Module SOC3128 for 2021/2
- Overview
- Aims and Learning Outcomes
- Module Content
- Indicative Reading List
- Assessment
Undergraduate Module Descriptor
SOC3128: Introduction to Open-source Intelligence (OSINT)
This module descriptor refers to the 2021/2 academic year.
Module Aims
This module aims to introduce you to the techniques used in Open-Source Intelligence (OSINT) investigations, and in doing so, has two broad aims. The first is to develop your understanding of the theoretical aspects of OSINT, such as where it fits in relation to contemporary law enforcement investigative practice, the various ethical and legal considerations that must be considered when using these methods, as well as their role in academic research in areas such as online communities and extremism. The second involves introducing you to some of the basic techniques and skills used by a range of organisations when conducting OSINT investigations. These skills will be taught to you via practical sessions, and will cover such things as researching the origins of an image, geolocating specific events, and analysing data gained from these techniques. In learning these skills, you will realise that, so long as you are systematic in your approach, it is actually relatively easy to use these methods to conduct OSINT investigations using freely accessible tools that you might already be familiar with, such as Google reverse image search.
On successfully completing the programme you will be able to: | |
---|---|
Module-Specific Skills | 1. demonstrate a high level of understanding of Open-Source Intelligence (OSINT) techniques, their applications, and their role within contemporary law enforcement and research 2. Show a good level of confidence in using OSINT investigative tools and critically assessing the data gained from them 3. Demonstrate a high level of computer literacy as it pertains to contemporary research methods, particularly OSINT work, and law enforcement |
Discipline-Specific Skills | 4. Critically reflect on the role and impact of OSINT within the wider context of the changes to investigative practice in law enforcement and research as a result of an increasingly digital society 5. Demonstrate a critical understanding of the evolutionary arms race between new methods for committing crime and crime detection and investigation methods 6. Critically evaluate the ethical considerations of using OSINT methods in law enforcement and research |
Personal and Key Skills | 7. Demonstrate ability to work as part of a group on a joint project 8. Demonstrate written analytical skills by producing an essay and technical report to a deadline 9. Demonstrate the ability to present group-based work in a professional manner |
Module Content
Syllabus Plan
Whilst the module’s precise content may vary from year-to-year, it is envisaged that the syllabus will cover some or all of the following themes:
- Introduction: What is Open-source intelligence? What is its role in contemporary law enforcement investigations? Preparing your computer for OSINT work.
- OSINT methodology and workflow, documentation, and ethics
- Search engines and online communities
- Social media part 1
- Social media part 2
- Email, usernames, telephone numbers, and search engines
- Online maps, geolocation, and documents
- Images and videos
- Domain names and IP addresses
- Government and business records and virtual currencies
- Data breaches and leaks
- Wrap-up revision, and the future of OSINT
The teaching sessions for this module will take the form of weekly two hour long practical sessions, whereby the students will have short lectures from the module convener on the above subjects accompanied by practical exercises.
Learning and Teaching
This table provides an overview of how your hours of study for this module are allocated:
Scheduled Learning and Teaching Activities | Guided independent study | Placement / study abroad |
---|---|---|
30 | 120 | 0 |
...and this table provides a more detailed breakdown of the hours allocated to various study activities:
Category | Hours of study time | Description |
---|---|---|
Scheduled learning and teaching activities | 22 | 11 x two hour taught practical sessions |
Guided independent studies | 36 | Course readings and other multi-media content |
Guided independent study | 25 | Reading/research for essay |
Guided independent study | 59 | Group work/research for technical report |
Online Resources
This module has online resources available via ELE (the Exeter Learning Environment).
How this Module is Assessed
In the tables below, you will see reference to 'ILO's. An ILO is an Intended Learning Outcome - see Aims and Learning Outcomes for details of the ILOs for this module.
Formative Assessment
A formative assessment is designed to give you feedback on your understanding of the module content but it will not count towards your mark for the module.
Form of assessment | Size of the assessment (eg length / duration) | ILOs assessed | Feedback method |
---|---|---|---|
Group presentation to module | 10 minutes | 1,2,3,7,9 | Verbal, written provided to the group |
Summative Assessment
A summative assessment counts towards your mark for the module. The table below tells you what percentage of your mark will come from which type of assessment.
Coursework | Written exams | Practical exams |
---|---|---|
100 | 0 | 0 |
...and this table provides further details on the summative assessments for this module.
Form of assessment | % of credit | Size of the assessment (eg length / duration) | ILOs assessed | Feedback method |
---|---|---|---|---|
3 x problem sets | 50 | Problem sets (2,000 words in total, 50%) | 1,2,3,7,9 | Written feedback |
Technical report | 50 | 2,000 words | 1,2,3,4,5,6,7,8 | Written feedback |
Re-assessment
Re-assessment takes place when the summative assessment has not been completed by the original deadline, and the student has been allowed to refer or defer it to a later date (this only happens following certain criteria and is always subject to exam board approval). For obvious reasons, re-assessments cannot be the same as the original assessment and so these alternatives are set. In cases where the form of assessment is the same, the content will nevertheless be different.
Original form of assessment | Form of re-assessment | ILOs re-assessed | Timescale for re-assessment |
---|---|---|---|
3 x problem sets | Problem sets (2,000 words in total, 50%) | 1,2, 3,7,9 | August/September re-assessment period |
Technical report | 2,000 words | 1,2,3,4,5,6,7,8 | August/September reassessment period |
Indicative Reading List
This reading list is indicative - i.e. it provides an idea of texts that may be useful to you on this module, but it is not considered to be a confirmed or compulsory reading list for this module.
Akhgar, B., Bayerl, P., & Sampons, F. (2017) Open Source Intelligence Investigation: From Strategy to Implementation (first edition) Spinger: Cham
Bazzell, M. (2019) Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information (7th edition) Independently published
Bellingcat podcast: https://www.bellingcat.com/category/resources/podcasts/
Golenburg, A. & Finkelstein, J. (2020) Cyber Swarming, Memetic Warfare And Viral Insurgency: How Domestic Militants Organize on Memes to Incite Violent Insurrection and Terror Against Government and Law Enforcement available online: http://ncri.io/wp-content/uploads/NCRI-White-Paper-Memetic-Warfare.pdf
Human Rights Center (2020) Berkeley Protocol on Digital Open Source Investigations available online: https://www.ohchr.org/Documents/Publications/OHCHR_BerkeleyProtocol.pdf
NATO (2001) NATO Open Source Handbook available online: http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSINT%20Handbook%20v1.2%20-%20Jan%202002.pdf
OSINTCurio.us website: https://osintcurio.us/
Silverman, C. (2020) Verification Handbook: For Disinformation and Media Manipulation (First edition) available online: https://s3.eu-central-1.amazonaws.com/datajournalismcom/handbooks/Verification-Handbook-3.pdf
United Nations Office on Drugs and Crime (UNODC) (2011) Criminal Intelligence
Manual for Analysts available online: https://www.unodc.org/documents/organized-crime/Law-Enforcement/Criminal_Intelligence_for_Analysts.pdf