đđ”ïžââïž Os presento una valiosa biblioteca de #OSINT: una colecciĂłn de libros, documentos y ensayos todos centrados en el fascinante mundo de la Inteligencia de Fuentes Abiertas. Esta colecciĂłn se irĂĄ actualizando y enriqueciendo conforme vaya encontrando mĂĄs material. đ
Si bien la fuente inicial de esta colecciĂłn es esta, he estado incorporando mĂĄs recursos y enlaces a los documentos o libros que encuentro por mi cuenta. đ»đ
MantĂ©nganse al tanto de las actualizaciones, siempre habrĂĄ algo nuevo para aprender y mejorar nuestras habilidades de OSINT. ÂĄA leer y a descubrir! đŻ
#OSINT #LibrosOSINT #DocumentosOSINT #EnsayosOSINT #AprendizajeContinuo #InteligenciaDeFuentesAbiertas #Descubrimiento #InvestigaciĂłnOnline đ
Técnicos
Esta sección contiene las publicaciones mås técnicas, a menudo con una superposición en anålisis forense digital.
- Bazzell M. (2023) Open Source Intelligence Techniques. Resources for Searching and Analysing Online Information
- Bazzell, M. (2020) Extreme Privacy. What it takes to Disappear. (four edition)
- Chauhan, S. and N. Panda (2015) Hacking Web Intelligence â Open Source Intelligence and Web Reconnaissance Concepts and Techniques. Syngress.
- Cuesta MartĂn, C. (2019) Fuentes de InformaciĂłn OSINT para la ClasificaciĂłn y SelecciĂłn de Perfiles sobre Repositorios. Thesis, Universidad PolitĂ©cnica de Valencia.
- Hassan, N. and R. Hijazi (2018) Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence. Apress.
- Lallie, H and D. Benford (2011) âChallenging the Reliability of iPhone Geo-tagsâ, The International Journal of Forensic Computer Science, v1, 59-67.
- Seisdedos, Carlos and Aguilera Vicente (2020) Open Source INTelligence (OSINT): Investigar personas e Identidades en Internet
- Shamaeva, I. and Galley, D.M. (2021) Custom Search â Discover more:: A Complete Guide to Google Programmable Search Engines. Taylor & Francis Ltd.
- FĂ©lix Brezo Fernandez y Yaiza Rubio Viñuela – Manual de ciberinvestigaciĂłn en fuentes abiertas: OSINT para analistas
- Joe Gray – Practical Social Engineering: A Primer for the Ethical Hacker
Otros Documentos
- Akhgar, B., Bayerl, P. & F. Sampson (eds.) (2016) Open Source Intelligence Investigation: From Strategy to Implementation. Springer.
- Akın Ănver, H. (2018) Digital Open Source Intelligence and International Security: A Primer. Centre for Economics and Foreign Policy Studies.
- Akhgar, B., Bayerl, P. & F. Sampson (eds.) (2016) Open Source Intelligence Investigation: From Strategy to Implementation. Springer.
- Akın Ănver, H. (2018) Digital Open Source Intelligence and International Security: A Primer. Centre for Economics and Foreign Policy Studies.
- Appel, E. (2011). Internet Searches for Vetting, Investigations, and Open-Source Intelligence. CRC Press.
- Bagnall, J. (1958) âThe Exploitation of Russian Scientific Literature for Intelligence Purposesâ, Studies in Intelligence, Vol 2(3): pp. 45-48.
- Bartlett, J. and C. Miller (2013) The State of the Art: A Literature Review of Social Media Intelligence Capabilities for Counter-Terrorism. London: Demos.
- Bayerl, P. and B. Akhar (2015) Surveillance and Falsification. Implications for Open Source Intelligence Investigationsâ, Communications of the ACM, vol 58(8): pp. 62-69.
- Bean, H. (2007) âThe DNIâs Open Source Center: An Organizational Communication Perspectiveâ, International Journal of Intelligence and CounterIntelligence, Vol. 20 (2): 240-257.
- Becker, J. (1957) âComparative Survey of Soviet and US Access to Published Informationâ, Studies in Intelligence, Vol 1(4): pp. 35-46.
- Best, R. and A. Cumming (2007) Open Source Intelligence (OSINT): Issues for Congress. Congressional Research Service, Washington.
- Blancke, S. (2010) Private Intelligence : geheimdienstliche AktivitÀten nicht-staatlicher Akteure. Dissertation, Freie UniversitÀt Berlin.
