Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism
Corresponding Author(s) : Dr. Mohamed Elguindy
Journal of Law and Emerging Technologies,
Vol. 1 No. 1 (2021)
Abstract
This research paper discusses the technical and legal aspects of open source intelligence (OSINT) as an investigation discipline in combating terrorism cases. Due to the proliferation of internet connectivity and the use of the Internet by terrorists, new mythologies and framework are needed to effectively identify, collect, preserve, and present the evidence related to such a serious crime. While there is no internationally agreed standard to apply on using OSINT for criminal investigations, the researcher proposes new framework that utilizes the application of digital forensics standards and methodologies in open source investigation to deliver admissible evidence in court of law.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- NWC3. (2014). Retrieved May 27, 2020, from Bureau of Justice Assistance website: https://bja.ojp.gov/library/publications/national-white-collar-crime-center-annual-report-2013
- Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. Boston: Pearson.
- El-Guindy, M. (2008). Cybercrime in the Middle East. ISSA Journal, 6(6).
- Wonder, J. (2020, January 25). Digital Marketing Community. Retrieved May 27, 2020, from Digital Marketing Community website: https://www.digitalmarketingcommunity.com/researches/state-social-media-mena-region-2018-crowd-analyzer/
- El-Guindy, M. (2014). Middle East Dilemma from the Caliphate to Open-source Jihad. Retrieved May 27, 2020, from Academia website: https://www.academia.edu/6432111/Middle_East_Dilemma_from_the_Caliph-ate_to_Open-Source_Jihad
- Appel, E. J. (2017). Internet Searches for Vetting, Investigations, and Open-Source Intelligence. https://doi.org/10.1201/b10523 DOI: https://doi.org/10.1201/b10523
- Pouchard, L. C., Dobson, J. D., & Trien, J. P. (2017). A Framework for the Systematic Collection of Open Source Intelligence. Retrieved May 27, 2020, from undefined website: https://www.semanticscholar.org/paper/A-Framework-for-the-Systematic-Collection-of-Open-Pouchard-Dobson/b655d9c157d0c76868cb-9620529f0217ae9a70a2
- Hulnick, A. S. (2010). The International Politics of Intelligence Sharing by James Igoe Walsh. Political Science Quarterly, 125(4), 715–716. https://doi.org/10.1002/j.1538-165x.2010.tb02080.x DOI: https://doi.org/10.1002/j.1538-165X.2010.tb02080.x
- Arquilla, J., Ronfeldt, D. F., & States., U. (2001). Networks and netwars: the future of terror, crime, and militancy. Santa Monica, Ca: Rand.
- Conway, M. (2014). What is Cyberterrorism and How Real is the Threat? Cyber Behavior, 217–245. https://doi.org/10.4018/978-1-4666-5942-1.ch013 DOI: https://doi.org/10.4018/978-1-4666-5942-1.ch013
- Uche Mbanaso, & Eman Dandaura. (2015, June). The Cyberspace: Redefining A New World. Retrieved June 20, 2020, from ResearchGate website: https://www.researchgate.net/publication/280101879_The_Cyberspace_Redefining_A_New_World
- Gibson, W. (1984). Neuromancer. New York: Ace Science Fiction Books.
- Dorothy E. Denning: Is Cyber Terror Next? (2001). Retrieved June 20, 2020, from Ssrc.org website: http://essays.ssrc.org/sept11/essays/denning.htm
- US Dep. of State Glossary: (2001). Retrieved June 20, 2020, from State.gov website: https://2001-2009.state.gov/s/ct/info/c16718.htm
- Amin Maalouf, & Harris, R. (1998). Samarkand. London: Abacus.
- AWAN, A. N. (2010, May 3). The Virtual Jihad – Combating Terrorism Center at West Point. Retrieved June 20, 2020, from Combating Terrorism Center at West Point website: https://www.ctc.usma.edu/the-virtual-jihad-an-increasingly-legitimate-form-of-warfare/
- Baken, D. N., & Ioannis Mantzikos. (2015). Al Qaeda: the transformation of terrorism in the Middle East and North Africa. Santa Barbara, California: Praeger, An Imprint Of Ab-Clio, Llc.
