limitations and issues -- Research streams -- Conclusions -- References -- ch. 4 Enhancing Privacy to Defeat Open Source Intelligence / Jason Smith -- Introduction -- Requirements and threats -- Preliminaries -- The PIEMCP -- Formal security analysis with CPN -- Performance analysis of FSSO-PIEMC --
505 0 _aNote continued: Conclusion and future work -- References -- ch. 5 Preventing Data Exfiltration: Corporate Patterns and Practices / Brenda Chawner -- What is happening around the world? -- What is happening in New Zealand? -- Specifying the problem -- Problems arising by implementing censorship -- So, what should be done? -- Summary -- References -- ch. 6 Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground / Paul A. Watters -- Introduction -- Advertising and risk -- The digital millennium copyright act (DMCA) -- Chilling effects database -- Google transparency report -- Mainstream advertising and how piracy is funded -- High-risk advertising and their links to piracy websites -- High-risk advertising: Case studies in Canada -- High-risk advertising: Case studies in Australia -- High-risk advertising: Case studies in New Zealand -- Research challenges -- References --
505 0 _aNote continued: ch. 7 Graph Creation and Analysis for Linking Actors: Application to Social Data / Rony Germon -- Introduction -- The social network model -- Graph creation techniques -- Graph analysis for OSINT -- Twitter case study -- Conclusion -- References -- ch. 8 Ethical Considerations When Using Online Datasets for Research Purposes / Jim Sillitoe -- Introduction -- Existing guidelines -- Interpretation of existing guidelines for online purposes -- The three proposed principles applied to online research -- Autonomy -- Obtaining consent -- Benefits against risks -- Justice -- Summary -- References -- ch. 9 The Limitations of Automating OSINT: Understanding the Question, Not the Answer / George R.S. Weir -- Introduction -- Finding answers to questions -- Credibility and the quality of results -- Relevance -- The limitations of automating osint -- Conclusions -- References -- ch. 10 Geospatial Reasoning With Open Data / Hans Guesgen -- Introduction --
505 0 _aNote continued: The open geospatial data environment -- Review of reasoning methods with geospatial data -- Case studies in geospatial reasoning -- Conclusions -- References.
650 0 _aOpen source intelligence
650 0 _aIntelligence service
700 1 _aLayton, Robert,
700 1 _aWatters, Paul A.,
942 _cBK