Veidlapa Nr. M-3 (8)
Study Course Description

Analysis of Open Sources and Data

Main Study Course Information

Course Code
JF_438
Branch of Science
-
ECTS
3.00
Target Audience
Civil and Military Defense; Law
LQF
Level 7
Study Type And Form
Full-Time; Part-Time

Study Course Implementer

Course Supervisor
Structure Unit Manager
Structural Unit
Faculty of Social Sciences
Contacts

Dzirciema street 16, Rīga, szf@rsu.lv

About Study Course

Objective

To provide students with an understanding of the use of open source and data analysis OSINT (Open Source Intelligence) in solving and combating economic crime; To provide students with the necessary abilities and skills in searching for and summarising open source evidence, acquainting students with free access tools and methods of obtaining information; To provide students with abilities and skills in the analysis and synthesis of the information and evidence obtained.

Preliminary Knowledge

Skills to work with a computer, internet browsers, navigate in social networks, English language skills

Learning Outcomes

Knowledge

1.Students know the methods, approaches, tools for open source intelligence (OSINT), understand the principles of functioning of online networks, internet browsers, websites and major social networks, know the most useful open databases for the profession, and are aware of and understand the security risks faced by internet users, including the investigator himself/herself. As a result of mastering the study course students are able to integrate the obtained knowledge and make a contribution to the creation of new knowledge.

Skills

1.Students are able to search and systemise evidence available from open sources (texts, photographs, videos, unique identifiers, etc.) in order to subsequently verify, analyse and synthesize the information obtained by drawing conclusions on the crime under investigation. By understanding the principles of the functioning of the Internet and social networks, students are able to use the knowledge provided by the lecturers and to create new open source intelligence approaches independently. Students are able to engage in discussions on the development of Internet and social networks, the privacy, security of their users and the ethics of the researcher.

Competences

1.Students are competent in conducting economic crime investigations, working on evidence gathered in open and public sources, and advising investigators using other methods of gathering evidence.

Assessment

Individual work

Title
% from total grade
Grade
1.
Individual work
-
-
1. The material reviewed at lectures and seminars is the necessary minimum knowledge to be acquired. The student should learn other matters not reviewed during contact classes independently. All the matters to be learned in the study course are specified in the description of the course. 2. Learning of material outside auditorium should be systematic. At least 3 hours of learning outside auditorium per two hours in auditorium (90 min) should be provided (preparation of an essay/performance of individual work, preparation for seminars). 3. Seminar classes take place in groups and individually, using personal laptops pr PCs provided by the higher education institutions. Students prepare for seminar work individually or in groups. Detailed organisation of seminar work is included in the seminar instruction for the respective seminar, which is sent to students 5 – 7 calendar days before the seminar. Students are obliged to prepare before the class in accordance with the instruction, for example, to study each case, where open sources were used, to study additional questions and find answers to them, if asked, and after the seminar – to be able to demonstrate their own open source and data research skills. 4. In parallel to all independent work, each student should individually draft a study of open sources (course paper) on a suspect in a specific case, checking his/her alibi, social account network and website network probably involved in an economic crime or to the extent possible to solve a crime using the evidences provided by open sources and data.

Examination

Title
% from total grade
Grade
1.
Examination
-
-
2.
Examination
-
-
Within the course, an assessment is also provided for work at seminars, course graduation paper and the examination. To make an assessment, it is necessary: 1) Independent drafting of a course graduation paper; 2) Attendance of classes and successful assessments at seminars; 3) Successful passing of an examination. Work at a seminar – 25%; Course graduation paper – 50%: Examination – 25%. Final Examination (full-time studies): Examination (written) Final examination (part-time studies): Essay on examination questions (Written)

Study Course Theme Plan

FULL-TIME
Part 1
  1. Verification of evidences Check of text; Check of pictures; Check of videos; Check of location.

