© Nihad A. Hassan, Rami Hijazi 2018
Nihad A. Hassan and Rami HijaziOpen Source Intelligence Methods and Toolshttps://doi.org/10.1007/978-1-4842-3213-2_2

2. Introduction To Online Threats and Countermeasures

Nihad A. Hassan1  and Rami Hijazi2
New York, USA
Mississauga, Ontario, Canada

As you do your research for OSINT, you will certainly leave digital traces behind that can be used to track you. For example, consider an investigator performing an online search for drug dealers in Mexico. What if the people the investigator was searching for discovers his search? What if they could learn the source of the search (the organization or the person behind the search) and the searcher’s location? If you think that criminal organizations are not technically ...

Get Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.