In the Internet age, the most valuable pieces of data when investigating an individual are phone numbers, email addresses, and usernames. These data points, which are typically freely shared by their owners, can act as a pri-mary key to link research on a person to other data sources dispersed throughout the web. The Internet has made obtaining a wealth of data an accessible activity requiring only creativity and persistence. An investiga-tor with the motivation to identify information on a certain person or or-ganization can use these data points to build links and present useful in-formation on a target. Our paper aims to study connecting disparate data from publicly accessible sources to provide detail into someone or some-thing is called Open Source Intelligence (OSINT). In this paper, we intro-duce the subject of OSINT both in a broad sense as well as through docu-menting hands-on experience in scraping information on one of the mem-bers of this research group as well as generic internet targets. The first fo-cus is on presenting the overall concept including norms and techniques that may be used to investigate an individual. The second focus is on deep-diving a specific tool along with a method for adding data sources to present the broad scope of available information. Several useful tools that are common in the OSINT space are presented. Finally, we found the chal-lenge in narrowing the focus to the intended target and in relating it to use-ful information.
Cite this paper
Duffy, M. , Pan, X. and Wilson, S. (2024). Information Reconnaissance by Accumulating Public Information Data Sources. Open Access Library Journal, 11, e1463. doi: http://dx.doi.org/10.4236/oalib.1111463.
Hassan, G.N.A. and Hijazi, R. (2018) Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence. Apress, Berkeley. https://doi.org/10.1007/978-1-4842-3213-2
Gibson, H. (2016) Acquisition and Preparation of Data for OSINT Investigations. In: Akhgar, B., Bayerl, P. and Sampson, F., Eds., Open Source Intelligence Investigation, Springer, Cham, 69-93. https://doi.org/10.1007/978-3-319-47671-1_6
Chapple, M. (2019) Tor and the Dark Web: Exploring the Basics. https://www.linkedin.com/learning/tor-and-the-dark-web-exploring-the-basics?trk=lynda_redirect_learning
Kalpakis, G., Tsikrika, T., Cunningham, N., Iliou, C., Vrochidis, S., Mid-dleton, J. and Kompatsiaris, I. (2016) OSINT and the Dark Web. In: Akhgar, B., Bayerl, P. and Sampson, F., Eds., Open Source Intelligence Investigation, Springer, Cham, 111-132. https://doi.org/10.1007/978-3-319-47671-1_8
(2020) Introduction to Maltego Standard Entities. https://docs.maltego.com/support/solutions/articles/15000035722-introduction-to-maltego-standard-entities
(2020) What Is Open Source Intelligence (OSINT) and How to Conduct OSINT Investigations in Maltego. https://www.maltego.com/blog/what-is-open-source-intelligence-and-how-to-conduct-osint-investigations/
Wong, C. (2024) What Is Phishing? Examples, Types, and Techniques. https://www.csoonline.com/article/514515/what-is-phishing-examples-types-and-techniques.html
Pham, T., Cirincione, G.H., Verma, D. and Pearson, G. (2008) Intelligence, Surveillance, and Reconnaissance Fusion for Coalition Operations. https://apps.dtic.mil/sti/pdfs/ADA520498.pdf
Buchler, N., Fitzhugh, S.M., Marusich, L.R., Ungvarsky, D.M., Lebiere, C. and Gonzalez, C. (2016) Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness. Frontiers in Psychology, 7, Article 937. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4916213/. https://doi.org/10.3389/fpsyg.2016.00937
Hershey, P., Wang, M.C., Graham, C., Davidson, S., Sica, M. and Dudash, J. (2012) A Policy-Based Approach to Automated Data Reduction for Intelligence, Surveillance, and Reconnaissance Systems. MILCOM 2012: 2012 IEEE Military Communications Conference, Orlando, 29 October-1 November 2012, 1-6. https://doi.org/10.1109/MILCOM.2012.6415574