- NIC. (2004). Mapping the Global Future. Retrieved June 20, 2020, from DNI website: https://www.dni.gov/files/documents/Global%20Trends_Mapping%20the%20Global%20Future%202020%20Project.pdf
- M W Zackie Masoud. (2015). An Analysis of Abu Mus’ab al-Suri’s “Call to Global Islamic Resistance”. Journal of Strategic Security, 6(1), 1–18. https://doi.org/10.5038/1944-0472.6.1.1 DOI: https://doi.org/10.5038/1944-0472.6.1.1
- Ibid
- Lemieux, A. F., Brachman, J. M., Levitt, J., & Wood, J. (2014). Inspire Magazine: A Critical Analysis of its Significance and Potential Impact Through the Lens of the Information, Motivation, and Behavioral Skills Model. Terrorism and Political Violence, 26(2), 354–371. https://doi.org/10.1080/09546553.2013.828604
- The Lessons of Anwar al-Awlaki. (2015, August 27). The New York Times. Retrieved from https://www.nytimes.com/2015/08/30/magazine/the-lessons-of-anwar-al-awlaki.html
- Holbrook, D. (2012). Al-Qaeda’s Response to the Arab Spring on JSTOR. Retrieved June 20, 2020, from Jstor.org website: https://www.jstor.org/stable/26296891?seq=1#metadata_info_tab_contents
- Holbrook, D. (2012). Al-Qaeda’s Response to the Arab Spring on JSTOR. Retrieved June 20, 2020, from Jstor.org website: https://www.jstor.org/stable/26296891?seq=1#metadata_info_tab_contents
- Ingram, H. J. (2018). Islamic States English-language Magazines, 2014-2017: Trends & Implications for CT-CVE Strategic Communications. Terrorism and Counter-Terrorism Studies. https://doi.org/10.19165/2018.1.03 DOI: https://doi.org/10.19165/2018.1.03
- Weaver, M., & Tran, M. (2014, June 30). Isis announces Islamic caliphate in area straddling Iraq and Syria. Retrieved June 20, 2020, from the Guardian website: https://www.theguardian.com/world/2014/jun/30/isis-announces-islamic-caliphate-iraq-syria
- Nour, S. S. O. M. (2006). ICT Opportunities and Challenges for Development in the Arab Region. The New Economy in Development, 161–187. https://doi.org/10.1057/9780230287709_8 DOI: https://doi.org/10.1057/9780230287709_8
- Etling, B., Kelly, J., Faris, R., & Palfrey, J. (2010). Mapping the Arabic blogosphere: politics and dissent online. New Media & Society, 12(8), 1225–1243. https://doi.org/10.1177/1461444810385096 DOI: https://doi.org/10.1177/1461444810385096
- FATF. (2015). Emerging Terrorist Financing Risks. Retrieved from https://www.fatf-gafi.org/media/fatf/docu-ments/reports/Emerging-Terrorist-Financing-Risks.pdf
- Shima Galhoom. (2013, November 28). «تجريس وتشهير« ميليشيات الجماعة تنتقم بحملات. Retrieved June 20, 2020, from Alwatan Newspaper website: https://www.elwatannews.com/news/details/363244
- IBrahim Rashwan. (2015, October 3). “فـيس بوك”يخترق حساب ضابط شرطة بالبحيرة على “داعش.” Retrieved June 20, 2020, from Alwatan Newspaper website: https://www.elwatannews.com/news/details/812671
- Flickr. (2020, June 20). Retrieved June 20, 2020, from Flickr website: https://www.flickr.com/groups/piggipe-dia/pool/
- Lotfi Salman. (2013, December 29). فض رابعة” تنشر قائمة ضباط “الإرهابية” ..“الاغتيالات” عن قرب “رصد” بعد تأكيد مدير.” Retrieved June 20, 2020, from Alwatan News website: https://www.elwatannews.com/news/details/382568
- Cohen-Almagor, R. (2017). Jihad Online: How Do Terrorists Use the Internet? Retrieved June 20, 2020, from Ssrn.com website: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2878429
- Ahram Online. (2017). Egypt court declares militant group “Hasm” terrorist organisation - Politics - Egypt. Retrieved June 20, 2020, from Ahram Online website: http://english.ahram.org.eg/NewsContent/1/64/257982/Egypt/Politics-/Egypt-court-declares-militant-group-Hasm-terrorist.aspx
- Ahram Online. (2016). Two policemen killed in attack on checkpoint in Egypt’s Menoufiya - Egypt. Retrieved June 20, 2020, from Ahram Online website: http://english.ahram.org.eg/News/239306.aspx
- Ahram online. (2016). Ahram Online - Senior Brotherhood “armed wing” leader killed in shootout: Egypt’s Interior Ministry. Retrieved June 20, 2020, from Ahram.org.eg website: http://english.ahram.org.eg/News-Print/245165.aspx
- Ahram Online. (2018). A look at Hasm and Lewaa Al-Thawra terror groups - Features - Egypt. Retrieved June 20, 2020, from Ahram Online website: http://english.ahram.org.eg/NewsContent/1/151/256787/Egypt/Features/A-look-at-Egypts-youngest-militant-groups-Hasm-and.aspx
- Charette, R. N. (2007). Full Page Reload. Retrieved from IEEE Spectrum: Technology, Engineering, and Science News website: https://spectrum.ieee.org/telecom/security/opensource-warfare DOI: https://doi.org/10.1109/MSPEC.2007.4378455
- Lemieux, A. F., Brachman, J. M., Levitt, J., & Wood, J. (2014). Inspire Magazine: A Critical Analysis of its Significance and Potential Impact Through the Lens of the Information, Motivation, and Behavioral Skills Model. Terrorism and Political Violence, 26(2), 354–371. https://doi.org/10.1080/09546553.2013.828604 DOI: https://doi.org/10.1080/09546553.2013.828604
- Ibid
- Speckhard, A. (2013). The Boston Marathon Bombers on JSTOR. Retrieved June 20, 2020, from Jstor.org website: https://www.jstor.org/stable/26296940?seq=1#metadata_info_tab_contents
- Almasy, S. (2015, November 4). A look at past attempts to bomb airplanes. Retrieved June 20, 2020, from CNN website: https://edition.cnn.com/2015/11/04/world/airline-bombing-plots/