- Boerma, M (2020) Open Source Intelligence: De sleutel tot een (vrijwel) ongelimiteerde bron van informatie. Scriptie, Vrije Universiteit, Amsterdam.
- Böhm, I. and S. Lolagar (2021) Open source intelligence. Introduction, legal, and ethical considerationsâ, in International Cybersecurity Law Review, 2:317â337.
- Burke, C. (2007). Freeing knowledge, telling secrets: Open sourceintelligence and development. (Research paper series: Centre for East-West Cultural & Economic Studies; No. 13). Bond University.
- Calkins, L. (2011) âPatrolling the Ether: USâUK Open Source Intelligence Cooperation and the BBCâs Emergence as an Intelligence Agency, 1939â1948â, Intelligence and National Security Vol. 26(1): pp. 1â22.
- Carvalho de Sousa Rodrigues, P. (2019) An OSINT Approach to Automated Asset Discovery and Monitoring. Thesis, Universidade do Porto.
- Colquhoun, C. (2016) A Brief History of Open Source Intelligence. Bellingcat.
- Croom, H. (1969) âThe Exploitation of Foreign Open Sourcesâ, Studies in Intelligence (Summer 1969-declassified article): 129â30.
- Crowder, Nicholas (2015) OSINT Glossary â Guide to keywords, phrases for improved internet search results â Volume I. Crowder Publications.
- Crowe, J. and T. Davidson (2008) âThe âGreyâ Intersection of Open Source Information and Intelligenceâ, Tenth International Conference on Grey Literature: Designing the Grey Grid for Information Society, 8-9 December 2008, Amsterdam.
- Davitch, J.M. (2017) âOpen Sources for the Information Ageâ, Joint Force Quarterly, Vol. 87(4): pp. 18-25.
- Dedijer, S. (1992). Open Sources Solutions, Intelligence and Secrecy, Open Source Solutions Symposium, December, 1-3, Washington, D.C.
- Department of Justice Cybersecurity Unit (2020) Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources. Washington, Computer Crime & Intellectual Property Section Criminal Division U.S. Department of Justice
- Department of the Army (2006) Open Source Intelligence. Field Manual Interim No. 2-22.9
- Director of National Intelligence (2006) National Open Source Enterprise, Intelligence Community Directive 301.
- Dokman, T. and T. Ivanjko (2019) âOpen Source Intelligence (OSINT) Issues and Trendsâ, Review paper in 7th International ConferenceThe Future of Information Sciences INFuture2019: Knowledge in the Digital Age.
- Director of National Intelligence (2015) Analytic Standards, Intelligence Community Directive 203.
- Donnelley, M. (1995) Open Source Intelligence in the Information Age: Opportunities and Challenges. Thesis, Georgetown University.
- Donovan, W. (1946) âIntelligenceâ, in Life Magazine, 30 September 1946, page 108-121.
- Dover, R., M. Goodman and C. Hillebrand (Eds.) The Routledge Handbook of Intelligence Studies. London: Routledge.
- Eldridge, C., C. Hobbs & M. Moran (2018) âFusing algorithms and analysts: open-source intelligence in the age of âBig Dataâ, Intelligence and National Security, 33(3): pp. 391-406.
- Fernandez, M., A. Millington, M. Monday and E. Sarpa (2019) Elementary⊠the Art and Science of Finding Information. BookLocker: St. Petersburg, USA.
- Fuhlhage, M. (2019) Yankee Reporters and Southern Secrets. Journalism, Open Source Intelligence and the coming of the Civil War. Peter Lang: New York, USA.
- Gibson, S. (2004) âOpen source intelligenceâ, The RUSI Journal, 149(1): 16-22.
- Gibson, s. (2007) Open source intelligence (OSINT): a contemporary intelligence lifeline. PhD Thesis, Cranfield University.
- Glassman, M. and M. Ju Kang (2011) âIntelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT)â, Computers in Human Behaviour Vol. 28: pp. 673â682.
- Ghoshal, S. (1983). Corporate Intelligence Gathering â Scanning for International Business Information Thesis, Massachusetts Institute of Technology.
- Gonçalves Evangelista, J., R. Sassi, M. Romero and D. Napolitano (2020) âSystematic Literature Review to Investigate the Application of Open Source Intelligence (OSINT) with Artificial Intelligenceâ, Journal of Applied Security Research.
- Harper, M. (1961) âA New Profession to Aid Managementâ, Journal of Marketing, Vol. 25 (3): pp. 1-6.
