• Title/Summary/Keyword: Open Source Intelligence

Search Result 62, Processing Time 0.03 seconds

Intelligence in the Internet Era: Understanding OSINT and Case Analysis (인터넷 시대의 정보활동: OSINT의 이해와 적용사례분석)

  • Lee, Wan-Hee;Yun, Min-Woo;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.259-278
    • /
    • 2013
  • With advances of information technology (IT) and the Internet, it became much easier to search and collect information through many different types of web search engine. Such information only restricted to the intelligence services became available to the public, and the increased open source changed the intelligence collection activities of governments. Open Source Intelligence (OSINT) was introduced to organize and analyze the large volumes of information. OSINT is actively used after the 9/11 terrorist attack, and the United States government invest a huge amount of budget to conduct research and develope technology about OSINT. Although many Western countries recognize the importance of OSINT and deal with open source as priority, South Korea has not fully understand the important role of OSINT. Therefore, this study introduces the fundamental principles of OSINT and provides practical examples of OSINT usage. OSINT is an effective source to prevent terrorist attacks as well as a variety of crimes. Extensive discussion and suggestions for future usages are provided.

  • PDF

A System for National Intelligence Activity Based on All Kinds of OSINT(Open Source INTelligence) on the Internet (인터넷의 다원적 공개출처정보(OSINT)에 기반을 둔 국가정보활동 체계)

  • 조병철
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.41-55
    • /
    • 2003
  • Today the traditional national intelligence activities which are mainly based on classified informations are confronted with several problems. These are excessive collection cost, morality of intelligence activity, objectivity of intelligence, intelligence dead zone and timeliness of intelligence etc. On the other hand, circumstances of national intelligence activity are rapidly changed. Those are rapid growth of internet, transformation of classified information into open one and rapid growth of intelligence capabilities of private sector. To cope these problems and circumstances, we reevaluated OSINT(Open Source INTelligence) which is collected from all kinds of open source informations on the internet. First, we classified OSINT into four categories corresponding to the traditional classified collection methods i.e., IMINT, SIGINT, HUMINT and MASINT. And we evaluate the value of OSINT in comparison with classified collection methods. Finally a system for national intelligence activity based on all kinds of open source intelligence on the internet is proposed, described and compared with the system of traditional national intelligence activity.

  • PDF

An Evaluation Study on Artificial Intelligence Data Validation Methods and Open-source Frameworks (인공지능 데이터 품질검증 기술 및 오픈소스 프레임워크 분석 연구)

  • Yun, Changhee;Shin, Hokyung;Choo, Seung-Yeon;Kim, Jaeil
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.10
    • /
    • pp.1403-1413
    • /
    • 2021
  • In this paper, we investigate automated data validation techniques for artificial intelligence training, and also disclose open-source frameworks, such as Google's TensorFlow Data Validation (TFDV), that support automated data validation in the AI model development process. We also introduce an experimental study using public data sets to demonstrate the effectiveness of the open-source data validation framework. In particular, we presents experimental results of the data validation functions for schema testing and discuss the limitations of the current open-source frameworks for semantic data. Last, we introduce the latest studies for the semantic data validation using machine learning techniques.

A Design of Small Drone with Open Source Frame and Software (오픈 소스를 활용한 소형 드론 설계와 제작에 대한 연구)

  • Lee, Jun Ha
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.2
    • /
    • pp.78-81
    • /
    • 2019
  • In this study, we will analyze the design, development and application of these small drones using open source. These drones are used in flight exercises, aerial photography, and coding education. In the era of the fourth industrial revolution, such as the development of sensor technology, expansion of open source sharing, and application of artificial intelligence, Is expected to be able to demonstrate convergence. In this paper, we have studied the design and fabrication of small drones using open source. In the case of drones, various functions and differentiated materials are required depending on the application, and the future development of the unmanned mobile object, namely the drone, in which the creativity and the technology are combined with each other continues to be enhanced by the improvement of autonomy and artificial intelligence. Software-based architecture-based technologies have been developed in collaboration with embedded SWs that combine sensors, motors, and control systems. In hardware, it is customary to use a combination of materials and design to increase the freedom of design. It will be made in a free structure.

A Study on Building a Cyber Attack Database using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버공격 데이터베이스 구축방안 연구)

  • Shin, Kyuyong;Yoo, Jincheol;Han, Changhee;Kim, Kyoung Min;Kang, Sungrok;Moon, Minam;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.113-121
    • /
    • 2019
  • With the development of the Internet and Information Communication Technology, there has been an increase in the amount of Open Source Intelligence(OSINT). OSINT can be highly effective, if well refined and utilized. Recently, it has been assumed that almost 95% of all information comes from public sources and the utilization of open sources has sharply increased. The ISVG and START programs, for example, collect information about open sources related to terrorism or crime, effectively used to detect terrorists and prevent crime. The open source information related to the cyber attacks is, however, quite different from that in terrorism (or crime) in that it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage. In addition, the data itself of cyber attacks is relatively unstructured. So, a totally new approach is required to establish and utilize an OSINT database for cyber attacks, which is proposed in this paper.