- ICT. (2016). Trends in Aviation Terrorism. Retrieved June 20, 2020, from Ict.org.il website: https://www.ict.org.il/Article/1757/trends-in-aviation-terrorism#gsc.tab=0
- Stewart, W. (2015, November 23). Russian plane crash: Bomb on tourist jet that crashed in Egypt “was placed under a seat.” Retrieved June 20, 2020, from Evening Standard website: https://www.standard.co.uk/news/world/bomb-on-russian-tourist-jet-that-crashed-in-egypt-was-placed-under-a-seat-a3120741.html
- Reuters Editorial. (2016, January 29). Exclusive: EgyptAir mechanic suspected in Russian plane crash. Retrieved June 20, 2020, from U.S. website: https://www.reuters.com/article/us-egypt-crash-suspects-idUSKC-N0V712V
- Rudner, M. (2016). (Electronic Jihad): The Internet as Al Qaedas Catalyst for Global Terror. Studies in Conflict & Terrorism, 40(1), 10–23. https://doi.org/10.1080/1057610x.2016.1157403 DOI: https://doi.org/10.1080/1057610X.2016.1157403
- Winsor, M. (2016, February 4). Somalia Daallo Airlines Explosion: Wheelchair Passenger Suspected As Suicide Bomber. Retrieved June 20, 2020, from International Business Times website: https://www.ibtimes.com/somalia-daallo-airlines-explosion-wheelchair-passenger-suspected-suicide-bomber-2294861
- GeeskaAfrika. (2016, February 7). Somalia: Airport Staff, Airline Employees Detained Over Somali Plane Blast - Geeska Afrika Online. Retrieved June 20, 2020, from Geeskaafrika.com website: http://www.geeskaaf-rika.com/15400/somalia-airport-staff-airline-employees-detained-over-somali-plane-blast/
- Reuters. (2016, May 30). Somalia sentences two to life in prison for February airline blast - Business Insider. Retrieved June 20, 2020, from Business Insider website: https://www.businessinsider.com/r-somalia-sentences-two-to-life-in-prison-for-february-airline-blast-2016-5?IR=T
- Palmer, G. (2001). A Road Map for Digital Forensic Research. Retrieved from https://www.dfrws.org/sites/default/files/session-files/a_road_map_for_digital_forensic_research.pdf
- Ibid
- Kim-Kwang Raymond Choo, & Dehghantanha, A. (2017). Contemporary digital forensic investigations of cloud and mobile applications. Amsterdam; Boston; Heidelberg; London; New York; Oxford; Paris; San Diego; San Francisco; Singapore; Sydney; Tokyo: Elsevier.
- Ibid
- Palmer, G. (2001). A Road Map for Digital Forensic Research. Retrieved from https://www.dfrws.org/sites/default/files/session-files/a_road_map_for_digital_forensic_research.pdf
- Casey, E. (2007). Handbook of computer crime investigation: forensic tools and technology. Amsterdam; Lon-don: Academic.
- Jordaan, J. (2012). A Sample of digital forensic quality assurance in the South African criminal justice system. Retrieved June 4, 2020, from undefined website: https://www.semanticscholar.org/paper/A-Sample-of-digital-forensic-quality-assurance-in-Jordaan/a649b1238b3e265ff2f48bbd2e890e9495407df3
- Casey, E. (2007). Handbook of computer crime investigation: forensic tools and technology. Amsterdam; Lon-don: Academic.
- SWGDE - Documents. (2020). Retrieved June 4, 2020, from Swgde.org website: https://www.swgde.org/documents
- Adelstein, F. (2006). Live forensics. Communications of the ACM, 49(2), 63. https://doi.org/10.1145/1113034.1113070 DOI: https://doi.org/10.1145/1113034.1113070
- Altheide, C., & Carvey, H. A. (2011). Digital forensics with open source tools: using open source platform tools for performing computer forensics on target systems: Windows, Mac, Linux, UNIX, etc. Rockland, Mass.: Syngress; Oxford. DOI: https://doi.org/10.1016/B978-1-59749-586-8.00001-7
- Neri, F., Geraci, P., & Pettoni, M. (2011). Stalker: overcoming linguistic barriers in open source intelligence. International Journal of Networking and Virtual Organisations, 8(1/2), 37. https://doi.org/10.1504/ijn-vo.2011.037160 DOI: https://doi.org/10.1504/IJNVO.2011.037160
- Intelligence: Open Source Intelligence — Central Intelligence Agency. (2010). Retrieved June 4, 2020, from Cia.gov website: https://www.cia.gov/news-information/featured-story-archive/2010-featured-story-archive/open-source-intelligence.html
- Williams, H. J., Williams, H. J., Blum, I., & Blum, I. (2018). Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise: Retrieved June 13, 2020, from Rand.org website: https://www.rand.org/pubs/research_reports/RR1964.html
- Ibid
- Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
- NATO. (2002). NATO Open Source Intelligence Reader. Retrieved June 21, 2020, from Oss.net website: http://www.oss.net/dynamaster/file_archive/030201/254633082e785f8fe44f546bf5c9f1ed/NATO%20OSINT%20Reader%20FINAL%2011OCT02.pdf
- Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
- Ibid
- Ibid
- Best, R. A., & Cumming, A. (2007). Open Source Intelligence (OSINT): Issues for Congress. United States: Library Of Congress Washington Dc Congressional Research Service.
- Robert David Steele. (2006). The Smart Nation Act: public intelligence in the public interest. Oakton, Va.: Oss, Inc.
- Ibid
- Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
- Best, R. A., & Cumming, A. (2007). Open Source Intelligence (OSINT): Issues for Congress. United States: Library Of Congress Washington Dc Congressional Research Service.
- Williams, H., & Blum, I. (2018). Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise. Retrieved from https://www.rand.org/content/dam/rand/pubs/research_reports/RR1900/RR1964/RAND_RR1964.pdf
- Gibson, S. (2020). Open source intelligence. Retrieved June 5, 2020, from The RUSI Journal website: https://www.tandfonline.com/doi/abs/10.1080/0307184040852297
- Law Enforcement Social Media | LexisNexis Risk Solutions. (2012). Retrieved June 5, 2020, from LexisNexis Risk Solutions website: https://risk.lexisnexis.com/insights-resources/white-paper/2012-law-enforce-ment-social-media
- Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
- University of Essex. (2018b). Introductory Guide to Open Human Rights Centre Clinic. Retrieved from https://www1.essex.ac.uk/hrc/documents/Introductory_Guide_to_Open_Source_Inteligence_and_Digitial%20Verifi-cation.pdf
- NATO. (2001). NATO Open Source Intelligence Handbook. NATO. (Original work published 2001)
- WikiLeaks. (2019). Retrieved June 20, 2020, from Wikileaks.org website: https://wikileaks.org/
- ICIJ Offshore Leaks Database. (2020). Retrieved June 20, 2020, from Icij.org website: https://offshoreleaks.icij.org/
- Sunde, I. M. (2017). Cybercrime Law. Digital Forensics, 51–116. https://doi.org/10.1002/9781119262442.ch3 DOI: https://doi.org/10.1002/9781119262442.ch3
- ECHR. (2013). European Convention on Human Rights - Official texts, Convention and Protocols. Retrieved June 21, 2020, from Coe.int website: https://www.echr.coe.int/Pages/home.aspx?p=basictexts
- HM Government. (2008). ARRANGEMENT OF SECTIONS Computer misuse offences. Retrieved from http://www.legislation.gov.uk/ukpga/1990/18/pdfs/ukpga_19900018_en.pdf
- EUR-Lex - 31995L0046 - EN - EUR-Lex. (2018). Retrieved June 21, 2020, from Europa.eu website: https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A31995L0046
- Ibid
- Police Directive. (2020). Retrieved June 21, 2020, from European Data Protection Supervisor - European Data Protection Supervisor website: https://edps.europa.eu/data-protection/our-work/subjects/police-directive_en
- Greenleaf, G. (2017). Global Tables of Data Privacy Laws and Bills (5th Ed 2017). Retrieved June 21, 2020, from Ssrn.com website: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2992986
- State of Privacy Lebanon. (2019). Retrieved June 21, 2020, from Privacy International website: https://privacy-international.org/state-privacy/1081/state-privacy-lebanon#dataprotection
- Law No. 151 of 2020. (2020). Retrieved August 15, 2020, from International Trade Administration website: https://www.trade.gov/market-intelligence/egypt-data-protection
- Mckemmish, R. (1999). What is forensic computing? Canberra: Australian Institute of Criminology.
- Beckett, J., & Slay, J. (2011). Scientific underpinnings and background to standards and accreditation in digital forensics. Digital Investigation, 8(2), 114–121. https://doi.org/10.1016/j.diin.2011.08.001 DOI: https://doi.org/10.1016/j.diin.2011.08.001
- Guttman, J. D. (2009). Introduction. Journal of Computer Security, 17(5), 515–515. https://doi.org/10.3233/jcs-2009-0396 DOI: https://doi.org/10.3233/JCS-2009-0396
- Casey, E. (2007). Handbook of computer crime investigation: forensic tools and technology. Amsterdam; London: Academic.
- Widup, S. (2014). Computer forensics and digital investigation with Encase Forensic v7. New York: McgrawHill Education.
- Schemas. (2020). Retrieved June 12, 2020, from Schema.org website: https://schema.org/
- Chris. (2019, September 22). OSINT Collection Schema. Retrieved June 12, 2020, from OSINT Combine website: https://www.osintcombine.com/post/osint-collection-schema
- Mckemmish, R. (1999). What is forensic computing? Canberra: Australian Institute Of Criminology.
- Yandex.Images: search for images on the internet, search by image. (2011). Retrieved June 12, 2020, from Yandex website: https://yandex.com/images/
- Osint Support. (2020). Chrome Extensions. Retrieved June 12, 2020, from Osint Support website: https://osint.support/chrome-extensions/
- Namechk. (2020). Retrieved June 12, 2020, from Namechk.com website: https://namechk.com/
- SpiderFoot. (2020, March 30). Retrieved June 12, 2020, from SpiderFoot website: https://www.spiderfoot.net/ DOI: https://doi.org/10.1144/geosci2020-070
- Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
- Doyle, E. (2020). The dark web. New York, Ny: Greenhaven Publishing.
- Bartlett, J. (2016). The Dark Net. Random House Usa.
- Butler, B., Wardman, B., & Pratt, N. (2016). REAPER: an automated, scalable solution for mass credential harvesting and OSINT. 2016 APWG Symposium on Electronic Crime Research (ECrime). https://doi.org/10.1109/ecrime.2016.7487944 DOI: https://doi.org/10.1109/ECRIME.2016.7487944
- Narayanan, P. S., Ani, R., & King, A. T. L. (2020). TorBot: Open Source Intelligence Tool for Dark Web. Lecture Notes in Networks and Systems, 187–195. https://doi.org/10.1007/978-981-15-0146-3_19 DOI: https://doi.org/10.1007/978-981-15-0146-3_19
- Hunchly. (2017). Retrieved June 12, 2020, from Hunch.ly website: https://www.hunch.ly/
- Taylor, M., Haggerty, J., Gresty, D., Almond, P., & Berry, T. (2014). Forensic investigation of social networking applications. Network Security, 2014(11), 9–16. https://doi.org/10.1016/s1353-4858(14)70112-6 DOI: https://doi.org/10.1016/S1353-4858(14)70112-6
- bellingcat - the home of online investigations. (2021, January 29). Bellingcat. https://www.bellingcat.com/
- Cameroon atrocity: What happened after Africa Eye found who killed this woman. (2019, May 30). BBC News. https://www.bbc.com/news/av/world-africa-48432122
- Williams, H. J., Williams, H. J., Blum, I., & Blum, I. (2018). Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise: Retrieved June 13, 2020, from Rand.org website: https://www.rand.org/pubs/research_reports/RR1964.html DOI: https://doi.org/10.7249/RR1964
References
NWC3. (2014). Retrieved May 27, 2020, from Bureau of Justice Assistance website: https://bja.ojp.gov/library/publications/national-white-collar-crime-center-annual-report-2013
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. Boston: Pearson.