- Hauter, J. (2022) A digital open source investigation of how war begins: Ukraineâs Donbas in 2014. Doctoral thesis, University College London.
- Hayes, D. and F. Cappa (2018) âOpen-source intelligence for risk assessmentâ, Business Horizons, Vol. 61(5): pp. 689-697.
- Heuer, R. (2006) The Psychology of Intelligence Analysis.
- Hobbs, C., M. Moran and D. Salisbury (2014) Open Source Intelligence in the Twenty-First Century. London: Palgrave Macmillan.
- Holden-Rhodes, J. (1993) âUnlocking the Secrets: Open Source Intelligence in the War on Drugsâ, in American Intelligence Journal, Spring/Summer 1993, pp. 67-71.
- Holland, B. (2012) Enabling Open Source Intelligence (OSINT) in private social networks. Thesis, Iowa State University.
- Hribar, G., Podbregar, I., & IvanuĆĄa, T. (2014). âOSINT: a âgrey zoneâ?â International Journal of Intelligence and CounterIntelligence, Vol. 27(3): pp. 529-549.
- Hulnick, A. (2002) âThe Downside of Open Source Intelligenceâ, International Journal of Intelligence and CounterIntelligence, Vol. 15, pp. 565-579.
- Hutchinson, R. (1993) âRumor of War An Information Vendor âs View of the Provision of Open -Source ·Data in an Unstable Worldâ, American Intelligence Journal, Spring/Summer 1993, pp. 33-36.
- Irwin, D. and D. Mandel (2019) âImproving information evaluation for intelligence productionâ, Intelligence and National Security, Vol. 34(4): pp. 503-525.
- Johnson, L. (ed.) (2009) Handbook of Intelligence Studies. London: Routledge
- Johnson, L.M. (2013) Establishing Broadcast Monitoring as Open Source Intelligence. The BBC Monitoring Service during the Second World War. Thesis submitted for the degree of Doctor of Philosophy Department of War Studies, Kingâs College London.
- Joint Military Intelligence Training center (1996) Open Source Intelligence: Professional Handbook. Department of Defense.
- Ju, Y. et al. (2020) âStudy on application of open source intelligence from social media in the militaryâ, Journal of Physics: Conference Series 1507.
- Kelley, W. (1965) âMarketing Intelligence for Top Managementâ, The Journal of Marketing, Vol. 29(4): pp. 19-24.
- Kpozehouen et al (2020) âUsing Open-Source Intelligence to Detect Early Signals of COVID-19 in China: Descriptive Studyâ, JMIR Public Health and Surveillance, Vol. 6(3).
- Krejci, R. (2002) Open-source intelligence in the Czech military knowledge system and process design. Thesis, Naval Postgraduate School, Monterey, California.
- Leetaru, K. (2010) âThe Scope of FBIS and BBC Open-Source Media Coverage, 1979â2008â, in Studies in Intelligence Vol. 54, No. 1 (Extracts, March 2010).
- Lepaja, A. (2017) âLe renseignement dâorigine sources ouvertes pour les opĂ©rations militairesâ, Revue DĂ©fense Nationale 2017/5 (N° 800): pp. 161-166.
- Marlin, T. (2019) Detecting Fake News by Combining Cybersecurity, Open-Source Intelligence, and Data Science. Thesis, Utica College.
- Maybir, J. and Chapman, B. (2021) âWeb scraping of ecstasy user reports as a novel tool for detecting drug market trendsâ, in Forensic Science International: Digital Investigation, Vol 37.
- McDermott, Y. A Koenig and D. Murray (2021) âOpen Source Informationâs Blind Spot Human and Machine Bias in International Criminal Investigationsâ, in Journal of International Criminal Justice Vol 19, 85â105.
- Mercado, S. (2001) âOSINT from the Airwaves: FBIS Against the Axis, 1941-1945â, Studies in Intelligence, Vol 11: pp 33-43.
- Mercado, S. (2004) âSailing the Sea of OSINT in the Information Ageâ, Studies in Intelligence, Vol. 48(3): pp. 45-55.
- Miller, B. (2018). âOpen source intelligence (OSINT): An oxymoron?â, International Journal of Intelligence and Counterintelligence, Vol. 31(4), pp. 702-719.
- Minas, H. (2010) Can the Open Source Intelligence emerge as an indispensable discipline for the Intelligence Community in the 21st Century? RIEAS Research Paper 139.
