Undergraduate Module Descriptor

SOC3128: Introduction to Open-source Intelligence (OSINT)

This module descriptor refers to the 2021/2 academic year.

How this Module is Assessed

In the tables below, you will see reference to 'ILO's. An ILO is an Intended Learning Outcome - see Aims and Learning Outcomes for details of the ILOs for this module.

Formative Assessment

A formative assessment is designed to give you feedback on your understanding of the module content but it will not count towards your mark for the module.

Form of assessmentSize of the assessment (eg length / duration)ILOs assessedFeedback method
Group presentation to module10 minutes1,2,3,7,9Verbal, written provided to the group

Summative Assessment

A summative assessment counts towards your mark for the module. The table below tells you what percentage of your mark will come from which type of assessment.

CourseworkWritten examsPractical exams
10000

...and this table provides further details on the summative assessments for this module.

Form of assessment% of creditSize of the assessment (eg length / duration)ILOs assessedFeedback method
3 x problem sets50Problem sets (2,000 words in total, 50%)1,2,3,7,9Written feedback
Technical report502,000 words1,2,3,4,5,6,7,8Written feedback

Re-assessment

Re-assessment takes place when the summative assessment has not been completed by the original deadline, and the student has been allowed to refer or defer it to a later date (this only happens following certain criteria and is always subject to exam board approval). For obvious reasons, re-assessments cannot be the same as the original assessment and so these alternatives are set. In cases where the form of assessment is the same, the content will nevertheless be different.

Original form of assessmentForm of re-assessmentILOs re-assessedTimescale for re-assessment
3 x problem setsProblem sets (2,000 words in total, 50%)1,2, 3,7,9August/September re-assessment period
Technical report2,000 words1,2,3,4,5,6,7,8August/September reassessment period

Indicative Reading List

This reading list is indicative - i.e. it provides an idea of texts that may be useful to you on this module, but it is not considered to be a confirmed or compulsory reading list for this module.

Akhgar, B., Bayerl, P., & Sampons, F. (2017) Open Source Intelligence Investigation: From Strategy to Implementation (first edition) Spinger: Cham

Bazzell, M. (2019) Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information (7th edition) Independently published

Bellingcat podcast: https://www.bellingcat.com/category/resources/podcasts/

Golenburg, A. & Finkelstein, J. (2020) Cyber Swarming, Memetic Warfare And Viral Insurgency: How Domestic Militants Organize on Memes to Incite Violent Insurrection and Terror Against Government and Law Enforcement available online: http://ncri.io/wp-content/uploads/NCRI-White-Paper-Memetic-Warfare.pdf

Human Rights Center (2020) Berkeley Protocol on Digital Open Source Investigations available online: https://www.ohchr.org/Documents/Publications/OHCHR_BerkeleyProtocol.pdf

NATO (2001) NATO Open Source Handbook available online: http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSINT%20Handbook%20v1.2%20-%20Jan%202002.pdf

OSINTCurio.us website: https://osintcurio.us/

Silverman, C. (2020) Verification Handbook: For Disinformation and Media Manipulation (First edition) available online: https://s3.eu-central-1.amazonaws.com/datajournalismcom/handbooks/Verification-Handbook-3.pdf

United Nations Office on Drugs and Crime (UNODC) (2011) Criminal Intelligence

Manual for Analysts available online: https://www.unodc.org/documents/organized-crime/Law-Enforcement/Criminal_Intelligence_for_Analysts.pdf