EventType
Modality
Location
Contact hours
1.
Lecture
On site
Computer room
2
  1. Inauthentic behaviour in social networks Inauthentic pages on Facebook Inauthentic accounts on Facebook Automated accounts on Twitter (bots) Click farms Troll factories

EventType
Modality
Location
Contact hours
1.
Lecture
On site
Computer room
2
  1. Verification of an event demonstrating evidence verification methods Seminar work in accordance with seminar No. 3 instruction.

EventType
Modality
Location
Contact hours
1.
Class/Seminar
On site
Computer room
2
  1. Identification of a conflict of interest in open data (Visiting lecture) Data from the Register of Enterprises, KNAB on party financing, declarations of SRS officials and data published by the Procurement Monitoring Bureau (PMB), etc.; Case studies with the most popular corruption and conflict of interest schemes

EventType
Modality
Location
Contact hours
1.
Lecture
On site
Computer room
2
  1. Data analysis in Excel Data import, formatting, mapping, selection, search; Merging of data sets; Pivot tables

EventType
Modality
Location
Contact hours
1.
Class/Seminar
On site
Computer room
2
  1. Examination of website Register of domains, IP addresses, VPN; SSL certificates; Visitor flow (SmilarWeb/Alexa); Backlinks; Cookies; Source code – unique

EventType
Modality
Location
Contact hours
1.
Lecture
On site
Computer room
2
  1. Fraud and crime on the internet (Visiting lecture) Phishing; Identity theft; Hacking; Social engineering (pretending to be a bank); DDoS attacks; Doxing, etc.

EventType
Modality
Location
Contact hours
1.
Lecture
On site
Computer room
2
  1. Safety on the internet (Visiting lecture) User identity protection online (VPN, virtual machines; browser settings) Password administration, two/three factor verification, biometry; Protection against espionage via digital devices; Safe use of location services, etc.

EventType
Modality
Location
Contact hours
1.
Lecture
On site
Computer room
2
  1. Visitor safety on the internet Seminar work in accordance with seminar No. 6 instruction.

EventType
Modality
Location
Contact hours
1.
Class/Seminar
On site
Computer room
2
Total ECTS (Creditpoints):
3.00
Contact hours:
24 Academic Hours
Final Examination:
Exam (Written)
PART-TIME
Part 1
  1. Data analysis in Excel Data import, formatting, mapping, selection, search; Merging of data sets; Pivot tables

EventType
Modality
Location
Contact hours
1.
Class/Seminar
On site
Computer room
2
  1. Examination of website Register of domains, IP addresses, VPN; SSL certificates; Visitor flow (SmilarWeb/Alexa); Backlinks; Cookies; Source code – unique

EventType
Modality
Location
Contact hours
1.
Class/Seminar
On site
Computer room
2
Total ECTS (Creditpoints):
3.00
Contact hours:
10 Academic Hours
Final Examination:
Exam (Written)

Bibliography

Required Reading

1.

Bazzell, M. Open Source Intelligence Techniques: Resources for Searching and Analysing Online Information. 7th Edition. Coppell, Texas, 2019

2.

Akhgar, B., Bayerl, S., Sampson, F. Open Source Intelligence Investigation: From Strategy to Implementation. Springer International Publishing, Switzerland, 2016

3.

Hassan, N., Hijazi, R. Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence. Apress Media LLC, New York, 2018

4.

Troia, V. Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques. John Wiley & Sons, Indianapolis, 2020

5.

Gupta, R., Brooks, H. Using Social Media for Global Security. John Wiley & Sons, Incorporated, 2013

6.

Orlowski, J. The Social Dilemma. Netflix, 2020

Additional Reading

1.

Amer, K., Noujaim, J. The Great Hack. Netflix 2019

2.

Fincher, D. The Social Network. Columbia Pictures, 2010

Other Information Sources

1.

Intel Techniques

2.

Bellingcat

3.

Verification and Fact Checking Handbook

;