scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Open source intelligence and privacy dilemmas: Is it time to reassess state accountability?

01 Jan 2013-Security and Human Rights (Brill Nijhoff)-Vol. 23, Iss: 4, pp 285-296
TL;DR: It is argued that state accountability should at least entail that the actual process and outcome of data collection, processing, mining and sharing is subjected to review and/or sanctions.
Abstract: This article argues that the gathering of open source intelligence, such as through messages on social networking sites, weblogs, blogs or apps, demands proper checks and balances. Abstract Open source intelligence (OSINT) is increasingly used for security and safety purposes. Even though security - and intelligence agencies and the police are using messages on social networking sites, weblogs, blogs or apps, state accountability mechanisms found it difficult to adapt to the online culture. Consider for instance the dilemma that open source information (OSINF) is frequently collected, processed, minded and stored by private companies. From a human right perspective, this gathering of OSINT demands proper checks and balances. Even though laws, regulations and policies may recognise this, it is important to review whether the gathering of OSINF online leads to new dilemmas. We conclude that state accountability should at least entail that the actual process and outcome of data collection, processing, mining and sharing is subjected to review and/or sanctions. Furthermore, it should become transparent which entity or who carries responsibility for the use of OSINT.
Citations
More filters
Journal ArticleDOI
TL;DR: The paper at hand describes the current state of OSINT and makes a comprehensive review of the paradigm, focusing on the services and techniques enhancing the cybersecurity field, and analyzes the strong points of this methodology and proposes numerous ways to apply it to cybersecurity.
Abstract: The amount of data generated by the current interconnected world is immeasurable, and a large part of such data is publicly available, which means that it is accessible by any user, at any time, from anywhere in the Internet. In this respect, Open Source Intelligence (OSINT) is a type of intelligence that actually benefits from that open nature by collecting, processing and correlating points of the whole cyberspace to generate knowledge. In fact, recent advances in technology are causing OSINT to currently evolve at a dizzying rate, providing innovative data-driven and AI-powered applications for politics, economy or society, but also offering new lines of action against cyberthreats and cybercrime. The paper at hand describes the current state of OSINT and makes a comprehensive review of the paradigm, focusing on the services and techniques enhancing the cybersecurity field. On the one hand, we analyze the strong points of this methodology and propose numerous ways to apply it to cybersecurity. On the other hand, we cover the limitations when adopting it. Considering there is a lot left to explore in this ample field, we also enumerate some open challenges to be addressed in the future. Additionally, we study the role of OSINT in the public sphere of governments, which constitute an ideal landscape to exploit open data.

60 citations

Dissertation
01 Jan 2019
TL;DR: In this article, the authors present a list of ABBREVIATIONS of the authors of this paper, together with an introduction and a discussion of background, motivation, and problem statement.
Abstract: ......................................................................................................................... IV OPSOMMING ........................................................................................................................... V LIST OF ABBREVIATIONS ..................................................................................................... VI CHAPTER 1: INTRODUCTION ................................................................................................ 1 1.1 Background, Motivation and Problem Statement ........................................................ 1 1.2 Central Theoretical Statement ....................................................................................... 8 1.3 Literature Review ........................................................................................................... 9 1.4 Research Questions ..................................................................................................... 11 1.5 Research Objectives .................................................................................................... 12 1.6 Methodology ................................................................................................................. 13 1.7 Contribution .................................................................................................................. 15 1.8 Chapter Division ........................................................................................................... 15 CHAPTER 2: METATHEORETICAL POINTS OF DEPARTURE ........................................... 19 2.

27 citations

Journal ArticleDOI
TL;DR: Ga sper Hribar is a doctoral candidate at the University of Maribor, Slovenia, where he received his Master of Science degree in Criminal Justice and Security (Security Services) under the mentorship of Dr. Iztok Podbregar and Dr. Teodora Ivanu sa.
Abstract: Open Source Intelligence (OSINT) is generally seen in positive terms, particularly as a method of conventional intelligence collection that does not violate human rights. Of all the data collection...