El-Guindy, M. (2008). Cybercrime in the Middle East. ISSA Journal, 6(6).
Wonder, J. (2020, January 25). Digital Marketing Community. Retrieved May 27, 2020, from Digital Marketing Community website: https://www.digitalmarketingcommunity.com/researches/state-social-media-mena-region-2018-crowd-analyzer/
El-Guindy, M. (2014). Middle East Dilemma from the Caliphate to Open-source Jihad. Retrieved May 27, 2020, from Academia website: https://www.academia.edu/6432111/Middle_East_Dilemma_from_the_Caliph-ate_to_Open-Source_Jihad
Appel, E. J. (2017). Internet Searches for Vetting, Investigations, and Open-Source Intelligence. https://doi.org/10.1201/b10523 DOI: https://doi.org/10.1201/b10523
Pouchard, L. C., Dobson, J. D., & Trien, J. P. (2017). A Framework for the Systematic Collection of Open Source Intelligence. Retrieved May 27, 2020, from undefined website: https://www.semanticscholar.org/paper/A-Framework-for-the-Systematic-Collection-of-Open-Pouchard-Dobson/b655d9c157d0c76868cb-9620529f0217ae9a70a2
Hulnick, A. S. (2010). The International Politics of Intelligence Sharing by James Igoe Walsh. Political Science Quarterly, 125(4), 715–716. https://doi.org/10.1002/j.1538-165x.2010.tb02080.x DOI: https://doi.org/10.1002/j.1538-165X.2010.tb02080.x
Arquilla, J., Ronfeldt, D. F., & States., U. (2001). Networks and netwars: the future of terror, crime, and militancy. Santa Monica, Ca: Rand.
Conway, M. (2014). What is Cyberterrorism and How Real is the Threat? Cyber Behavior, 217–245. https://doi.org/10.4018/978-1-4666-5942-1.ch013 DOI: https://doi.org/10.4018/978-1-4666-5942-1.ch013
Uche Mbanaso, & Eman Dandaura. (2015, June). The Cyberspace: Redefining A New World. Retrieved June 20, 2020, from ResearchGate website: https://www.researchgate.net/publication/280101879_The_Cyberspace_Redefining_A_New_World
Gibson, W. (1984). Neuromancer. New York: Ace Science Fiction Books.
Dorothy E. Denning: Is Cyber Terror Next? (2001). Retrieved June 20, 2020, from Ssrc.org website: http://essays.ssrc.org/sept11/essays/denning.htm
US Dep. of State Glossary: (2001). Retrieved June 20, 2020, from State.gov website: https://2001-2009.state.gov/s/ct/info/c16718.htm
Amin Maalouf, & Harris, R. (1998). Samarkand. London: Abacus.
AWAN, A. N. (2010, May 3). The Virtual Jihad – Combating Terrorism Center at West Point. Retrieved June 20, 2020, from Combating Terrorism Center at West Point website: https://www.ctc.usma.edu/the-virtual-jihad-an-increasingly-legitimate-form-of-warfare/
Baken, D. N., & Ioannis Mantzikos. (2015). Al Qaeda: the transformation of terrorism in the Middle East and North Africa. Santa Barbara, California: Praeger, An Imprint Of Ab-Clio, Llc.
NIC. (2004). Mapping the Global Future. Retrieved June 20, 2020, from DNI website: https://www.dni.gov/files/documents/Global%20Trends_Mapping%20the%20Global%20Future%202020%20Project.pdf
M W Zackie Masoud. (2015). An Analysis of Abu Mus’ab al-Suri’s “Call to Global Islamic Resistance”. Journal of Strategic Security, 6(1), 1–18. https://doi.org/10.5038/1944-0472.6.1.1 DOI: https://doi.org/10.5038/1944-0472.6.1.1
Ibid
Lemieux, A. F., Brachman, J. M., Levitt, J., & Wood, J. (2014). Inspire Magazine: A Critical Analysis of its Significance and Potential Impact Through the Lens of the Information, Motivation, and Behavioral Skills Model. Terrorism and Political Violence, 26(2), 354–371. https://doi.org/10.1080/09546553.2013.828604
The Lessons of Anwar al-Awlaki. (2015, August 27). The New York Times. Retrieved from https://www.nytimes.com/2015/08/30/magazine/the-lessons-of-anwar-al-awlaki.html
Holbrook, D. (2012). Al-Qaeda’s Response to the Arab Spring on JSTOR. Retrieved June 20, 2020, from Jstor.org website: https://www.jstor.org/stable/26296891?seq=1#metadata_info_tab_contents
Holbrook, D. (2012). Al-Qaeda’s Response to the Arab Spring on JSTOR. Retrieved June 20, 2020, from Jstor.org website: https://www.jstor.org/stable/26296891?seq=1#metadata_info_tab_contents
Ingram, H. J. (2018). Islamic States English-language Magazines, 2014-2017: Trends & Implications for CT-CVE Strategic Communications. Terrorism and Counter-Terrorism Studies. https://doi.org/10.19165/2018.1.03 DOI: https://doi.org/10.19165/2018.1.03
Weaver, M., & Tran, M. (2014, June 30). Isis announces Islamic caliphate in area straddling Iraq and Syria. Retrieved June 20, 2020, from the Guardian website: https://www.theguardian.com/world/2014/jun/30/isis-announces-islamic-caliphate-iraq-syria
Nour, S. S. O. M. (2006). ICT Opportunities and Challenges for Development in the Arab Region. The New Economy in Development, 161–187. https://doi.org/10.1057/9780230287709_8 DOI: https://doi.org/10.1057/9780230287709_8
Etling, B., Kelly, J., Faris, R., & Palfrey, J. (2010). Mapping the Arabic blogosphere: politics and dissent online. New Media & Society, 12(8), 1225–1243. https://doi.org/10.1177/1461444810385096 DOI: https://doi.org/10.1177/1461444810385096
FATF. (2015). Emerging Terrorist Financing Risks. Retrieved from https://www.fatf-gafi.org/media/fatf/docu-ments/reports/Emerging-Terrorist-Financing-Risks.pdf
