OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community.The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability.
Access options:
The following links lead to the full text from the respective local libraries:
The case of the Syrian Electronic Army (SEA) offers the chance to study a counter response to the cyber activism of the Arab Spring. Research methods featured an adapted method of snowball sampling. The main technical finding of the study placed the SEA within two degrees of separation from a senior politician within the Assad regime. The core conclusion of the paper is the definition of a 'close enough' relationship between the SEA and the Assad regime, defined as distant enough to preserve plausible deniability but close enough to ensure the strategic alignment of the SEA to state policy goals.
Special Edition Issue - Terrorism and Counter-Terrorism in Sub-Saharan Africa ; Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror (Mben et al., 2013). However, it is a mistake to assume that Africa's story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010). A tiny minority of these Africans are terrorists. ; Publisher PDF
Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror (Mben et al., 2013). However, it is a mistake to assume that Africa's story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010). A tiny minority of these Africans are terrorists.