CHAPTER 4: INTERNET SECURITY FOR THE SMART INVESTIGATOR

So far the author has sought to demonstrate the ‘art of the possible’ of a mature OSINT capability, and this book has paid little attention to the issue of operational security. This is partly due to the author’s ‘risk positive’ approach to intelligence and investigative work in general, but largely due to the fact that to fully appreciate the risks associated with OSINT research one must fully understand the potential of the capability. You as the reader may at this point be asking: ‘What are the risks involved in OSINT, and why should I care?’

The answer depends on how you are using OSINT and the risk that this use generates for you as an individual and your organisation. If you implement ...

Get The Tao of Open Source Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.