Use Cases and Best Practices for LEAs

Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

The dramatic increase in the use and proliferation of the internet over the last 15–20 years has seen increasingly large amounts of personal information made, not necessarily intentionally, available online. Consequently, law enforcement agencies have recognised they must open their eyes to this information and begin to use it to their advantage, especially since one of the key benefits of utilising open source information is that it is significantly less expensive to collect than other intelligence. This chapter illustrates how OSINT has become increasingly important to LEAs. It discusses how those carrying out open source intelligence investigation work online might best go about such a practice through the use of specific techniques and how an officer may protect themselves while carrying out such an investigation. It further presents exemplar case studies in how these best practices may, or already have been, exploited in order to bring about tangible results in real investigations.

Keywords

Police Officer Internet Protocol Address Social Platform Digital Footprint General Data Protection Regulation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Association of Chief Police Officers (2013) Online research and investigation. Available online: http://library.college.police.uk/docs/appref/online-research-and-investigation-guidance.pdf
  2. Bradbury D (2011) In plain view: open source intelligence. Comput Fraud Secur 4:5–9Google Scholar
  3. CEOP (2008) UK police uncover global online paedophile network. Available online: https://www.ceop.police.uk/Media-Centre/Press-releases/2008/UK-police-uncover-global-online-paedophile-network/
  4. College of Policing (2013) Information management: collection and recording. In: Authorised professional practice; Available online: https://www.app.college.police.uk/app-content/information-management/management-of-police-information/collection-and-recording/#categorising-police-information
  5. Edwards S, Constable D, Scotland, N (1999) SO11 open source unit presentation. In: EuroIntel’ 99 PROCEEDINGS E1-European intelligence forum “creating a virtual previous next intelligence community in the European region”, pp. 1–33Google Scholar
  6. HMIC (Her Majesty’s Inspectorate of Constabulary) (2014) An Inspection of undercover policing in England and Wales. Available online: https://www.justiceinspectorates.gov.uk/hmic/publications/an-inspection-of-undercover-policing-in-england-and-wales/
  7. Hope C (2013) Facebook is a “major location for online child sexual grooming”, head of child protection agency says. In: The telegraph. http://www.telegraph.co.uk/technology/facebook/10380631/Facebook-is-a-major-location-for-online-child-sexual-grooming-head-of-child-protection-agency-says.html
  8. Kiss J (2013) Facebook UK loses 600,000 users in December. In: The guardian. https://www.theguardian.com/technology/2013/jan/14/facebook-loses-uk-users-december
  9. Lee D (2013) Boston bombing: how internet detectives got it very wrong. In: BBC News. http://www.bbc.co.uk/news/technology-22214511
  10. Martellozzo E (2015) Policing online child sexual abuse-the British experience. Eur J Policing Stud 3(1):32–52Google Scholar
  11. Montgomery D, Horwitz S, Fisher M (2013) Police, citizens and technology factor into Boston bombing probe. In: The Washington post. https://www.washingtonpost.com/world/national-security/inside-the-investigation-of-the-boston-marathon-bombing/2013/04/20/19d8c322-a8ff-11e2-b029-8fb7e977ef71_print.html
  12. Murray R (2012) Man steals gas from cop car, gets caught after he posts pic of theft on Facebook. In: NY Daily News. http://www.nydailynews.com/news/crime/man-steals-gas-car-caught-posts-pic-theft-facebook-article-1.1063916
  13. Quinn B (2011) Social network users have twice as many friends online as in real life. In: The guardian. http://www.theguardian.com/media/2011/may/09/social-network-users-friends-online
  14. Schaurer F, Storger J (2013) The evolution of Open Source Intelligence (OSINT). Comput Hum Behav 19:53–56Google Scholar
  15. Silk H (2015). Paedophile snared after arranging to meet 12-year-old victim who was actually an undercover police officer. In: The mirror. http://www.mirror.co.uk/news/uk-news/paedophile-snared-after-arranging-meet-6414747
  16. TechUK (2014) TechUK launches “Breaking down barriers” report. In: TechUK. https://www.techuk.org/insights/reports/item/2302-techuk-launches-breaking-down-barriers-report
  17. Tickle L (2012) How police investigators are catching paedophiles online. In: The guardian. http://www.theguardian.com/social-care-network/2012/aug/22/police-investigators-catching-paedophiles-online
  18. Topping A (2009) Fugitive caught after updating his status on Facebook. In: The guardian. https://www.theguardian.com/technology/2009/oct/14/mexico-fugitive-facebook-arrest
  19. Wang T (2013) 2+ years, 15MM users in UK, teams in 6 EU countries, excited to return to HQ and home. Proud to hand off to incredible European leadership! In: Twitter. https://twitter.com/TonyW/status/375889809153462272
  20. Yaniv O (2012) Cop helps take down Brooklyn crew accused of burglary spree by friending them on Facebook. In: NY Daily News. http://www.nydailynews.com/new-york/helps-brooklyn-crew-accused-burglary-spree-friending-facebook-article-1.1086892

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  1. 1.CENTRIC/Sheffield Hallam UniversitySheffieldUK

Personalised recommendations