It follows that the more tools you have in your portfolio, the more flexible your OSINT capabilities are likely to be. Indeed, the right tool can determine whether you harvest the right information. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. A limited toolkit can never satisfy all of these constituencies. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. To begin, a shortlist betrays the widening spectrum of OSINT practice. My fear, however, is that they are also shortsighted. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020Īleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetisįoreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |