OSINT
Collection Principles and OSINT
-Knowing the adversary -The Commander's needs are paramount -Ensure unity of the intelligence effort -Plan for operations -Use an all-source approach
Open Source
A person or group that provides information without the expectation of privacy- the information, the relationship, or both is not protected against public disclosure
Worms
A standalone malware computer program, which replicates itself in order to spread to other computers
Open Source Collection Acquisition Requirement - Management System (OSCAR-MS)
A tool the CG uses to manage some of its IC open source collection requirements -The ICC coordinates and processes internal collection request for open source information, as well as requests from the are -2s/MIFCS, and submits them into ______ for collection by the IC
Grey Literature
Academia by published people -Scholarly papers/Sources -Produced by .gov -Maps -Dictionaries
Collection Plan
An organized mechanism for gathering information against a specific target in a systematic way
Trojan
Any malicious computer program, which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it
US Citizen Restrictions
CG personnel SHALL NOT collect information regarding US citizens or lawful permanent residents solely for the purpose of monitoring activities protected by the constitution
Mandatory Disclosure
CGI SHALL FULLY disclose their affiliation with the CG when requested -unless otherwise authorized in accordance with applicable directives
Bots
Can perform a variety of tasks from sending spam to blasting websites off the internet as part of a coordinated "denial-of-service" attack
Authenticity
Can you validate that source is what it claims to be
Ransomware
Computer malware that installs covertly on a victim's device (i.e. computer, smartphone, etc) and that either mounts an extortion attack from that or holds the victim's data hostage until a ransom is paid.
Virus
Computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and usually performs a malicious action
Publically Available Information
Data, facts, instructions, or other material published or broadcast for general public consumption; available on request to a member of the general public; lawfully seen or heard by any casual observer; or made available at a meeting open to the general public
Relevance
Does the information relate to what is being collected on?
Boolean
Help narrow the search focus -to limit, broaden, or define searches
Authoritativeness
Is the information from a primary source -Professor
Deception
Misleading, incorrect, or attempts to divert attention by providing false excuses, false promises, mimicking, and lying
Cookies
Not malware, but nonetheless pose certain concerns since they hold a modest amount of data specific to a particular client and website
Open-Source Intelligence (OSINT)
Produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence and information requirement
Search Engine
Program that searches for and identifies items in a database that corresponds to keywords or characters specified by the user
Open Source Information
Publicly available information that anyone can lawfully obtain by request, purchase, or observation. -publicly available
Trustworthyness
Rely on what the source says
Research Plan
Should provide the info needed to help guide research efforts that support the collection plan -Info that is beneficial can include background, data, main concepts, and trends -Helps the researcher ensure research efforts are thoroughly conducted
Spyware
Software that aims to gather information about a person or organization without their knowledge, which may send such information to another entity without the consumer's consent, or asserts control over a device without the consumer's knowledge
OSINT Collection
The collection of open source information includes local broadcasts, newspapers, periodicals, books, wikis, blogs, news sites, community websites, and social networking
Social Media
The sphere of websites, applications, and web-based tools that focus on connecting users to engage in dialogue, share information and media, collaborate, and interact
Maintains Collection Plans
The unit in accordance with the information and Life Cycle Management Manual, COMDTINST M5212.12 -Overt - District Commander -CGI assistance to other IC agencies - CG-2 -Cgi assistance to law enforcement partners - inside DHS -Sector -Ourtise DHS - District Commander
Standard Workstations
Used for conducting authorized on-line open source research activities -The use of personal computers for official open source research is not authorized
CG Non-Standard Computers
Utilizing commercial internet access is authorized with the approval of the commanding officer and supervisory intelligence staff
Competency
knowledgeable of the issue