The use of the open source intelligence in the criminal investigations

The study examined the legal foundations of criminal OSINT based on international and domestic regulators. The use of criminal OSINT as part of the disclosure of crimes committed in cyberspace or with the help of computer and information technologies.

Рубрика Государство и право
Вид статья
Язык английский
Дата добавления 24.01.2022
Размер файла 18,0 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Размещено на http://www.allbest.ru/

The use of the open source intelligence in the criminal investigations

Peter Nyeste

Ph.D, professor assistant, Senior Lecturer, National University of Public Service Faculty of Law Enforcement Criminal Investigation, Economic Crime and Cybercrime Department Budapest, Hungary

Peter Nyeste

The Use of the Open Source Intelligence in the Criminal Investigations

In this study it was examined the legal bases of criminal OSINT on the basis of international and domestic regulators. Subsequently, I dealt with the criminal OSINT tools, key areas of application, methodological tools and OSINT units within the police organization. In addition to traditional investigative tools, the use of criminal OSINT has become an integral part of the detection of crimes committed in cyberspace or by means of computer and information technology.

Key words: open source intelligence, criminal investigation, criminal OSINT, criminal intelligence.

Introduction

The explositation of information revolution in society and the change in the habits of the Y, Z generations have radically changed the way the access and processing of information. Nowadays, we are only superficially reading large volumes of content, and it is much more common to quickly review and change short content by topic. It is estimated that 28% of the world's rapidly growing population (over 2 billion people) have direct access to the World Wide Web and nearly 5 billion people have mobile phones. On average, 247 billion emails are sent every day. This percentage increases by 24% each year. Today, by 2020, more than 4 billion people worldwide are using the Internet. In 2017, the number of mobile Internet users exceeded the number of PC users. 45% of the world's population actively uses social media, exactly 3484 million people, 42% of whom use social platforms through mobile devices.

The most popular social media are Facebook, followed by YouTube and then Instagram. criminal legal cyberspace

The increasing amount of information from day to day presents enormous challenges for law enforcement agencies and national security services as well. Governments have a legitimate need to continuously prevent national security challenges, risks and threats, and identify serious and organized crime, terrorism, criminal groups, individuals. It is equally important to prove their criminal activities and dismantle criminal organizations. PETER Nyeste: Bunugyi OSINT (Criminal OSINT), In FERENC Szendrei (szerk): Handbook of Criminal Intelligence p.209.

Criminal intelligence has two very important purposes. On the one hand, it should be very timely and, on the other hand, fill in the decision-maker's lack of information to match the decision-maker's information need. If any of these conditions is not met, the gathering of information becomes self-serving, out-ofdate. The use of OSINT for criminal purposes can efficiently and purposefully assist the decisions of investigators and leaders in criminal intelligence and criminal investigation at law enforcement agencies.

Legal background

The European Union's Internal Security Strategy5842/2/2010 Council of The European Union, Draft Internal Security Strategy for the European Union: "Towards a European Security Model", adopted in 2010, set out challenges, principles and guidelines. Based on the strategy, the EU's intelligence, counter intelligence, and law enforcement agencies have to face the below most pressing challenges in the coming years:

* human trafficking, smuggling of drugs and firearms, money laundering, illegal transport and disposal of waste inside and outside Europe, trafficking in counterfeit or dangerous goods, terrorism, cybercrime, border security

Europol's current SOCTA reporthttps://www.europol.europa.eu/socta-report, published in 2017, identifies the following eight priority crime threats:

• cybercrime

• drug production, trafficking and distribution

• migrant smuggling

• organised property crime

• trafficking in human beings

• criminal finances and money laundering

• document fraud

• online trade in illicit goods and services.

These criminal acts presuppose the operation of international organized criminal groups, and effective action against the criminal organizations must be coordinated at European level. According to the Strategy and Europol report, effective prevention and threat assesment require a proactive intelligence based approach.

The Hungarian Police Act defines crime prevention as a criminal intelligence activity that does not deal with a concrete crime, but so criminal acts that threatens the social order of Hungary. Crime prevention has been defined as one of the possible purposes of criminal intelligence, and the steps to be taken to achieve it have been progressively regulated.

