Librería OSINT [Actualizado 29/12/2020]

Si lo que quieres es tener una verdadera Biblioteca Osint ahí va una recopilación importante

  • Akhgar, B., Bayerl, P. & F. Sampson (eds.) (2016) Open Source Intelligence Investigation: From Strategy to Implementation. Springer.
  • Akın Ünver, H. (2018) Digital Open Source Intelligence and International Security: A Primer. Centre for Economics and Foreign Policy Studies.
  • Appel, E. (2011). Internet Searches for Vetting, Investigations, and Open-Source Intelligence. CRC Press.
  • Bagnall, J. (1958) ‘The Exploitation of Russian Scientific Literature for Intelligence Purposes‘, Studies in Intelligence, Vol 2(3), pp. 45-48.
  • Bayerl, P. and B. Akhar (2015) Surveillance and Falsification. Implications for Open Source Intelligence Investigations’, Communications of the ACM, vol 58(8), pp. 62-69.
  • Bean, H. (2007) ‘The DNI’s Open Source Center: An Organizational Communication Perspective’, International Journal of Intelligence and CounterIntelligence, Vol. 20 (2): 240-257.
  • Becker, J. (1957) ‘Comparative Survey of Soviet and US Access to Published Information‘, Studies in Intelligence, Vol 1(4), pp. 35-46.
  • Best, R. and A. Cumming (2007) Open Source Intelligence (OSINT): Issues for Congress. Congressional Research Service. Washington.
  • Blancke, S. (2010) Private Intelligence : geheimdienstliche Aktivitäten nicht-staatlicher Akteure. Dissertation, Freie Universität Berlin.
  • Boerma, M (2020) Open Source Intelligence: De sleutel tot een (vrijwel) ongelimiteerde bron van informatie. Scriptie, Vrije Universiteit, Amsterdam.
  • Calkins, L. (2011) ‘Patrolling the Ether: US–UK Open Source Intelligence Cooperation and the BBC’s Emergence as an Intelligence Agency, 1939–1948’, Intelligence and National Security Vol. 26, No. 1, 1–22.
  • Carvalho de Sousa Rodrigues, P. (2019) An OSINT Approach to Automated Asset Discovery and Monitoring. Thesis, Universidade do Porto.
  • Croom, H. (1969) ‘The Exploitation of Foreign Open Sources’, Studies in Intelligence (Summer 1969-declassified article): 129–30.
  • Crowder, Nicholas (2015) OSINT Glossary – Guide to keywords, phrases for improved internet search results – Volume I and II. Crowder Publications.
  • Crowe, J. and T. Davidson (2008) ‘The „Grey” Intersection of Open Source Information and Intelligence’, Tenth International Conference on Grey Literature: Designing the Grey Grid for Information Society, 8-9 December 2008, Amsterdam.
  • Davitch, J.M. (2017) ‘Open Sources for the Information Age’, Joint Force Quarterly, Vol. 87, 4th Quarter, page 18-25.
  • Dedijer, S. (1992). Open Sources Solutions, Intelligence and Secrecy, Open Source Solutions Symposium, December, 1-3, Washington, D.C.
  • Department of Justice Cybersecurity Unit (2020) Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources. Washington, Computer Crime & Intellectual Property Section Criminal Division U.S. Department of Justice
  • Department of the Army (2006) Open Source Intelligence. Field Manual Interim No. 2-22.9
  • Director of National Intelligence (2015) Analytic Standards, Intelligence Community Directive 203.
  • Donnelley, M. (1995) Open Source Intelligence in the Information Age: Opportunities and Challenges. Thesis, Georgetown University.
  • Dover, R., M. Goodman and C. Hillebrand (Eds.) The Routledge Handbook of Intelligence Studies. London: Routledge.
  • Eldridge, C., C. Hobbs & M. Moran (2018) ‘Fusing algorithms and analysts: open-source intelligence in the age of ‘Big Data’, Intelligence and National Security, 33:3, 391-406.
  • Fair, W. (1966) ‘The Corporate CIA—A Prediction of Things to Come’,  Management Science 12(10): 489-503.
  • Gibson, S. (2004) ‘Open source intelligence’, The RUSI Journal, 149(1): 16-22.
  • Glassman, M. and M. Ju Kang (2011) ‘Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT)’, Computers in Human Behaviour 28 (2012) 673–682.