Shima Galhoom. (2013, November 28). «تجريس وتشهير« ميليشيات الجماعة تنتقم بحملات. Retrieved June 20, 2020, from Alwatan Newspaper website: https://www.elwatannews.com/news/details/363244
IBrahim Rashwan. (2015, October 3). “فـيس بوك”يخترق حساب ضابط شرطة بالبحيرة على “داعش.” Retrieved June 20, 2020, from Alwatan Newspaper website: https://www.elwatannews.com/news/details/812671
Flickr. (2020, June 20). Retrieved June 20, 2020, from Flickr website: https://www.flickr.com/groups/piggipe-dia/pool/
Lotfi Salman. (2013, December 29). فض رابعة” تنشر قائمة ضباط “الإرهابية” ..“الاغتيالات” عن قرب “رصد” بعد تأكيد مدير.” Retrieved June 20, 2020, from Alwatan News website: https://www.elwatannews.com/news/details/382568
Cohen-Almagor, R. (2017). Jihad Online: How Do Terrorists Use the Internet? Retrieved June 20, 2020, from Ssrn.com website: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2878429
Ahram Online. (2017). Egypt court declares militant group “Hasm” terrorist organisation - Politics - Egypt. Retrieved June 20, 2020, from Ahram Online website: http://english.ahram.org.eg/NewsContent/1/64/257982/Egypt/Politics-/Egypt-court-declares-militant-group-Hasm-terrorist.aspx
Ahram Online. (2016). Two policemen killed in attack on checkpoint in Egypt’s Menoufiya - Egypt. Retrieved June 20, 2020, from Ahram Online website: http://english.ahram.org.eg/News/239306.aspx
Ahram online. (2016). Ahram Online - Senior Brotherhood “armed wing” leader killed in shootout: Egypt’s Interior Ministry. Retrieved June 20, 2020, from Ahram.org.eg website: http://english.ahram.org.eg/News-Print/245165.aspx
Ahram Online. (2018). A look at Hasm and Lewaa Al-Thawra terror groups - Features - Egypt. Retrieved June 20, 2020, from Ahram Online website: http://english.ahram.org.eg/NewsContent/1/151/256787/Egypt/Features/A-look-at-Egypts-youngest-militant-groups-Hasm-and.aspx
Charette, R. N. (2007). Full Page Reload. Retrieved from IEEE Spectrum: Technology, Engineering, and Science News website: https://spectrum.ieee.org/telecom/security/opensource-warfare DOI: https://doi.org/10.1109/MSPEC.2007.4378455
Lemieux, A. F., Brachman, J. M., Levitt, J., & Wood, J. (2014). Inspire Magazine: A Critical Analysis of its Significance and Potential Impact Through the Lens of the Information, Motivation, and Behavioral Skills Model. Terrorism and Political Violence, 26(2), 354–371. https://doi.org/10.1080/09546553.2013.828604 DOI: https://doi.org/10.1080/09546553.2013.828604
Ibid
Speckhard, A. (2013). The Boston Marathon Bombers on JSTOR. Retrieved June 20, 2020, from Jstor.org website: https://www.jstor.org/stable/26296940?seq=1#metadata_info_tab_contents
Almasy, S. (2015, November 4). A look at past attempts to bomb airplanes. Retrieved June 20, 2020, from CNN website: https://edition.cnn.com/2015/11/04/world/airline-bombing-plots/
ICT. (2016). Trends in Aviation Terrorism. Retrieved June 20, 2020, from Ict.org.il website: https://www.ict.org.il/Article/1757/trends-in-aviation-terrorism#gsc.tab=0
Stewart, W. (2015, November 23). Russian plane crash: Bomb on tourist jet that crashed in Egypt “was placed under a seat.” Retrieved June 20, 2020, from Evening Standard website: https://www.standard.co.uk/news/world/bomb-on-russian-tourist-jet-that-crashed-in-egypt-was-placed-under-a-seat-a3120741.html
Reuters Editorial. (2016, January 29). Exclusive: EgyptAir mechanic suspected in Russian plane crash. Retrieved June 20, 2020, from U.S. website: https://www.reuters.com/article/us-egypt-crash-suspects-idUSKC-N0V712V
Rudner, M. (2016). (Electronic Jihad): The Internet as Al Qaedas Catalyst for Global Terror. Studies in Conflict & Terrorism, 40(1), 10–23. https://doi.org/10.1080/1057610x.2016.1157403 DOI: https://doi.org/10.1080/1057610X.2016.1157403
Winsor, M. (2016, February 4). Somalia Daallo Airlines Explosion: Wheelchair Passenger Suspected As Suicide Bomber. Retrieved June 20, 2020, from International Business Times website: https://www.ibtimes.com/somalia-daallo-airlines-explosion-wheelchair-passenger-suspected-suicide-bomber-2294861
GeeskaAfrika. (2016, February 7). Somalia: Airport Staff, Airline Employees Detained Over Somali Plane Blast - Geeska Afrika Online. Retrieved June 20, 2020, from Geeskaafrika.com website: http://www.geeskaaf-rika.com/15400/somalia-airport-staff-airline-employees-detained-over-somali-plane-blast/
Reuters. (2016, May 30). Somalia sentences two to life in prison for February airline blast - Business Insider. Retrieved June 20, 2020, from Business Insider website: https://www.businessinsider.com/r-somalia-sentences-two-to-life-in-prison-for-february-airline-blast-2016-5?IR=T
Palmer, G. (2001). A Road Map for Digital Forensic Research. Retrieved from https://www.dfrws.org/sites/default/files/session-files/a_road_map_for_digital_forensic_research.pdf
Ibid
Kim-Kwang Raymond Choo, & Dehghantanha, A. (2017). Contemporary digital forensic investigations of cloud and mobile applications. Amsterdam; Boston; Heidelberg; London; New York; Oxford; Paris; San Diego; San Francisco; Singapore; Sydney; Tokyo: Elsevier.
