too, which are detailed next.
Surface Web (i.e., the Internet known by most users) [34].
non trivial challenges for OSINT to properly work [35].
This work is licensed under a Creative Commons Attribution 4.0 License.
For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2965257, IEEE Access
J. Pastor-Galindo et al.: The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends
Pros
3
Cons
7
Huge amount of available information
Complexity of data management
High capacity of computing
Unstructured information
Big data and machine learning
Misinformation
Complementary types of data
Data sources reliability
Flexible purpose and wide scope
Strong ethical/legal considerations
TABLE 1:
OSINT pros and cons in a nutshell
2) High computing capacity
Advances in computer architecture, processors and GPUs
(graphic processing units) enable to carry out labor-intensive
operations in terms of collection, processing, analysis and
storage [36]. Thanks to this feature, we have the opportunity
to apply OSINT considering large amounts of public infor-
mation and mixing a high number of data sets, relationships
and patterns from different types of open sources, while
applying advanced processing and analysis techniques.
3) Big data and machine learning
Emerging proliferation of data analysis and data mining
techniques, as well as machine learning algorithms, which
can automate and make investigation and decision making
processes more intelligent and efficient [36]. It allows spot-
ting complex correlations that are naturally unpredictable to
humans. This point will be key in future OSINT activities,
as it will mark the difference between human-driven and
artificial intelligence-led research. By incorporating those
techniques, the process of collection and analysis will defini-
tively improve, thus resulting in accurate investigations close
to our goal. Additionally, government counterintelligence
agencies can leverage such paradigm to further enhance the
quality of managed information and, consequently, the battle
against terrorist organizations [37].
4) Complementary types of data
Possibility of feeding OSINT with other types of informa-
tion [38]. The inherent structure of the system is open enough
to include data that has not actually been obtained from open
sources. This fact means that OSINT can be even more ef-
fective if we are able to add external pieces of information to
complement investigations. For example, Law Enforcement
Agencies could take advantage of citizens collaboration to
feed OSINT searches, intelligence services could leverage
classified information about cybercriminals or incidents to
enrich OSINT investigations, or even common users could
combine OSINT with social engineering to profile their tar-
get.
5) Flexible purpose and wide scope
Due to the nature of OSINT, investigations can be extended
to lots of problems and can collect pieces of information all
over the cyberspace. This paradigm could be used for eco-
nomic, psychological, strategic, journalistic, labor or security
aspects, among others. In particular, we could highlight the
benefits in the field of crime and cybersecurity, where OSINT
could monitor suspicious people or dangerous groups, detect
influencing profiles related to radicalization, study worrying
trends of the society, support the attribution of cyberattacks
and crimes, enhance digital forensic analysis, etc. [5], [18].
Do'stlaringiz bilan baham: