Explore chapters and articles related to this topic
A Field Trial to Investigate Human Pheromones Associated with Hostile Intent
Published in Alex Stedmon, Glyn Lawson, Hostile Intent and Counter-Terrorism, 2017
Peter Eachus, Alex Stedmon, Les Baillie
Modern terrorist operations are sophisticated and to be successful they must be based on sound intelligence. This intelligence can take many forms and may be obtained using a variety of techniques and technologies (Linett, 2005). Open-source intelligence is readily available via the Internet, where it is possible to gain access to maps detailing locations of potential targets. Furthermore, potential terrorists can view targets at street level through tools such as Google Streetview. Although in the initial planning stages this level of intelligence may be useful, more detailed intelligence is often required and this can only be obtained by physical reconnaissance of the intended target (Cannon, 2004).
Improving Situation Awareness in Social Unrest Using Twitter
Published in Michael D. McNeese, Eduardo Salas, Mica R. Endsley, Fields of Practice and Applied Solutions within Distributed Team Cognition, 2020
Peter K. Forster, Samantha Weirman
Burgeoning open source intelligence (OSINT), available through social media and interconnectivity, demands a re-evaluation of how information is gathered and intelligence created. This chapter embraces the notion that networks are constantly changing based upon events and the framing and dissemination of information used to interpret those events. It thus contributes to a better understanding of an evolving intelligence environment. Within this study, the authors present examples to demonstrate how synthesized Twitter content reflects real-world events. Specifically, this chapter explores the relationship between patterns of Twitter communications and associated offline (i.e. real-world) events during civil unrest. It demonstrates the alignment of popular words and phrases with real-world events, offering a proof of concept for real-time narrative construction through n-gram and noun phrase extraction. It postulates that tracking patterns in online social media data can improve offline situation awareness and decision making by providing insights into what people are talking about, how they are organizing and contextualizing their messages, and how people feel about the topics and themes being discussed. In essence, synthesis of individual social media messages may produce a story from which indicators and warnings of group-level behavior can be derived.
Cyberspace and Emergency Management
Published in Michael L. Madigan, Handbook of Emergency Management Concepts, 2017
Cyber threat intelligence (CTI) is an “elusive” concept. While cybersecurity comprises the recruitment of IT security experts and the deployment of technical means, to protect an organization’s critical infrastructure or intellectual property, CTI is based on the collection of intelligence using open-source intelligence (OSINT), social media intelligence, human intelligence (HUMINT), or intelligence from the deep and dark web. CTI’s key mission is to research and analyze trends and technical developments in three areas:
Development of a Scale to Measure Cybercrime-Awareness on Social Media
Published in Journal of Computer Information Systems, 2023
Prior studied indicated that although the usage of social media enhanced the business opportunities, they also brought several security issues for individuals as well as organizations. For example, a systematic review evaluated 18 publications to explore the effect of social media platforms for OSINT (open-source intelligence) concept.29 The results indicated that usage of social media increased social cohesion as well as enhanced the business opportunities. The social media data were used to identify the terrorist group communications by analyzing the collected crime data. Most of the reviewed studies showed that social engineering attacks increase the level of risks on social media platforms. However, the social engineering threats could be mitigated with increasing users’ awareness level.