Description
Book SynopsisTrade Review"Each chapter can stand alone, but together they give an accurate view of the current situation - it's a good mix of theory and practice(s)…an interesting read for researchers and digital investigators...an eye-opening one for Internet users in general..." --Help Net Security
Table of ContentsCh 1. Introduction to OSINT Ch 2. Advances in Automated OSINT Ch 3. Named Entity Resolution in Social Media Ch 4. Relative Cyberattack Attribution Ch 5. Evidence Accumulation Strategies for OSINT Ch 6. Analyzing Social Media Campaigns for Group Size Estimation Ch 7. Crawling the Dark Web Ch 8. Case Study: The Digital Underground Ch 9. Graph Creation and Analysis for Linking Actors Ch 10. Case Study Predicting Crime with OSINT Ch 11. Ethical Considerations w/Public Data Ch 12: Limitations of automating OSINT Ch 13. Geospatial Reasoning of Open Data Ch 14: Future Trends