OSINT

Ace your homework & exams now with Quizwiz!

Collection Principles and OSINT

-Knowing the adversary -The Commander's needs are paramount -Ensure unity of the intelligence effort -Plan for operations -Use an all-source approach

Open Source

A person or group that provides information without the expectation of privacy- the information, the relationship, or both is not protected against public disclosure

Worms

A standalone malware computer program, which replicates itself in order to spread to other computers

Open Source Collection Acquisition Requirement - Management System (OSCAR-MS)

A tool the CG uses to manage some of its IC open source collection requirements -The ICC coordinates and processes internal collection request for open source information, as well as requests from the are -2s/MIFCS, and submits them into ______ for collection by the IC

Grey Literature

Academia by published people -Scholarly papers/Sources -Produced by .gov -Maps -Dictionaries

Collection Plan

An organized mechanism for gathering information against a specific target in a systematic way

Trojan

Any malicious computer program, which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it

US Citizen Restrictions

CG personnel SHALL NOT collect information regarding US citizens or lawful permanent residents solely for the purpose of monitoring activities protected by the constitution

Mandatory Disclosure

CGI SHALL FULLY disclose their affiliation with the CG when requested -unless otherwise authorized in accordance with applicable directives

Bots

Can perform a variety of tasks from sending spam to blasting websites off the internet as part of a coordinated "denial-of-service" attack

Authenticity

Can you validate that source is what it claims to be

Ransomware

Computer malware that installs covertly on a victim's device (i.e. computer, smartphone, etc) and that either mounts an extortion attack from that or holds the victim's data hostage until a ransom is paid.

Virus

Computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and usually performs a malicious action

Publically Available Information

Data, facts, instructions, or other material published or broadcast for general public consumption; available on request to a member of the general public; lawfully seen or heard by any casual observer; or made available at a meeting open to the general public

Relevance

Does the information relate to what is being collected on?

Boolean

Help narrow the search focus -to limit, broaden, or define searches

Authoritativeness

Is the information from a primary source -Professor

Deception

Misleading, incorrect, or attempts to divert attention by providing false excuses, false promises, mimicking, and lying

Cookies

Not malware, but nonetheless pose certain concerns since they hold a modest amount of data specific to a particular client and website

Open-Source Intelligence (OSINT)

Produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence and information requirement

Search Engine

Program that searches for and identifies items in a database that corresponds to keywords or characters specified by the user

Open Source Information

Publicly available information that anyone can lawfully obtain by request, purchase, or observation. -publicly available

Trustworthyness

Rely on what the source says

Research Plan

Should provide the info needed to help guide research efforts that support the collection plan -Info that is beneficial can include background, data, main concepts, and trends -Helps the researcher ensure research efforts are thoroughly conducted

Spyware

Software that aims to gather information about a person or organization without their knowledge, which may send such information to another entity without the consumer's consent, or asserts control over a device without the consumer's knowledge

OSINT Collection

The collection of open source information includes local broadcasts, newspapers, periodicals, books, wikis, blogs, news sites, community websites, and social networking

Social Media

The sphere of websites, applications, and web-based tools that focus on connecting users to engage in dialogue, share information and media, collaborate, and interact

Maintains Collection Plans

The unit in accordance with the information and Life Cycle Management Manual, COMDTINST M5212.12 -Overt - District Commander -CGI assistance to other IC agencies - CG-2 -Cgi assistance to law enforcement partners - inside DHS -Sector -Ourtise DHS - District Commander

Standard Workstations

Used for conducting authorized on-line open source research activities -The use of personal computers for official open source research is not authorized

CG Non-Standard Computers

Utilizing commercial internet access is authorized with the approval of the commanding officer and supervisory intelligence staff

Competency

knowledgeable of the issue


Related study sets

Texas State Supplement- Module 1

View Set

Chapter 12-Intro to Nervous System

View Set

Chapter 25: Growth and Development of the Newborn and Infant

View Set

CISSP Domain 4 Communications and Network Security

View Set

Chemistry (Practice Exam Closer Look Part 2)

View Set

Pharmacology Prep U Level 5-8 Chapter 47 Lipid Lowering Agents

View Set

Intro into Criminal Justice Quiz 1

View Set

Lab 20: Introduction to Immunology Simulation

View Set

Torts - Trespass to Land and Chattels

View Set