CHAPTER 4: INTERNET SECURITY FOR THE SMART INVESTIGATOR

So far the author has sought to demonstrate the ‘art of the possible’ of a mature OSINT capability, and this book has paid little attention to the issue of operational security. This is partly due to the author’s ‘risk positive’ approach to intelligence and investigative work in general, but largely due to the fact that to fully appreciate the risks associated with OSINT research one must fully understand the potential of the capability. You as the reader may at this point be asking: ‘What are the risks involved in OSINT, and why should I care?’

The answer depends on how you are using OSINT and the risk that this use generates for you as an individual and your organisation. If you implement ...

Get The Tao of Open Source Intelligence now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.