  • Ghoshal, S. (1983). Corporate Intelligence Gathering – Scanning for International Business Information Thesis, Massachusetts Institute of Technology.
  • Gonçalves Evangelista, J., R. Sassi, M. Romero and D. Napolitano (2020) ‘Systematic Literature Review to Investigate the Application of Open Source Intelligence (OSINT) with Artificial Intelligence’, Journal of Applied Security Research.
  • Harper, M. (1961) ‘A New Profession to Aid Management’, Journal of Marketing, Vol. 25, No.3 (1-6).
  • Hayes, D. and F. Cappa (2018) ‘Open-source intelligence for risk assessment’, Business Horizons Volume 61, Issue 5, Pages 689-697.
  • Heuer, R. (2006) The Psychology of Intelligence Analysis.
  • Hobbs, C., M. Moran and D. Salisbury (2014) Open Source Intelligence in the Twenty-First Century. London: Palgrave Macmillan.
  • Holland, B. (2012) Enabling Open Source Intelligence (OSINT) in private social networks. Thesis, Iowa State University.
  • Hribar, G., Podbregar, I., & Ivanuša, T. (2014). ‘OSINT: a “grey zone”?’ International Journal of Intelligence and CounterIntelligence, 27(3), 529-549.
  • Hulnick, A. (2002) ‘The Downside of Open Source Intelligence’, International Journal of Intelligence and CounterIntelligence, 15: 565-579.
  • Irwin, D. and D. Mandel (2019) ‘Improving information evaluation for intelligence production’, Intelligence and National Security, 34:4, 503-525.
  • Johnson, L. (ed.) (2009) Handbook of Intelligence Studies. London: Routledge.
  • Joint Military Intelligence Training center (1996) Open Source Intelligence: Professional Handbook. Department of Defense.
  • Ju, Y. et al. (2020) ‘Study on application of open source intelligence from social media in the military’, Journal of Physics: Conference Series 1507.
  • Kelley, W. (1965) ‘Marketing Intelligence for Top Management’, The Journal of Marketing, Vol. 29, No. 4: 19-24.
  • Lepaja, A. (2017) ‘Le renseignement d’origine sources ouvertes pour les opérations militaires’, Revue Défense Nationale 2017/5 (N° 800), p. 161-166.
  • Marlin, T. (2019) Detecting Fake News by Combining Cybersecurity, Open-Source Intelligence, and Data Science. Thesis, Utica College.
  • Mercado, S. (2004) ‘Sailing the Sea of OSINT in the Information Age‘, Studies in Intelligence Vol. 48, No.3 , p 45-55.
  • Miller, B. (2018). ‘Open source intelligence (OSINT): An oxymoron?’, International Journal of Intelligence and Counterintelligence, 31(4), 702-719.
  • Monaghan, R. (2019) ‘Loyalist supergrass trials: an opportunity for open source intelligence?’, Intelligence and National Security, 34:7, 1014-1026.
  • Nance, M. (1994) The Generation Gap: Open-Source Information, Intelligence, and the Government. National War College.
  • NATO (2002) Open Source Intelligence Handbook.
  • NATO (2002) Open Source Intelligence Reader.
  • NATO (2002) Intelligence Exploitation of the Internet.
  • NATO (2018) ‘Communicating Uncertainty, Assessing Information Quality and Risk, and Using Structured Techniques in Intelligence Analysis’, proceedings of the SAS-114 Workshop held from 5-7 December 2016 in Copenhagen, Denmark.
  • Noël, R. (2014) Contribution à la veille stratégique : DOWSER, un système de découverte de sources Web d’intérêt opérationnel. Thèse de doctorat. Institut National des Sciences Appliquées de Rouen.
  • Norman, D. (2001) How to Identify Credible Sources on the web. Thesis, Faculty of the Joint Military Intelligence College.
  • Olcott, A. (2012) Open Source Intelligente in a Networked World.
  • Omand, D. (2012) ‘Introducing Social Media Intelligence (SOCMINT)’, Intelligence and National Security Vol. 27, No. 6, 801–823.
  • Omand, D. (2020) How Spies Think: Ten Lessons in Intelligence.
  • Pastor-Galindo, J., P. Nespoli, F. Gomez Marmo, and G. Martinez Perez (2020) ‘The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends‘, IEEE Access, Vol. 8, p. 10282-10304.