- Monaghan, R. (2019) âLoyalist supergrass trials: an opportunity for open source intelligence?â, Intelligence and National Security, Vol. 34(7): pp. 1014-1026.
- Murray, D., Y. McDermott and K. Alexa Koenig (2022) âMapping the Use of Open Source Research in UN Human Rights Investigationsâ, in Journal of Human Rights Practices, 2022, 1-28.
- Nance, M. (1994) The Generation Gap: Open-Source Information, Intelligence, and the Government. National War College.
- NATO (2002) Open Source Intelligence Handbook.
- NATO (2002) Open Source Intelligence Reader.
- NATO (2002) Intelligence Exploitation of the Internet.
- NATO (2018) âCommunicating Uncertainty, Assessing Information Quality and Risk, and Using Structured Techniques in Intelligence Analysisâ, proceedings of the SAS-114 Workshop held from 5-7 December 2016 in Copenhagen, Denmark.
- Noble, D.F. (2004) Assessing the Reliability of Open Source Information. Proceedings of the 7th International Conference on Information Fusion.
- NoĂ«l, R. (2014) Contribution Ă la veille stratĂ©gique : DOWSER, un systĂšme de dĂ©couverte de sources Web dâintĂ©rĂȘt opĂ©rationnel. ThĂšse de doctorat. Institut National des Sciences AppliquĂ©es de Rouen.
- Norman, D. (2001) How to Identify Credible Sources on the web. Thesis, Faculty of the Joint Military Intelligence College.
- Ogar, S. (2019) Covert Networks â A comparative study of Intelligence Techniques used by Foreign Intelligence Agencies to Weaponize Social Media. MA Thesis Johns Hopskins University, USA.
- Olcott, A. (2012) Open Source Intelligente in a Networked World.
- Omand, D. (2012) âIntroducing Social Media Intelligence (SOCMINT)â, Intelligence and National Security Vol. 27(6): pp. 801â823.
- Omand, D. (2020) How Spies Think: Ten Lessons in Intelligence.
- Pallaris, C. (2008) Open Source Intelligence: A Strategic Enabler of National Security. CSS Analyses in Security, Vol.3, No. 32. ETH, Zurich.
- Pastor-Galindo, J., P. Nespoli, F. Gomez Marmo, and G. Martinez Perez (2020) âThe Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trendsâ, IEEE Access, Vol. 8: pp. 10282-10304.
- Pedersen, T. and P. Jansen (2019) âSeduced by secrecy â perplexed by complexity: effects of secret vs open-source on intelligence credibility and analytic confidenceâ, Intelligence and National Security, Vol. 34(6): pp. 881-898
- Perito, D., C. Castelluccia, M. Kaafar and P. Manils (2011) How Unique and Traceable are Usernames? Conference paper ArXiv.
- Pherson R. and R. Heuer (2020) Structured Analytic Techniques. Sage, London.
- Politi, A. (2000) The birth of OSINT in Italy. International conference OSS 21, Information-Sharing Scenarios Panel, Washington DC.
- Pouchard, L., J. Dobson and J. Trien (2007) A Framework for the Systematic Collection of Open Source Intelligence. Oak Ridge National Laboratory.
- Pringle, Robert W. (2003) âThe Limits of OSINT: Diagnosing the Soviet Media, 1985-1989â, International Journal of Intelligence and Counterintelligence, Vol. 16(2): pp. 280-289.
- Pythian M., (Ed.) (2013) Understanding the Intelligence Cycle. London: Routledge.
- Quick, D. and K. Choo (2018) âDigital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mixâ, Future Generation Computer Systems, Vol. 78(2): pp. 558-567.
- Rasak, M.J. (2021) âEvent Barraging and the Death of Tactical Level Open-Source Intelligenceâ, in Military review, Vol.101 (1), p.48-57.
- Reuser, A.H.P. (2017) âThe RIS Open Source Intelligence Cycleâ, Journal of Mediterranean and Balkan Intelligence, Vol. 10(2): pp. 29-44.
- Roop, J. (1969) Foreign Broadcast Information Service. History, Part I: 1941-1947. CIA.
- Saunders, K. (2000) Open source information: A true collection discipline. Thesis, Royal Military College of Canada.
- Schaurer, F. And J. Storger (2010) The Evolution of Open Source Intelligence. International Relations and Security Networks, Zurich.
