Analysis of Open Sources and Data
Study Course Implementer
Dzirciema street 16, Rīga, szf@rsu.lv
About Study Course
Objective
Preliminary Knowledge
Learning Outcomes
Knowledge
1.Students know the methods, approaches, tools for open source intelligence (OSINT), understand the principles of functioning of online networks, internet browsers, websites and major social networks, know the most useful open databases for the profession, and are aware of and understand the security risks faced by internet users, including the investigator himself/herself. As a result of mastering the study course students are able to integrate the obtained knowledge and make a contribution to the creation of new knowledge.
Skills
1.Students are able to search and systemise evidence available from open sources (texts, photographs, videos, unique identifiers, etc.) in order to subsequently verify, analyse and synthesize the information obtained by drawing conclusions on the crime under investigation. By understanding the principles of the functioning of the Internet and social networks, students are able to use the knowledge provided by the lecturers and to create new open source intelligence approaches independently. Students are able to engage in discussions on the development of Internet and social networks, the privacy, security of their users and the ethics of the researcher.
Competences
1.Students are competent in conducting economic crime investigations, working on evidence gathered in open and public sources, and advising investigators using other methods of gathering evidence.
Assessment
Individual work
Examination
Study Course Theme Plan
-
Verification of evidences Check of text; Check of pictures; Check of videos; Check of location.
-
Inauthentic behaviour in social networks Inauthentic pages on Facebook Inauthentic accounts on Facebook Automated accounts on Twitter (bots) Click farms Troll factories
-
Verification of an event demonstrating evidence verification methods Seminar work in accordance with seminar No. 3 instruction.
-
Identification of a conflict of interest in open data (Visiting lecture) Data from the Register of Enterprises, KNAB on party financing, declarations of SRS officials and data published by the Procurement Monitoring Bureau (PMB), etc.; Case studies with the most popular corruption and conflict of interest schemes
-
Data analysis in Excel Data import, formatting, mapping, selection, search; Merging of data sets; Pivot tables
-
Examination of website Register of domains, IP addresses, VPN; SSL certificates; Visitor flow (SmilarWeb/Alexa); Backlinks; Cookies; Source code – unique
-
Fraud and crime on the internet (Visiting lecture) Phishing; Identity theft; Hacking; Social engineering (pretending to be a bank); DDoS attacks; Doxing, etc.
-
Safety on the internet (Visiting lecture) User identity protection online (VPN, virtual machines; browser settings) Password administration, two/three factor verification, biometry; Protection against espionage via digital devices; Safe use of location services, etc.
-
Visitor safety on the internet Seminar work in accordance with seminar No. 6 instruction.
-
Data analysis in Excel Data import, formatting, mapping, selection, search; Merging of data sets; Pivot tables
-
Examination of website Register of domains, IP addresses, VPN; SSL certificates; Visitor flow (SmilarWeb/Alexa); Backlinks; Cookies; Source code – unique
Bibliography
Required Reading
Bazzell, M. Open Source Intelligence Techniques: Resources for Searching and Analysing Online Information. 7th Edition. Coppell, Texas, 2019
Akhgar, B., Bayerl, S., Sampson, F. Open Source Intelligence Investigation: From Strategy to Implementation. Springer International Publishing, Switzerland, 2016
Hassan, N., Hijazi, R. Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence. Apress Media LLC, New York, 2018
Troia, V. Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques. John Wiley & Sons, Indianapolis, 2020
Gupta, R., Brooks, H. Using Social Media for Global Security. John Wiley & Sons, Incorporated, 2013