  • Pedersen, T. and P. Jansen (2019) ‘Seduced by secrecy – perplexed by complexity: effects of secret vs open-source on intelligence credibility and analytic confidence’, Intelligence and National Security, 34:6, 881-898
  • Pherson R. and R. Heuer (2020) Structured Analytic Techniques. Sage, London.
  • Politi, A. (2000) The birth of OSINT in Italy. International conference OSS 21, Information-Sharing Scenarios Panel, Washington DC.
  • Pouchard, L., J. Dobson and J. Trien (2007) A Framework for the Systematic Collection of Open Source Intelligence. Oak Ridge National Laboratory.
  • Pringle, Robert W. (2003) ‘The Limits of OSINT: Diagnosing the Soviet Media, 1985-1989’, International Journal of Intelligence and Counterintelligence, 16(2): 280-289.
  • Pythian M., (Ed.) (2013) Understanding the Intelligence Cycle. London: Routledge.
  • Quick, D. and K. Choo (2018) ‘Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix’, Future Generation Computer Systems, Vol 78, Part 2, Pages 558-567.
  • Reuser, A.H.P. (2017) ‘The RIS Open Source Intelligence Cycle’, Journal of Mediterranean and Balkan Intelligence, Vol. 10,no.2, p. 29-44.
  • Roop, J. (1969) Foreign Broadcast Information Service. History, Part I: 1941-1947. CIA.
  • Saunders, K. (2000) Open source information: A true collection discipline. Thesis, Royal Military College of Canada.
  • Schaurer, F. And J. Storger (2010) The Evolution of Open Source Intelligence. International Relations and Security Networks, Zurich.
  • Sigurdson J. and P. Nelson (1991) ‘Intelligence Gathering and Japan: The Elusive Role of Grey Intelligence’, International Journal of Intelligence and CounterIntelligence, 5 (1): 17-34.
  • Steele, R. (1993) ‘National Intelligence and Open Source: From School House to White House‘, American Intelligence Journal, pp. 29-33.
  • Steele, R. (1995) ‘Private enterprise intelligence: Its potential contribution to national security”, Intelligence and National Security, 10 (4): 212-228.
  • Steele, R. (2004) Special Operations Forces Open Source Intelligence (OSINT) Handbook. OSS International Press, Oakton.
  • Steele, R. (2009) ‘Open Source Intelligence’, in L. Johnson (ed.) Handbook of Intelligence Studies. London: Routledge.
  • Studeman, W. (1993) ‘Teaching the Giant to Dance: Contradictions and Opportunities in Open Source Information within the Intelligence Community‘, American Intelligence Journal, pp. 11-18.
  • Travers, M., L. van Boven and C. Judd (2013) ‘The Secrecy Heuristic: Inferring Quality from Secrecy in Foreign Policy Contexts’, Political Psychology, Vol. 35 (1): 97-111.
  • Umphress, D. (2005) ‘Diving the Digital Dumpster: The Impact of the Internet on Collecting Open-Source Intelligence’, Air & Space Power Journal, Vol. 19 (4): 82-91.
  • Waltz, E. (2003) Knowledge Management in the Intelligence Enterprise. Artech House.
  • Watson, D. (2007) ‘Stealing corporate secrets using open source intelligence (the practitioner’s view)’, International Journal of Electronic Security and Digital Forensics (IJESDF), 1(1).
  • Watson, D. (2010) ‘Open Source Intelligence’, Handbook of Electronic Security and Digital Forensics, pp. 263-277.
  • Westcott, C. (2019) ‘Open source intelligence Academic research, journalism or spying?’, in The Routledge International Handbook of Universities, Security and Intelligence Studies, pp. 383-393. London: Routledge.
  • Wheatley, B. (2018) ‘British open source intelligence (OSINT) and the Holocaust in the Soviet Union: persecution, extermination and partisan warfare’, Intelligence and National Security, 33:3, 422-438.
  • Williams, H. and I. Blum (2018) Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise. RAND Research report.
  • Wirtz J. and J. Rosenwasser (2010) ‘From Combined Arms to Combined Intelligence: Philosophy, Doctrine and Operations’, Intelligence and National Security Vol. 25, No. 6, 725–743.
  • Yates, A. and N. Zvegintzov (1999) ‘A Siberian reality check on open source information’, Aslib Proceedings, Vol 51, No.6, p. 175-186.