- Senekal, B. and E. KotzĂ© (2019) âOpen source intelligence (OSINT) for conflict monitoring in contemporary South Africa: Challenges and opportunities in a big data contextâ, African Security Review, 28:1, 19-37.
- Sibbet, D. (1993) âCommercial Remote -Sensing: Open Source Imagery Intelligenceâ, in American Intelligence Journal, Spring/Summer 1993, pp. 37-40.
- Shamaeva, I. and Galley, D.M. (2021) Custom Search â Discover more:: A Complete Guide to Google Programmable Search Engines. Taylor & Francis Ltd.
- Sigurdson J. and P. Nelson (1991) âIntelligence Gathering and Japan: The Elusive Role of Grey Intelligenceâ, International Journal of Intelligence and CounterIntelligence, Vol. 5(1): pp. 17-34.
Legal y Ătico
- Angus-Anderson, W. (2015) âAuthenticity and Admissibility of Social Media Website Printoutsâ, in Duke Law & Technology Review, Vol 14, pp 33-47.
- Commissie van Toezicht op de Inlichtingen en Veiligheidsdiensten (2022) Automated OSINT: Tools en bronnen voor openbronnenonderzoek. CTIVD rapport 74.
- Cuijpers, C. (2013) âLegal aspects of open source intelligenceâ, The computer law and security report, Vol.29 (6), p.642-653.
- Department of Justice Cybersecurity Unit (2020) Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources. Washington, Computer Crime & Intellectual Property Section Criminal Division U.S. Department of Justice.
- Dubberley, S., A. Koenig and D. Murray (eds) (2019) Digital Witness: Using Open Source Information for Human Rights Investigation, Documentation, and Accountability. Oxford Public International Law.
- Gradecki, J. and D. Curry (2017) âCrowd-Sourced Intelligence Agency: Prototyping countersurveillanceâ, in Big Data & Society, January-June 2017, pp. 1-7.
- Hamilton, R. (2018). User-Generated Evidence. The Columbia Journal of Transnational Law 57(1), pp. 1-61.
- Hiatt, K. (2016). Open Source Evidence on Trial. The Yale Law Journal Forum.
- Hulsen, L. Ten (2020) âOpen Source evidence from the internet â the protection of privacy in civilian criminal investigations using OSINTâ, Amsterdam Law Forum, vol. 12 (2).
- Kidd, J. (2019) âSecret and ethically sensitive researchâ, The Routledge International Handbook of Universities, Security and Intelligence Studies, pp. 265-271. London: Routledge.
- RĂžnn, K. and S. SĂže (2019) âIs social media intelligence private? Privacy in public and the nature of social media intelligenceâ, Intelligence and National security, Vol 34(3), p. 362-378.
- Sampson, F (2017) âIntelligent evidence: Using open source intelligence (OSINT) in criminal proceedingsâ, in The Police Journal: Theory, Practice and Principles, Voil 90(1), pp. 55-69.
- Saugmann, R.(2019) âThe civilianâs visual security paradox: how open source intelligence practices create insecurity for civilians in warzonesâ, Intelligence and National Security, 34:3, 344-361.
- United Nations (2020) Berkeley Protocol on Digital Open Source Investigations. A Practical Guide on the Effective Use of Digital Open Source Information in Investigating Violations of International Criminal, Human Rights and Humanitarian Law.
- Sibbet, D. (1993) âCommercial Remote -Sensing: Open Source Imagery Intelligenceâ, in American Intelligence Journal, Spring/Summer 1993, pp. 37-40.
- Sigurdson J. and P. Nelson (1991) âIntelligence Gathering and Japan: The Elusive Role of Grey Intelligenceâ, International Journal of Intelligence and CounterIntelligence, Vol. 5(1): pp. 17-34.
- Steele, R. (1993) âNational Intelligence and Open Source: From School House to White Houseâ, American Intelligence Journal, Spring/Summer 1993, pp. 29-33.
- Steele, R. (1995) âPrivate enterprise intelligence: Its potential contribution to national securityâ, Intelligence and National Security, Vol. 10(4): 212-228.
- Steele, R. (2004) Special Operations Forces Open Source Intelligence (OSINT) Handbook. OSS International Press, Oakton.
- Steele, R. (2009) âOpen Source Intelligenceâ, in L. Johnson (ed.) Handbook of Intelligence Studies. London: Routledge.
- Störger, J (2008) âDie Rolle von Open Source Intelligence im Rahmen deutscher Sicherheitsinteressen.â Master thesis Ecole nationale dâAdministration, Paris, France.
