Skip to main content

Analysis of Open Sources and Data

Study Course Description

Course Description Statuss:Approved
Course Description Version:8.00
Study Course Accepted:02.02.2024 12:30:31
Study Course Information
Course Code:JF_438LQF level:Level 7
Credit Points:2.00ECTS:3.00
Branch of Science:ManagementTarget Audience:Civil and Military Defense; Law
Study Course Supervisor
Course Supervisor:Daiga Spila
Study Course Implementer
Structural Unit:Faculty of Social Sciences
The Head of Structural Unit:
Contacts:Dzirciema street 16, Rīga, szfatrsu[pnkts]lv
Study Course Planning
Full-Time - Semester No.1
Lectures (count)8Lecture Length (academic hours)2Total Contact Hours of Lectures16
Classes (count)4Class Length (academic hours)2Total Contact Hours of Classes8
Total Contact Hours24
Part-Time - Semester No.1
Lectures (count)3Lecture Length (academic hours)2Total Contact Hours of Lectures6
Classes (count)2Class Length (academic hours)2Total Contact Hours of Classes4
Total Contact Hours10
Study course description
Preliminary Knowledge:
Skills to work with a computer, internet browsers, navigate in social networks, English language skills
Objective:
To provide students with an understanding of the use of open source and data analysis OSINT (Open Source Intelligence) in solving and combating economic crime; To provide students with the necessary abilities and skills in searching for and summarising open source evidence, acquainting students with free access tools and methods of obtaining information; To provide students with abilities and skills in the analysis and synthesis of the information and evidence obtained.
Topic Layout (Full-Time)
No.TopicType of ImplementationNumberVenue
1Introduction to OSINT Analysis of open sources and data or OSINT as an approach to collection, summarising and analysis of information; Illustrating case studies: • Creation of people’s dossiers; • Geolocation; • Reconstruction of events; • Identification of a conflict of interest.Lectures0.50computer room
2Introduction to modern internet environment Principles of work of the internet – data circulation infrastructure; Principles of work of internet websites – domain, server hosting; Webpage indexation, deepweb, dark web; SEO – search engine optimization; Social networks – attention economy, influencers Big data economy, machine learning Data brokers – Cambridge Analytica, OCEAN, micro targetingLectures0.50computer room
3Availability of information and privacy in the internet Seminar work in accordance with seminar No. 1 instruction.Classes0.25computer room
4Advanced searching in internet browsers Dorking of internet websites: • To search on specific page; • To search for a specific phrase; • To search for a specific file type; • To search by picture, etc. Archived content; Search for personal data by person’s name, username, e-mail, address, phone numberLectures0.50computer room
5Search on social networks Facebook; Twitter; Instagram; VKontakte; YouTube; WhatsApp groups; Telegram channels and groups.Lectures0.50computer room
6Summarising a person’s dossier Seminar work in accordance with seminar No. 2 instruction.Classes0.25computer room
7Verification of evidences Check of text; Check of pictures; Check of videos; Check of location.Lectures1.00computer room
8Inauthentic behaviour in social networks Inauthentic pages on Facebook Inauthentic accounts on Facebook Automated accounts on Twitter (bots) Click farms Troll factoriesLectures1.00computer room
9Verification of an event demonstrating evidence verification methods Seminar work in accordance with seminar No. 3 instruction.Classes1.00computer room
10Identification of a conflict of interest in open data (Visiting lecture) Data from the Register of Enterprises, KNAB on party financing, declarations of SRS officials and data published by the Procurement Monitoring Bureau (PMB), etc.; Case studies with the most popular corruption and conflict of interest schemesLectures1.00computer room
11Data analysis in Excel Data import, formatting, mapping, selection, search; Merging of data sets; Pivot tablesClasses1.00computer room
12Examination of website Register of domains, IP addresses, VPN; SSL certificates; Visitor flow (SmilarWeb/Alexa); Backlinks; Cookies; Source code – uniqueLectures1.00computer room
13Network analysis when studying a website Seminar work in accordance with seminar No. 5 instruction.Classes0.50computer room
14Fraud and crime on the internet (Visiting lecture) Phishing; Identity theft; Hacking; Social engineering (pretending to be a bank); DDoS attacks; Doxing, etc.Lectures1.00computer room
15Safety on the internet (Visiting lecture) User identity protection online (VPN, virtual machines; browser settings) Password administration, two/three factor verification, biometry; Protection against espionage via digital devices; Safe use of location services, etc.Lectures1.00computer room
16Visitor safety on the internet Seminar work in accordance with seminar No. 6 instruction.Classes1.00computer room
Topic Layout (Part-Time)
No.TopicType of ImplementationNumberVenue
4Advanced searching in internet browsers Dorking of internet websites: • To search on specific page; • To search for a specific phrase; • To search for a specific file type; • To search by picture, etc. Archived content; Search for personal data by person’s name, username, e-mail, address, phone numberLectures0.50computer room
5Search on social networks Facebook; Twitter; Instagram; VKontakte; YouTube; WhatsApp groups; Telegram channels and groups.Lectures0.50computer room
10Identification of a conflict of interest in open data (Visiting lecture) Data from the Register of Enterprises, KNAB on party financing, declarations of SRS officials and data published by the Procurement Monitoring Bureau (PMB), etc.; Case studies with the most popular corruption and conflict of interest schemesLectures0.50computer room
11Data analysis in Excel Data import, formatting, mapping, selection, search; Merging of data sets; Pivot tablesClasses1.00computer room