Legal y Ético

  • Cuijpers, C. (2013) ‘Legal aspects of open source intelligence’, The computer law and security report, Vol.29 (6), p.642-653.
  • Dubberley, S., A. Koenig and D. Murray (eds) (2019) Digital Witness: Using Open Source Information for Human Rights Investigation, Documentation, and Accountability. Oxford Public International Law.
  • Hulsen, L. Ten (2020) ‘Open Source evidence from the internet – the protection of privacy in civilian criminal investigations using OSINT’, Amsterdam Law Forum, vol. 12 (2).
  • Kidd, J. (2019) ‘Secret and ethically sensitive research’, The Routledge International Handbook of Universities, Security and Intelligence Studies, pp. 265-271. London: Routledge.
  • Rønn, K. and S. Søe (2019) ‘Is social media intelligence private? Privacy in public and the nature of social media intelligence’, Intelligence and National security, Vol 34(3), p. 362-378.
  • Saugmann, R.(2019) ‘The civilian’s visual security paradox: how open source intelligence practices create insecurity for civilians in warzones’, Intelligence and National Security, 34:3, 344-361.
  • United Nations (2020) Berkeley Protocol on Digital Open Source Investigations. A Practical Guide on the Effective Use of Digital Open Source Information in Investigating Violations of International Criminal, Human Rights and Humanitarian Law.

Técnicos

Bazzell, M. (2019) Open Source Intelligence Techniques. Resources for Searching and Analysing Online Information (7th edition, note: 8th edition upcoming in Q1 2021).

Bazzell, M. (2020) Extreme Privacy. What it takes to Disappear. (second edition)

Chauhan, S. and N. Panda (2015) Hacking Web Intelligence – Open Source Intelligence and Web Reconnaissance Concepts and Techniques. Syngress.

Cuesta Martín, C. (2019) Fuentes de Información OSINT para la Clasificación y Selección de Perfiles sobre Repositorios. Thesis, Universidad Politécnica de Valencia.

Hassan, N. and R. Hijazi (2018) Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence. Apress.

Lallie, H and D. Benford (2011) ‘Challenging the Reliability of iPhone Geo-tags’, The International Journal of Forensic Computer Science, v1, 59-67.

Seisdedos, Carlos and Aguilera Vicente (2020) Open Source INTelligence (OSINT): Investigar personas e Identidades en Internet

FUENTE: Blockint.nl

Etiquetas:, ,

Añadir un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

*

code

17 + nueve =