- Stottlemyre, S. (2015) HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligenceâ, in International Journal of Intelligence and CounterIntelligence, 28:3, pp 578-589.
- Studeman, W. (1993) âTeaching the Giant to Dance: Contradictions and Opportunities in Open Source Information within the Intelligence Communityâ, American Intelligence Journal, Spring/Summer 1993, pp. 11-18.
- Townsend, R. (1993) âDeception and Irony: Soviet Arms and Arms Controlâ, in American Intelligence Journal, Spring/Summer 1993, pp. 47-53.
- Travers, M., L. van Boven and C. Judd (2013) âThe Secrecy Heuristic: Inferring Quality from Secrecy in Foreign Policy Contextsâ, Political Psychology, Vol. 35(1): 97-111.
- Trottier, D. (2015) âOpen source intelligence, social media and law enforcement: Visions, constraints and critiquesâ, in European Journal of Cultural Studies, Vol 18 (4-5), pp. 530-547.
- U.S. Army (2006) Open Source Intelligence. Field Manual Interim No. 2-22.9. Washington, DC.
- U.S. Army (2012) ATP 2-22.9 Open-Source Intelligence. Headquarters, Department of the Army.
- U.S. Army (2013) JP 2-0 Joint Intelligence. Chiefs of Staff, United States Army.
- U.S. Department of Defence (2021) Dictionary of Military and Associated Terms. Washington, DC.
- Umphress, D. (2005) âDiving the Digital Dumpster: The Impact of the Internet on Collecting Open-Source Intelligenceâ, Air & Space Power Journal, Vol. 19 (4): pp. 82-91.
- Wallner, P. (1993) Open Sources and the Intelligence Community: Myths and Realitiesâ, in American Intelligence Journal, Spring/Summer 1993, pp. 19-24.
- Waltz, E. (2003) Knowledge Management in the Intelligence Enterprise. Artech House.
- Watson, D. (2007) âStealing corporate secrets using open source intelligence (the practitionerâs view)â, International Journal of Electronic Security and Digital Forensics (IJESDF), 1(1).
- Watson, D. (2010) âOpen Source Intelligenceâ, Handbook of Electronic Security and Digital Forensics, pp. 263-277.
- Wells, D. and H. Gibson (2017) âOSINT from a UK perspective: considerations from the law enforcement and military domainsâ, in Proceedings Estonian Academy of Security Sciences, 16 : From Research to Security Union. Estonian Academy of Security Sciences, pp. 84-113.
- Westcott, C. (2019) âOpen source intelligence Academic research, journalism or spying?â, in The Routledge International Handbook of Universities, Security and Intelligence Studies, pp. 383-393. London: Routledge.
- Wheatley, B. (2017) British Intelligence and Hitlerâs Empire in the Soviet Union 1941-1945. London: Bloomsbury Academic.
- Wheatley, B. (2018) âBritish open source intelligence (OSINT) and the Holocaust in the Soviet Union: persecution, extermination and partisan warfareâ, Intelligence and National Security, Vol. 33(3): pp. 422-438.
- Williams, H. and I. Blum (2018) Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise. RAND Research report.
- Wirtz J. and J. Rosenwasser (2010) âFrom Combined Arms to Combined Intelligence: Philosophy, Doctrine and Operationsâ, Intelligence and National Security, Vol. 25(6): pp. 725â743.
- Yates, A. and N. Zvegintzov (1999) âA Siberian reality check on open source informationâ, Aslib Proceedings, Vol. 51(6): pp. 175-186.
- Ziolkowska, A. (2018) âOpen Source Intelligence (OSINT) as an element of Military reconâ, in Security and Defence Quarterly, 19(2).
Aplicaciones
Esta secciĂłn contiene artĂculos que muestran aplicaciones de investigaciĂłn de la vida real de las herramientas y tĂ©cnicas OSINT.
- Kpozehouen et al (2020) âUsing Open-Source Intelligence to Detect Early Signals of COVID-19 in China: Descriptive Studyâ, JMIR Public Health and Surveillance, Vol. 6(3).
- Maybir, J. and Chapman, B. (2021) âWeb scraping of ecstasy user reports as a novel tool for detecting drug market trendsâ, in Forensic Science International: Digital Investigation, Vol 37.
- Yates, A. and N. Zvegintzov (1999) âA Siberian reality check on open source informationâ, Aslib Proceedings, Vol. 51(6): pp. 175-186.