12Examination of website Register of domains, IP addresses, VPN; SSL certificates; Visitor flow (SmilarWeb/Alexa); Backlinks; Cookies; Source code – uniqueClasses1.00computer room
15Safety on the internet (Visiting lecture) User identity protection online (VPN, virtual machines; browser settings) Password administration, two/three factor verification, biometry; Protection against espionage via digital devices; Safe use of location services, etc.Lectures0.50computer room
17Introduction to OSINT and modern internet environment Analysis of open sources and data or OSINT as an approach to collection, summarising and analysis of information; Principles of work of internet websites – domain, server hosting; Webpage indexation, deepweb, dark web; Social networks – attention economy, influencers Big data economy, machine learning Data brokers – Cambridge Analytica, OCEAN, micro targeting; Cases, when open source intelligence is used. Homework: Essay on openness and privaLectures0.50computer room
18Verification of evidences and inauthentic behaviour in social networks Check of text; Check of pictures; Check of videos; Check of location; Inauthentic pages and accounts on Facebook; Automated accounts on Twitter (bots) Click farms and troll factories. Homework: To verify the “evidences” provided by the lecturer describing the course of the verification, tools used and justifying conclusions on authenticity of evidences.Lectures0.50computer room
Assessment
Unaided Work:
1. The material reviewed at lectures and seminars is the necessary minimum knowledge to be acquired. The student should learn other matters not reviewed during contact classes independently. All the matters to be learned in the study course are specified in the description of the course. 2. Learning of material outside auditorium should be systematic. At least 3 hours of learning outside auditorium per two hours in auditorium (90 min) should be provided (preparation of an essay/performance of individual work, preparation for seminars). 3. Seminar classes take place in groups and individually, using personal laptops pr PCs provided by the higher education institutions. Students prepare for seminar work individually or in groups. Detailed organisation of seminar work is included in the seminar instruction for the respective seminar, which is sent to students 5 – 7 calendar days before the seminar. Students are obliged to prepare before the class in accordance with the instruction, for example, to study each case, where open sources were used, to study additional questions and find answers to them, if asked, and after the seminar – to be able to demonstrate their own open source and data research skills. 4. In parallel to all independent work, each student should individually draft a study of open sources (course paper) on a suspect in a specific case, checking his/her alibi, social account network and website network probably involved in an economic crime or to the extent possible to solve a crime using the evidences provided by open sources and data.
Assessment Criteria:
Within the course, an assessment is also provided for work at seminars, course graduation paper and the examination. To make an assessment, it is necessary: 1) Independent drafting of a course graduation paper; 2) Attendance of classes and successful assessments at seminars; 3) Successful passing of an examination. Work at a seminar – 25%; Course graduation paper – 50%: Examination – 25%. Final Examination (full-time studies): Examination (written) Final examination (part-time studies): Essay on examination questions (Written)
Final Examination (Full-Time):Exam (Written)
Final Examination (Part-Time):Exam (Written)
Learning Outcomes
Knowledge:Students know the methods, approaches, tools for open source intelligence (OSINT), understand the principles of functioning of online networks, internet browsers, websites and major social networks, know the most useful open databases for the profession, and are aware of and understand the security risks faced by internet users, including the investigator himself/herself. As a result of mastering the study course students are able to integrate the obtained knowledge and make a contribution to the creation of new knowledge.
Skills:Students are able to search and systemise evidence available from open sources (texts, photographs, videos, unique identifiers, etc.) in order to subsequently verify, analyse and synthesize the information obtained by drawing conclusions on the crime under investigation. By understanding the principles of the functioning of the Internet and social networks, students are able to use the knowledge provided by the lecturers and to create new open source intelligence approaches independently. Students are able to engage in discussions on the development of Internet and social networks, the privacy, security of their users and the ethics of the researcher.
Competencies:Students are competent in conducting economic crime investigations, working on evidence gathered in open and public sources, and advising investigators using other methods of gathering evidence.
Bibliography
No.Reference
Required Reading
1Bazzell, M. Open Source Intelligence Techniques: Resources for Searching and Analysing Online Information. 7th Edition. Coppell, Texas, 2019
2Akhgar, B., Bayerl, S., Sampson, F. Open Source Intelligence Investigation: From Strategy to Implementation. Springer International Publishing, Switzerland, 2016
3Hassan, N., Hijazi, R. Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence. Apress Media LLC, New York, 2018
4Troia, V. Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques. John Wiley & Sons, Indianapolis, 2020
5Gupta, R., Brooks, H. Using Social Media for Global Security. John Wiley & Sons, Incorporated, 2013
6Orlowski, J. The Social Dilemma. Netflix, 2020
Additional Reading
1Amer, K., Noujaim, J. The Great Hack. Netflix 2019
2Fincher, D. The Social Network. Columbia Pictures, 2010
Other Information Sources
1Intel Techniques
2Bellingcat
3Verification and Fact Checking Handbook