Ibid
Palmer, G. (2001). A Road Map for Digital Forensic Research. Retrieved from https://www.dfrws.org/sites/default/files/session-files/a_road_map_for_digital_forensic_research.pdf
Casey, E. (2007). Handbook of computer crime investigation: forensic tools and technology. Amsterdam; Lon-don: Academic.
Jordaan, J. (2012). A Sample of digital forensic quality assurance in the South African criminal justice system. Retrieved June 4, 2020, from undefined website: https://www.semanticscholar.org/paper/A-Sample-of-digital-forensic-quality-assurance-in-Jordaan/a649b1238b3e265ff2f48bbd2e890e9495407df3
Casey, E. (2007). Handbook of computer crime investigation: forensic tools and technology. Amsterdam; Lon-don: Academic.
SWGDE - Documents. (2020). Retrieved June 4, 2020, from Swgde.org website: https://www.swgde.org/documents
Adelstein, F. (2006). Live forensics. Communications of the ACM, 49(2), 63. https://doi.org/10.1145/1113034.1113070 DOI: https://doi.org/10.1145/1113034.1113070
Altheide, C., & Carvey, H. A. (2011). Digital forensics with open source tools: using open source platform tools for performing computer forensics on target systems: Windows, Mac, Linux, UNIX, etc. Rockland, Mass.: Syngress; Oxford. DOI: https://doi.org/10.1016/B978-1-59749-586-8.00001-7
Neri, F., Geraci, P., & Pettoni, M. (2011). Stalker: overcoming linguistic barriers in open source intelligence. International Journal of Networking and Virtual Organisations, 8(1/2), 37. https://doi.org/10.1504/ijn-vo.2011.037160 DOI: https://doi.org/10.1504/IJNVO.2011.037160
Intelligence: Open Source Intelligence — Central Intelligence Agency. (2010). Retrieved June 4, 2020, from Cia.gov website: https://www.cia.gov/news-information/featured-story-archive/2010-featured-story-archive/open-source-intelligence.html
Williams, H. J., Williams, H. J., Blum, I., & Blum, I. (2018). Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise: Retrieved June 13, 2020, from Rand.org website: https://www.rand.org/pubs/research_reports/RR1964.html
Ibid
Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
NATO. (2002). NATO Open Source Intelligence Reader. Retrieved June 21, 2020, from Oss.net website: http://www.oss.net/dynamaster/file_archive/030201/254633082e785f8fe44f546bf5c9f1ed/NATO%20OSINT%20Reader%20FINAL%2011OCT02.pdf
Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
Ibid
Ibid
Best, R. A., & Cumming, A. (2007). Open Source Intelligence (OSINT): Issues for Congress. United States: Library Of Congress Washington Dc Congressional Research Service.
Robert David Steele. (2006). The Smart Nation Act: public intelligence in the public interest. Oakton, Va.: Oss, Inc.
Ibid
Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
Best, R. A., & Cumming, A. (2007). Open Source Intelligence (OSINT): Issues for Congress. United States: Library Of Congress Washington Dc Congressional Research Service.
