Module SOC3128 for 2021/2
- Overview
- Aims and Learning Outcomes
- Module Content
- Indicative Reading List
- Assessment
Undergraduate Module Descriptor
SOC3128: Introduction to Open-source Intelligence (OSINT)
This module descriptor refers to the 2021/2 academic year.
Module Content
Syllabus Plan
Whilst the module’s precise content may vary from year-to-year, it is envisaged that the syllabus will cover some or all of the following themes:
- Introduction: What is Open-source intelligence? What is its role in contemporary law enforcement investigations? Preparing your computer for OSINT work.
- OSINT methodology and workflow, documentation, and ethics
- Search engines and online communities
- Social media part 1
- Social media part 2
- Email, usernames, telephone numbers, and search engines
- Online maps, geolocation, and documents
- Images and videos
- Domain names and IP addresses
- Government and business records and virtual currencies
- Data breaches and leaks
- Wrap-up revision, and the future of OSINT
The teaching sessions for this module will take the form of weekly two hour long practical sessions, whereby the students will have short lectures from the module convener on the above subjects accompanied by practical exercises.
Learning and Teaching
This table provides an overview of how your hours of study for this module are allocated:
Scheduled Learning and Teaching Activities | Guided independent study | Placement / study abroad |
---|---|---|
30 | 120 | 0 |
...and this table provides a more detailed breakdown of the hours allocated to various study activities:
Category | Hours of study time | Description |
---|---|---|
Scheduled learning and teaching activities | 22 | 11 x two hour taught practical sessions |
Guided independent studies | 36 | Course readings and other multi-media content |
Guided independent study | 25 | Reading/research for essay |
Guided independent study | 59 | Group work/research for technical report |
Online Resources
This module has online resources available via ELE (the Exeter Learning Environment).
Indicative Reading List
This reading list is indicative - i.e. it provides an idea of texts that may be useful to you on this module, but it is not considered to be a confirmed or compulsory reading list for this module.
Akhgar, B., Bayerl, P., & Sampons, F. (2017) Open Source Intelligence Investigation: From Strategy to Implementation (first edition) Spinger: Cham
Bazzell, M. (2019) Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information (7th edition) Independently published
Bellingcat podcast: https://www.bellingcat.com/category/resources/podcasts/
Golenburg, A. & Finkelstein, J. (2020) Cyber Swarming, Memetic Warfare And Viral Insurgency: How Domestic Militants Organize on Memes to Incite Violent Insurrection and Terror Against Government and Law Enforcement available online: http://ncri.io/wp-content/uploads/NCRI-White-Paper-Memetic-Warfare.pdf
Human Rights Center (2020) Berkeley Protocol on Digital Open Source Investigations available online: https://www.ohchr.org/Documents/Publications/OHCHR_BerkeleyProtocol.pdf
NATO (2001) NATO Open Source Handbook available online: http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSINT%20Handbook%20v1.2%20-%20Jan%202002.pdf
OSINTCurio.us website: https://osintcurio.us/
Silverman, C. (2020) Verification Handbook: For Disinformation and Media Manipulation (First edition) available online: https://s3.eu-central-1.amazonaws.com/datajournalismcom/handbooks/Verification-Handbook-3.pdf
United Nations Office on Drugs and Crime (UNODC) (2011) Criminal Intelligence
Manual for Analysts available online: https://www.unodc.org/documents/organized-crime/Law-Enforcement/Criminal_Intelligence_for_Analysts.pdf