24 citations

01 Jan 2017
TL;DR: In this article, de juridische basis for and other digitale opporingsmethoden besproken is investigated, e.g., online undercover op-porings methoden, inbeslagname and onderzoek van gegevens in computers and het vorderen van online service providers.
Abstract: In deze studie wordt naast hacken als opsporingsmethode, ook de juridische basis voor andere digitale opsporingsmethoden besproken. Het gaat daarbij om het vergaren van publiekelijk toegankelijke online informatie, online undercover opsporingsmethoden, de inbeslagname en onderzoek van gegevens in computers en het vorderen van gegevens van online serviceproviders. Niet alleen zijn deze opsporingsmethoden eenvoudiger en onder minder strenge voorwaarden toe te passen dan hacken als opsporingsmethode, zij vormen ook belangrijke instrumenten bij het vergaren van bewijs in een digitale context

13 citations

References
More filters
Posted Content
TL;DR: In this article, the special criminal procedures for the use of intelligence in terrorist trials in Canada, France, the Netherlands and the United Kingdom are reviewed, and their compatibility with human rights standards, including the right to fair trial, is discussed.
Abstract: This article focuses on the special criminal procedures for the use of intelligence in terrorist trials in Canada, France, the Netherlands and the United Kingdom. Since 9/11 and the terror attacks in London and Madrid, gathering intelligence as well as the prosecution of suspects of terrorist crimes have become strategic tools in countering terrorism. By reviewing the special procedures for the use of intelligence, their compatibility with human rights standards, including the right to fair trial, is discussed. Concerns include the extent to which disclosure is made possible and to whom. The differences in criminal procedures for the use of intelligence in terrorist trials also raises questions if intelligence origins from a third state, in which different regulations with regard to disclosure of information apply.

12 citations

09 Jun 2010
TL;DR: In this paper, the authors present a privacy-enhancing technologies (PET) based on the Diffusion of Innovation (DOI) theorie van Rogers, which can be used to improve the security of information in ICT.
Abstract: Omgevingsanalyse van onze samenleving toont aan dat door de toenemende informatisering privacyproblemen (identiteitsfraude, datalekken) zullen toenemen. Door gegevensontdekkende-, gegevensvolgende- en gegevenskoppelende technologieen erodeert de privacy van de burger in onze risico-toezichtmaatschappij ernstig. Het vertrouwen in het gebruik van ICT en het elektronisch zaken doen komt hierdoor sterk onder druk te staan.Er bestaat uitvoerige Europese wet- en regelgeving om onze privacy te beschermen. In dit boek is deze wetgeving geanalyseerd. De wetsartikelen die direct betrekking hebben op de verwerking van persoonsgegevens kunnen beschouwd worden als de juridische specificaties voor het ontwerp van informatiesystemen. De wetgeving verplicht tot een privacyrisico analyse voorafgaande aan het gebruik van informatiesystemen. Dit vindt nauwelijks plaats. In dit boek worden zeven privacy bedreigingsanalyses (o.a PIA) besproken. Met de privacyrisicoanalyse kan opdrachtgevers en ontwerpers van informatiesystemen de potentiele risico’s voor de privacy van de burger in kaart te brengen. Uit onderzoek is duidelijk geworden dat persoonsgegevens het best beschermd kunnen worden als bij de verwerking van de persoonsgegevens de identificeerde gegevens direct worden scheiden worden van andere gegevens. Privacy Enhancing Technologies (PET), die de juridische vereisten omzetten in technische specificaties, kunnen hiervoor zorgdragen. De inhoud, reikwijdte en succesvolle toepassingen van PET worden in dit boek uiteengezet.Aan de hand van de Diffusion of Innovation (DOI) theorie van Rogers kunnen de positieve en negatieve factoren voor organisaties worden vastgesteld, die van invloed zijn op het invoeren van identity en access management, privacy bescherming en de adoptie van PET voor de bescherming van persoonsgegevens. Bovendien is gebleken dat de maturiteit van de organisatie bepalend is of de organisatie aandacht besteedt aan privacybescherming. Met de in dit boek toegelichte Return On Investment (ROI) formules kan de economische rechtvaardiging voor privacy beschermende investeringen worden onderbouwd. Het boek sluit af met een stappenplan om privacyveilige informatiesystemen in organisaties te implementeren en doet tien aanbevelingen

9 citations