Williams, H., & Blum, I. (2018). Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise. Retrieved from https://www.rand.org/content/dam/rand/pubs/research_reports/RR1900/RR1964/RAND_RR1964.pdf
Gibson, S. (2020). Open source intelligence. Retrieved June 5, 2020, from The RUSI Journal website: https://www.tandfonline.com/doi/abs/10.1080/0307184040852297
Law Enforcement Social Media | LexisNexis Risk Solutions. (2012). Retrieved June 5, 2020, from LexisNexis Risk Solutions website: https://risk.lexisnexis.com/insights-resources/white-paper/2012-law-enforce-ment-social-media
Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
University of Essex. (2018b). Introductory Guide to Open Human Rights Centre Clinic. Retrieved from https://www1.essex.ac.uk/hrc/documents/Introductory_Guide_to_Open_Source_Inteligence_and_Digitial%20Verifi-cation.pdf
NATO. (2001). NATO Open Source Intelligence Handbook. NATO. (Original work published 2001)
WikiLeaks. (2019). Retrieved June 20, 2020, from Wikileaks.org website: https://wikileaks.org/
ICIJ Offshore Leaks Database. (2020). Retrieved June 20, 2020, from Icij.org website: https://offshoreleaks.icij.org/
Sunde, I. M. (2017). Cybercrime Law. Digital Forensics, 51–116. https://doi.org/10.1002/9781119262442.ch3 DOI: https://doi.org/10.1002/9781119262442.ch3
ECHR. (2013). European Convention on Human Rights - Official texts, Convention and Protocols. Retrieved June 21, 2020, from Coe.int website: https://www.echr.coe.int/Pages/home.aspx?p=basictexts
HM Government. (2008). ARRANGEMENT OF SECTIONS Computer misuse offences. Retrieved from http://www.legislation.gov.uk/ukpga/1990/18/pdfs/ukpga_19900018_en.pdf
EUR-Lex - 31995L0046 - EN - EUR-Lex. (2018). Retrieved June 21, 2020, from Europa.eu website: https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A31995L0046
Ibid
Police Directive. (2020). Retrieved June 21, 2020, from European Data Protection Supervisor - European Data Protection Supervisor website: https://edps.europa.eu/data-protection/our-work/subjects/police-directive_en
Greenleaf, G. (2017). Global Tables of Data Privacy Laws and Bills (5th Ed 2017). Retrieved June 21, 2020, from Ssrn.com website: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2992986
State of Privacy Lebanon. (2019). Retrieved June 21, 2020, from Privacy International website: https://privacy-international.org/state-privacy/1081/state-privacy-lebanon#dataprotection
Law No. 151 of 2020. (2020). Retrieved August 15, 2020, from International Trade Administration website: https://www.trade.gov/market-intelligence/egypt-data-protection
Mckemmish, R. (1999). What is forensic computing? Canberra: Australian Institute of Criminology.
Beckett, J., & Slay, J. (2011). Scientific underpinnings and background to standards and accreditation in digital forensics. Digital Investigation, 8(2), 114–121. https://doi.org/10.1016/j.diin.2011.08.001 DOI: https://doi.org/10.1016/j.diin.2011.08.001
Guttman, J. D. (2009). Introduction. Journal of Computer Security, 17(5), 515–515. https://doi.org/10.3233/jcs-2009-0396 DOI: https://doi.org/10.3233/JCS-2009-0396
Casey, E. (2007). Handbook of computer crime investigation: forensic tools and technology. Amsterdam; London: Academic.
Widup, S. (2014). Computer forensics and digital investigation with Encase Forensic v7. New York: McgrawHill Education.
Schemas. (2020). Retrieved June 12, 2020, from Schema.org website: https://schema.org/
Chris. (2019, September 22). OSINT Collection Schema. Retrieved June 12, 2020, from OSINT Combine website: https://www.osintcombine.com/post/osint-collection-schema
Mckemmish, R. (1999). What is forensic computing? Canberra: Australian Institute Of Criminology.
Yandex.Images: search for images on the internet, search by image. (2011). Retrieved June 12, 2020, from Yandex website: https://yandex.com/images/
Osint Support. (2020). Chrome Extensions. Retrieved June 12, 2020, from Osint Support website: https://osint.support/chrome-extensions/
Namechk. (2020). Retrieved June 12, 2020, from Namechk.com website: https://namechk.com/
SpiderFoot. (2020, March 30). Retrieved June 12, 2020, from SpiderFoot website: https://www.spiderfoot.net/ DOI: https://doi.org/10.1144/geosci2020-070
Babak Akhgar, P Saskia Bayerl, & Fraser Sampson. (2018). Open Source Intelligence Investigation From Strategy to Implementation. Cham Springer International Publishing Springer.
Doyle, E. (2020). The dark web. New York, Ny: Greenhaven Publishing.
Bartlett, J. (2016). The Dark Net. Random House Usa.
Butler, B., Wardman, B., & Pratt, N. (2016). REAPER: an automated, scalable solution for mass credential harvesting and OSINT. 2016 APWG Symposium on Electronic Crime Research (ECrime). https://doi.org/10.1109/ecrime.2016.7487944 DOI: https://doi.org/10.1109/ECRIME.2016.7487944
Narayanan, P. S., Ani, R., & King, A. T. L. (2020). TorBot: Open Source Intelligence Tool for Dark Web. Lecture Notes in Networks and Systems, 187–195. https://doi.org/10.1007/978-981-15-0146-3_19 DOI: https://doi.org/10.1007/978-981-15-0146-3_19
Hunchly. (2017). Retrieved June 12, 2020, from Hunch.ly website: https://www.hunch.ly/
Taylor, M., Haggerty, J., Gresty, D., Almond, P., & Berry, T. (2014). Forensic investigation of social networking applications. Network Security, 2014(11), 9–16. https://doi.org/10.1016/s1353-4858(14)70112-6 DOI: https://doi.org/10.1016/S1353-4858(14)70112-6
bellingcat - the home of online investigations. (2021, January 29). Bellingcat. https://www.bellingcat.com/
Cameroon atrocity: What happened after Africa Eye found who killed this woman. (2019, May 30). BBC News. https://www.bbc.com/news/av/world-africa-48432122
Williams, H. J., Williams, H. J., Blum, I., & Blum, I. (2018). Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise: Retrieved June 13, 2020, from Rand.org website: https://www.rand.org/pubs/research_reports/RR1964.html DOI: https://doi.org/10.7249/RR1964