A Study on Priority Analysis of Evaluation Factors for Cyber Threats using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버위협 평가요소의 중요도 분석 연구)

  • Kang, Sungrok;Moon, Minam;Shin, Kyuyong;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.49-57
    • /
    • 2020
  • It is no exaggeration to say that we live with cyber threats every day. Nevertheless, it is difficult for us to obtain objective information about cyber threats and attacks because it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage, and rely on information from a single source. In the preceding research of this study, we proposed the new approach for establishing Database (DB) for cyber attacks using Open Source Intelligence(OSINT). In this research, we present the evaluation factors for cyber threats among cyber attack DB and analyze the priority of those factors in oder to quantify cyber threats. We select the purpose of attack, attack category, target, ease of attack, attack persistence, frequency of OSINT DB, and factors of the lower layer for each factor as the evaluation factors for cyber threats. After selection, the priority of each factor is analyzed using the Analytic Hierarchy Process(AHP).

Cyber Threats Prediction model based on Artificial Neural Networks using Quantification of Open Source Intelligence (OSINT) (공개출처정보의 정량화를 이용한 인공신경망 기반 사이버위협 예측 모델)

  • Lee, Jongkwan;Moon, Minam;Shin, Kyuyong;Kang, Sungrok
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.115-123
    • /
    • 2020
  • Cyber Attack have evolved more and more in recent years. One of the best countermeasure to counter this advanced and sophisticated cyber threat is to predict cyber attacks in advance. It requires a lot of information and effort to predict cyber threats. If we use Open Source Intelligence(OSINT), the core of recent information acquisition, we can predict cyber threats more accurately. In order to predict cyber threats using OSINT, it is necessary to establish a Database(DB) for cyber attacks from OSINT and to select factors that can evaluate cyber threats from the established DB. We are based on previous researches that built a cyber attack DB using data mining and analyzed the importance of core factors among accumulated DG factors by AHP technique. In this research, we present a method for quantifying cyber threats and propose a cyber threats prediction model based on artificial neural networks.

ETRI AI Strategy #4: Expanding AI Open Platform (ETRI AI 실행전략 4: AI 개방형 플랫폼 제공 확대)

  • Kim, S.M.;Hong, A.R.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.36-45
    • /
    • 2020
  • The method and process of research and development (R&D) is changing when we develop artificial intelligence (AI), and the way R&D results are dispersed is also changing. For the R&D process, using and participating in open-source ecosystems has become more important, so we need to be prepared for open source. For product and service development, a combination of AI algorithm, data, and computing power is needed. In this paper, we introduce ETRI AI Strategy #4, "Expanding AI Open Platform." It consists of two key tasks: one to build an AI open source platform (OSP) to create a cooperative AI R&D ecosystem, and another to systematize the "x+AI" open platform (XOP) to disperse AI technologies into the ecosystem.

A Study of 'The Makers Movement' in Furniture Design - Focused on 'KEA Hacking' - (가구디자인에서의 '메이커 무브먼트(Makers Movement)' 사례 분석 연구 - '이케아 해킹(IKEA Hacking)' 사례를 중심으로 -)

  • Kang, Hyun-dae
    • Journal of the Korea Furniture Society
    • /
    • v.28 no.3
    • /
    • pp.156-168
    • /
    • 2017
  • The digital information society that developed along with the 21st century is the 'Open-source Making Movement' which produces collective intelligence through open-source sharing and digital manufacturing tools, which is called 'Makers Movement'. The purpose of this paper is to analyze the case of Makers Movement in furniture design through 'IKEA Hacking' which arose simultaneously with the Makers Movement, and to study and present the prospect and direction of furniture design in the change of manufacturing industry. In this study, four design features were compared with IKEA hacking cases along with the establishment of 'community' which is a feature of Makers Movement. Four characteristics are first customized design, second derivative design through open source, third long -Tail effect design, and fourth, design using digital manufacturing tools. The prospect and direction of furniture design through this study are as follows: first, democratization of furniture design manufacturing, second job creation, third, coexistence of large and small enterprises, fourth promotion of various new technologies, and fifth, discovery of various furniture designers through 'Open System Organization'.

Design and Implementation of Facial Mask Wearing Monitoring System based on Open Source (오픈소스 기반 안면마스크 착용 모니터링 시스템 설계 및 구현)

  • Ku, Dong-Jin;Jang, Joon-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.89-96
    • /
    • 2021
  • The number of confirmed cases of coronavirus-19 is soaring around the world and has caused numerous deaths. Wearing a mask is very important to prevent infection. Incidents and accidents have occurred due to the recommendation to wear a mask in public places such as buses and subways, and it has emerged as a serious social problem. To solve this problem, this paper proposes an open source-based face mask wearing monitoring system. We used open source software, web-based artificial intelligence tool teachable machine and open source hardware Arduino. It judges whether the mask is worn, and performs commands such as guidance messages and alarms. The learning parameters of the teachable machine were learned with the optimal values of 50 learning times, 32 batch sizes, and 0.001 learning rate, resulting in an accuracy of 1 and a learning error of 0.003. We designed and implemented a mask wearing monitoring system that can perform commands such as guidance messages and alarms by determining whether to wear a mask using a web-based artificial intelligence tool teachable machine and Arduino to prove its validity.