Undergraduate Module Descriptor

SOC3128: Introduction to Open-source Intelligence (OSINT)

This module descriptor refers to the 2021/2 academic year.

Module Content

Syllabus Plan

Whilst the module’s precise content may vary from year-to-year, it is envisaged that the syllabus will cover some or all of the following themes:

  • Introduction: What is Open-source intelligence? What is its role in contemporary law enforcement investigations? Preparing your computer for OSINT work.
  • OSINT methodology and workflow, documentation, and ethics
  • Search engines and online communities
  • Social media part 1
  • Social media part 2
  • Email, usernames, telephone numbers, and search engines
  • Online maps, geolocation, and documents
  • Images and videos
  • Domain names and IP addresses
  • Government and business records and virtual currencies
  • Data breaches and leaks
  • Wrap-up revision, and the future of OSINT

The teaching sessions for this module will take the form of weekly two hour long practical sessions, whereby the students will have short lectures from the module convener on the above subjects accompanied by practical exercises.

Learning and Teaching

This table provides an overview of how your hours of study for this module are allocated:

Scheduled Learning and Teaching ActivitiesGuided independent studyPlacement / study abroad
301200

...and this table provides a more detailed breakdown of the hours allocated to various study activities:

CategoryHours of study timeDescription
Scheduled learning and teaching activities2211 x two hour taught practical sessions
Guided independent studies36Course readings and other multi-media content
Guided independent study25Reading/research for essay
Guided independent study59Group work/research for technical report

Online Resources

This module has online resources available via ELE (the Exeter Learning Environment).

Indicative Reading List

This reading list is indicative - i.e. it provides an idea of texts that may be useful to you on this module, but it is not considered to be a confirmed or compulsory reading list for this module.

Akhgar, B., Bayerl, P., & Sampons, F. (2017) Open Source Intelligence Investigation: From Strategy to Implementation (first edition) Spinger: Cham

Bazzell, M. (2019) Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information (7th edition) Independently published

Bellingcat podcast: https://www.bellingcat.com/category/resources/podcasts/

Golenburg, A. & Finkelstein, J. (2020) Cyber Swarming, Memetic Warfare And Viral Insurgency: How Domestic Militants Organize on Memes to Incite Violent Insurrection and Terror Against Government and Law Enforcement available online: http://ncri.io/wp-content/uploads/NCRI-White-Paper-Memetic-Warfare.pdf

Human Rights Center (2020) Berkeley Protocol on Digital Open Source Investigations available online: https://www.ohchr.org/Documents/Publications/OHCHR_BerkeleyProtocol.pdf

NATO (2001) NATO Open Source Handbook available online: http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSINT%20Handbook%20v1.2%20-%20Jan%202002.pdf

OSINTCurio.us website: https://osintcurio.us/

Silverman, C. (2020) Verification Handbook: For Disinformation and Media Manipulation (First edition) available online: https://s3.eu-central-1.amazonaws.com/datajournalismcom/handbooks/Verification-Handbook-3.pdf

United Nations Office on Drugs and Crime (UNODC) (2011) Criminal Intelligence

Manual for Analysts available online: https://www.unodc.org/documents/organized-crime/Law-Enforcement/Criminal_Intelligence_for_Analysts.pdf