classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Open source intelligence
November 2017, Security Services & Risk Management

It is safe to assume that all private investigations practitioners are familiar with but not necessarily adept in the practice of the OSINT (open source intelligence) concept i.e. the legally and freely available access – if one has developed the curiosity and technical skills required – to a wide variety of local and/or international information sources which have become increasingly digitised and often made available on subscription.

OSINT has been traditionally used, in conjunction with other forms of information, to support a wide variety of both covert and overt due diligence, security, consumer and commercial intelligence related investigations. However, the number of such sources and the difficulties of keeping pace with their availability and then properly using them and the specific information available have grown exponentially (Google, Internet, Twitter, Facebook, LinkedIn, business web sites etc.). This problem has occurred over the last decade or so due to the sophistication, development and growth in related information sourcing, sharing and storage technologies.

A concurrent trend has been the demand by PI clients, legal firms, credit granters and many others – including governments for security and anti-terrorism reasons – for less generalised and more accurate, specific, nuanced and predictive information to support their decision-making processes.

A further obvious trend has been the retaliatory steps taken by authorities and businesses, via consumer privacy, data and information protection legislation and other data base security and anti-cybercrime measures, to prevent unauthorised access to such sources. This has occurred because of the abuse of access to OSINT, often for criminal or industrial espionage purposes e.g. stolen identifications, product and financial information, and the requirement, for business and contractual reasons, to protect against the misuse of shared data and information.

Simultaneous access to a vast array of OSINT sources has only become possible due to the development of electronically driven search engine software programs with variable drill down capacities which, when tasked, allow for the search and retrieval of specifically or generally requested information or data.

It is therefore arguable that any private investigations practitioner wishing to keep abreast of these trends, must understand and become adept with modern OSINT trends and requirements or run the risk of becoming obsolete.

For more information, contact SSC Security Consultants, +27 (0)11 786 8556, howard@sscinfo.co.za, www.sscinfo.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Intelligence and compliance ­depend on data governance
    June 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    The growth of data in all its forms caused data governance to become increasingly complex, to the point where it is a skill in itself.
  • Data governance and security
    June 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    Data governance has become a key issue for all businesses, and as with all things data-related these days, security is a key component of data governance.
  • Phangela set to upgrade security industry
    June 2018, News, Security Services & Risk Management
    Phangela Security is on an expansion drive, taking a new data-driven approach to the security market countrywide.
  • Afribiz Invest partners with RSS Security Services
    June 2018, News, Security Services & Risk Management, Retail (Industry)
    New security company RSS Commercial will give South African businesses and government departments fresh options, including the ability to maximise cost efficiency.
  • SA fraud statistics confirm higher levels of crime
    June 2018, This Week's Editor's Pick, News, Security Services & Risk Management, Retail (Industry)
    Once believed to be the domain of government, high level economic crime has become more common in the corporate arena with exposure of the wrongdoing of many reputable companies.
  • Where tech and privacy collide
    June 2018, Fidelity Security Group, Security Services & Risk Management
    Clive van Ryneveld, Fidelity ADT commercial executive talks about the security industry’s road to becoming PoPIA-ready.
  • Does GDPR apply to you?
    June 2018, Security Services & Risk Management
    Ross Saunders from Cura Software Solutions asks if you have considered whether or not your business needs to align with the General Data Protection Regulations (GDPR)?
  • Data curation equals business success
    June 2018, Security Services & Risk Management
    The value of data analytics and the insight it provides is only as good as the quality of data used, which is why data curation is critical to the management of the data lifecycle.
  • The story behind an SA-made home automation solution
    June 2018, Technews Publishing, This Week's Editor's Pick, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    The Sentian i3 is a ‘brain’ for home security, and comprises hardware, embedded software, a cloud service and user app. It can connect to existing alarm systems and off-the-shelf CCTV cameras.
  • Rugged device thwarts criminals
    June 2018, Technews Publishing, Security Services & Risk Management, Integrated Solutions
    The Active Track is a simple device in terms of operability and requires the minimum amount of training before guards can use it effectively.
  • An intelligence-based security model
    June 2018, This Week's Editor's Pick, Security Services & Risk Management
    Intelligence-driven security can change the industry for the better through cloud-based data services such as Locstat.
  • Technical Surveillance Countermeasures (TSCM) training
    June 2018, Training & Education, Security Services & Risk Management
    Those outside the USA who cannot afford or who do not wish to travel to the USA will be able to receive the same high-level REI training and certification in South Africa.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.