This document outlines the 5 phases of the Open Source Intelligence (OSINT) process: 1) Source Identification, 2) Data Harvesting, 3) Data Processing and Integration, 4) Data Analysis, and 5) Results Delivery. OSINT involves gathering intelligence from public, open sources to identify potential threats. It describes each phase, including identifying relevant sources, collecting information, analyzing harvested data, and presenting findings.
2. INTRODUCTION
INTRODUCTION
INTRODUCTION
Open Source Intelligence (OSINT) is a sub-type
of threat intelligence that includes human,
signals, and geospatial intelligence, however,
unlike the other three sub-types, OSINT
intelligence is only gathered from free, public
sources.
3. PHASES OF THE
PHASES OF THE
PHASES OF THE
OSINT PROCESS;
OSINT PROCESS;
OSINT PROCESS;
1
1
1 Source Identification:
2
2
2 Data Analysis
3
3
3 Data Harvesting
4
4
4
Data Processing and
Integration
Results Delivery
5
5
5
4. 1 - SOURCE IDENTIFICATION: - AS THE
1 - SOURCE IDENTIFICATION: - AS THE
1 - SOURCE IDENTIFICATION: - AS THE
STARTING POINT, IN THIS INITIAL
STARTING POINT, IN THIS INITIAL
STARTING POINT, IN THIS INITIAL
PHASE THE ATTACKER IDENTIFIES
PHASE THE ATTACKER IDENTIFIES
PHASE THE ATTACKER IDENTIFIES
POTENTIAL SOURCES FROM WHICH
POTENTIAL SOURCES FROM WHICH
POTENTIAL SOURCES FROM WHICH
INFORMATION MAY BE GATHERED
INFORMATION MAY BE GATHERED
INFORMATION MAY BE GATHERED
FROM. SOURCES ARE INTERNALLY
FROM. SOURCES ARE INTERNALLY
FROM. SOURCES ARE INTERNALLY
DOCUMENTED THROUGHOUT THE
DOCUMENTED THROUGHOUT THE
DOCUMENTED THROUGHOUT THE
PROCESS IN DETAILED NOTES TO
PROCESS IN DETAILED NOTES TO
PROCESS IN DETAILED NOTES TO
COME BACK TO LATER IF
COME BACK TO LATER IF
COME BACK TO LATER IF
NECESSARY.
NECESSARY.
NECESSARY.
5. DATA HARVESTING: - IN THIS PHASE, THE
DATA HARVESTING: - IN THIS PHASE, THE
DATA HARVESTING: - IN THIS PHASE, THE
ATTACKER COLLECTS AND HARVESTS
ATTACKER COLLECTS AND HARVESTS
ATTACKER COLLECTS AND HARVESTS
INFORMATION FROM THE SELECTED
INFORMATION FROM THE SELECTED
INFORMATION FROM THE SELECTED
SOURCES AND OTHER SOURCES THAT ARE
SOURCES AND OTHER SOURCES THAT ARE
SOURCES AND OTHER SOURCES THAT ARE
DISCOVERED THROUGHOUT THIS PHASE.
DISCOVERED THROUGHOUT THIS PHASE.
DISCOVERED THROUGHOUT THIS PHASE.
DATA PROCESSING AND INTEGRATION: -
DATA PROCESSING AND INTEGRATION: -
DATA PROCESSING AND INTEGRATION: -
DURING THIS PHASE, THE ATTACKER
DURING THIS PHASE, THE ATTACKER
DURING THIS PHASE, THE ATTACKER
PROCESSES THE HARVESTED
PROCESSES THE HARVESTED
PROCESSES THE HARVESTED
INFORMATION FOR ACTIONABLE
INFORMATION FOR ACTIONABLE
INFORMATION FOR ACTIONABLE
INTELLIGENCE BY SEARCHING FOR
INTELLIGENCE BY SEARCHING FOR
INTELLIGENCE BY SEARCHING FOR
INFORMATION THAT MAY ASSIST IN THE
INFORMATION THAT MAY ASSIST IN THE
INFORMATION THAT MAY ASSIST IN THE
INVESTIGATION
INVESTIGATION
INVESTIGATION
6. DATA ANALYSIS: - IN THIS PHASE, THE
DATA ANALYSIS: - IN THIS PHASE, THE
DATA ANALYSIS: - IN THIS PHASE, THE
ATTACKER PERFORMS DATA ANALYSIS
ATTACKER PERFORMS DATA ANALYSIS
ATTACKER PERFORMS DATA ANALYSIS
OF THE PROCESSED INFORMATION USING
OF THE PROCESSED INFORMATION USING
OF THE PROCESSED INFORMATION USING
OSINT ANALYSIS TOOLS.
OSINT ANALYSIS TOOLS.
OSINT ANALYSIS TOOLS.
RESULTS DELIVERY: - IN THE FINAL PHASE,
RESULTS DELIVERY: - IN THE FINAL PHASE,
RESULTS DELIVERY: - IN THE FINAL PHASE,
OSINT ANALYSIS IS COMPLETE AND THE
OSINT ANALYSIS IS COMPLETE AND THE
OSINT ANALYSIS IS COMPLETE AND THE
FINDINGS ARE PRESENTED/REPORTED TO
FINDINGS ARE PRESENTED/REPORTED TO
FINDINGS ARE PRESENTED/REPORTED TO
OTHER MEMBERS OF THE RED TEA
OTHER MEMBERS OF THE RED TEA
OTHER MEMBERS OF THE RED TEA