Abstract
This chapter looks at the essential applications, websites and services used by practitioners to form their OSINT toolkit, which may range from simple browser plug-ins to online services, reference databases and installed applications and every practitioner will have their list of favourites. The chapter does not recommend a particular piece of software or service or give detailed advice for specific system set-ups, rather it aims to equip the reader and their organisation with a framework to assess the tools at their disposal to give them some reassurance that they are suitable for their OSINT investigation and can demonstrate that they are secure, reliable, and legal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
OSINT Training by Michael Bazzell’: https://inteltechniques.com/links.html, accessed April 2016; www.uk-osint.net, accessed April 2016. http://www.uk-osint.net/; ‘OSINTINSIGHT’: http://www.osintinsight.com/index.php, accessed April 2016; Toddington Resources: https://www.toddington.com/resources/, accessed April 2016.
- 2.
http://www.avg.com/gb-en/eula—“Authorized Purposes means with respect to Free Solutions and Beta Solutions, your personal, non-commercial use”.
https://www.avast.com/en-gb/eula-avast-free-products—“You are not permitted to use the Software in connection with the provision of any commercial services…”.
- 3.
For wider challenges in a law enforcement environment see Sampson (2015).
References
Association of Chief Police Officers (2013). Online research and investigation [Online]. Available at: http://library.college.police.uk/docs/appref/online-research-and-investigation-guidance.pdf. Accessed May 2016
blue_beetle (2010). User-driven discontent [Online]. Available at: http://www.metafilter.com/95152/Userdriven-discontent#3256046. Accessed April 2016
CESG (2015a) Principles of effective cyber security risk management [Online]. Available at: https://www.gov.uk/government/publications/principles-of-effective-cyber-security-risk-management/principles-of-effective-cyber-security-risk-management. Accessed April 2016
CESG (2015b) Principles of effective cyber security risk management—GOV.UK [Online]. Available at: https://www.gov.uk/government/publications/principles-of-effective-cyber-security-risk-management/principles-of-effective-cyber-security-risk-management. Accessed September 2015
CESG (n.d.) End user devices security and configuration guidance—GOV.UK [Online]. Available at: https://www.gov.uk/government/collections/end-user-devices-security-guidance. Accessed September 2015
Creative Commons (2014) NonCommercial interpretation [Online]. Available at: https://wiki.creativecommons.org/wiki/NonCommercial_interpretation. Accessed September
Parliament (2011) Public bill committee—protection of freedoms bill [Online]. Available at: http://www.publications.parliament.uk/pa/cm201011/cmpublic/protection/memo/pf50.htm. Accessed April 2016
Sampson F (2014) Cyberspace: the new frontier for policing? In: Akhgar B et al (eds) Cyber crime and cyber terrorism investigator’s handbook. Elsevier, Oxford
Sampson F (2015) The legal challenges of big data in law enforcement. In: Akhgar B et al (eds) Application of big data for national security. Elsevier, Oxford, pp 229–237
Schofield J (2002) Beware proprietary data formats [Online]. Available at: http://www.computerweekly.com/opinion/Beware-proprietary-data-formats. Accessed June 2016
Surveillance Commissioner (2012) Annual report of the surveillance commissioner 2011–12. Office of the Surveillance Commissioner, London
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this chapter
Cite this chapter
Revell, Q., Smith, T., Stacey, R. (2016). Tools for OSINT-Based Investigations. In: Akhgar, B., Bayerl, P., Sampson, F. (eds) Open Source Intelligence Investigation. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-47671-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-47671-1_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47670-4
Online ISBN: 978-3-319-47671-1
eBook Packages: Computer ScienceComputer Science (R0)