Analysis of Open Sources and Data
Study Course Implementer
Dzirciema street 16, Rīga, szf@rsu.lv
About Study Course
Objective
Preliminary Knowledge
Learning Outcomes
Knowledge
1.Students know the methods, approaches, tools for open source intelligence (OSINT), understand the principles of functioning of online networks, internet browsers, websites and major social networks, know the most useful open databases for the profession, and are aware of and understand the security risks faced by internet users, including the investigator himself/herself. As a result of mastering the study course students are able to integrate the obtained knowledge and make a contribution to the creation of new knowledge.
Skills
1.Students are able to search and systemise evidence available from open sources (texts, photographs, videos, unique identifiers, etc.) in order to subsequently verify, analyse and synthesize the information obtained by drawing conclusions on the crime under investigation. By understanding the principles of the functioning of the Internet and social networks, students are able to use the knowledge provided by the lecturers and to create new open source intelligence approaches independently. Students are able to engage in discussions on the development of Internet and social networks, the privacy, security of their users and the ethics of the researcher.
Competences
1.Students are competent in conducting economic crime investigations, working on evidence gathered in open and public sources, and advising investigators using other methods of gathering evidence.
Assessment
Individual work
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Individual work |
-
|
-
|
|
1. The material reviewed at lectures and seminars is the necessary minimum knowledge to be acquired. The student should learn other matters not reviewed during contact classes independently. All the matters to be learned in the study course are specified in the description of the course.
2. Learning of material outside auditorium should be systematic. At least 3 hours of learning outside auditorium per two hours in auditorium (90 min) should be provided (preparation of an essay/performance of individual work, preparation for seminars).
3. Seminar classes take place in groups and individually, using personal laptops pr PCs provided by the higher education institutions. Students prepare for seminar work individually or in groups. Detailed organisation of seminar work is included in the seminar instruction for the respective seminar, which is sent to students 5 – 7 calendar days before the seminar. Students are obliged to prepare before the class in accordance with the instruction, for example, to study each case, where open sources were used, to study additional questions and find answers to them, if asked, and after the seminar – to be able to demonstrate their own open source and data research skills.
4. In parallel to all independent work, each student should individually draft a study of open sources (course paper) on a suspect in a specific case, checking his/her alibi, social account network and website network probably involved in an economic crime or to the extent possible to solve a crime using the evidences provided by open sources and data.
|
||
Examination
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Examination |
-
|
-
|
|
2.
Examination |
-
|
-
|
|
Within the course, an assessment is also provided for work at seminars, course graduation paper and the examination. To make an assessment, it is necessary:
1) Independent drafting of a course graduation paper;
2) Attendance of classes and successful assessments at seminars;
3) Successful passing of an examination.
Work at a seminar – 25%;
Course graduation paper – 50%:
Examination – 25%.
Final Examination (full-time studies): Examination (written)
Final examination (part-time studies): Essay on examination questions (Written)
|
||
Study Course Theme Plan
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Verification of evidences
Check of text;
Check of pictures;
Check of videos;
Check of location.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Inauthentic behaviour in social networks
Inauthentic pages on Facebook
Inauthentic accounts on Facebook
Automated accounts on Twitter (bots)
Click farms
Troll factories
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Verification of an event demonstrating evidence verification methods
Seminar work in accordance with seminar No. 3 instruction.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Identification of a conflict of interest in open data (Visiting lecture)
Data from the Register of Enterprises, KNAB on party financing, declarations of SRS officials and data published by the Procurement Monitoring Bureau (PMB), etc.;
Case studies with the most popular corruption and conflict of interest schemes
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Data analysis in Excel
Data import, formatting, mapping, selection, search;
Merging of data sets;
Pivot tables
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Examination of website
Register of domains, IP addresses, VPN;
SSL certificates;
Visitor flow (SmilarWeb/Alexa);
Backlinks;
Cookies;
Source code – unique
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Fraud and crime on the internet (Visiting lecture)
Phishing;
Identity theft;
Hacking;
Social engineering (pretending to be a bank);
DDoS attacks;
Doxing, etc.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Safety on the internet (Visiting lecture)
User identity protection online (VPN, virtual machines; browser settings)
Password administration, two/three factor verification, biometry;
Protection against espionage via digital devices;
Safe use of location services, etc.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Visitor safety on the internet
Seminar work in accordance with seminar No. 6 instruction.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Data analysis in Excel
Data import, formatting, mapping, selection, search;
Merging of data sets;
Pivot tables
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Computer room
|
2
|
Topics
|
Examination of website
Register of domains, IP addresses, VPN;
SSL certificates;
Visitor flow (SmilarWeb/Alexa);
Backlinks;
Cookies;
Source code – unique
|
Bibliography
Required Reading
Bazzell, M. Open Source Intelligence Techniques: Resources for Searching and Analysing Online Information. 7th Edition. Coppell, Texas, 2019
Akhgar, B., Bayerl, S., Sampson, F. Open Source Intelligence Investigation: From Strategy to Implementation. Springer International Publishing, Switzerland, 2016
Hassan, N., Hijazi, R. Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence. Apress Media LLC, New York, 2018
Troia, V. Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques. John Wiley & Sons, Indianapolis, 2020
Gupta, R., Brooks, H. Using Social Media for Global Security. John Wiley & Sons, Incorporated, 2013