• First, the general concept of crime prevention and its tasks were defined in law, which is functioning as the so-called intelligence-led policing based on the all analyzed law enforcement information.

• According to the law, the police carry out crime prevention by monitoring the criminal situation in Hungary, revealing the risks of committing crimes, and obtaining, analyzing, evaluating, monitoring and transmitting crime-related information which are necessary for the purpose of preventing or combating crime.

This general purpose crime prevention system is the basis for the strategic and tactical intelligence of the police, which collects information not only for criminal purposes but also for other law enforcement branches so meets their information needs.

• In addition to general crime prevention measures, under certain conditions available use so covered information gathering methods,RECOMMENDATION REC (2005)10 of the commitee of Ministers to member states on "special

investigation techniques" in relation to serious crimes including acts of terrorism.

EXPLANATORY REPORT of the Recommendation Rec (2005) 10 of the commitee of Ministers to member states on "special investigation techniques" in relation to serious crimes including acts of terrorism. which no need judicial authorization.

• The law enforcement agencies can use only by judicial approval coercive, covered criminal intelligence methods for the purpose of prevention organised crime.DI NICOLA Andrea - GOUNEV Philip - LEVI Michael - RUBIN Jennifer: Study on paving the way for future policy initiatives in the field of fight against organised crime: The effectiveness of specific criminal law measures targeting organised crime, Final report, February 2014, Brussel

The new framework of the Hungarian Criminal Procedural Law ensure that it is possible to establish or exclude the suspision of crime before the investigation begins.PETER Nyeste: A leplezett eszkozok hatekonysaga (Effectiveness of special investigative means), Pecsi Hataror Tudomanyos Kozlemenyek Vol. XIX. 2017. p.157.

* During data collection the data can be collected from the records specified in the particular law, data may be collected from a file or source made or lawfully made available to the public.

An important task of data collection is the gathering from open source information (before and below the investigation).

The new law on criminal procedure regulates in detail the use of covered investigative measures based on the special european investigative tools.PETER Nyeste: Specialis nyomozasi eszkozok az Europai Unio tagallamaiban (Special Investigative means in the Member States of the European Union), Belugyi Szemle Vol. 64. 2016. p.16. These investigative methods are enrich procedural and data collection possibilities.

Criminal OSINT

OSINT is a method developed by US secret services, which has become commonplace with the spread of the Internet, not only within the secret services but also from business to government, across a broad spectrum.LASZLO Balint: Terrorelharitasi Informacios es Bunugyi Elemzo Kozpont (Counter-Terrorism Information and Criminal Analysis Centre, -In. (szerk): Resperger Istvan: A nemzetbiztonsag elmelete a kozszolgalatban (Theory of national cecurity in the civil service, 2018. p. 139. Open source information cannot replace secret sources, but it can complement and verified information from classified and other sources, and that can be used after proper evaluation and analysis.

According to Robert D. Steele, Chief Executive Officer of Open Source Solutions (OSS.Net), 20% of usable information can be obtained from classified sources at 95% of the cost, 80% of the available information comes from open sources, which requires 5% of the cost. This estimate is also correct in criminal investigations too.

The domestic definition of OSINT was defined by Gabor Levay as follows:

"OSINT means the professional search, collection, selection, analysis, evaluation and utilization of non-military intelligence and counterintelligence data which are publicly available, legally collected and distributed or limited use, but not classified." GABOR Levay: OSINT (Open Source Intelligence) - Nyilt informacios hirszerzes. ZMNE, Egyetemi jegyzet, Budapest, 2006. p.6.

The concept shows that this method is used to obtain data that are not classified, unprotected from unauthorized access, and can be purposefully obtained, either through human resources or through technical search engines.

Sources of OSINT information according to the OSINT NATO11 Manual:

• internet, Deep Web

• Commercial Online (Fee for Access)

• Gray Literature

• Subject-Matter Experts

• Commercial Geospatial Information

• Direct Ground and/or Aerial Reconnaissance

• Complex Human and/or Technical Service

Within the European Union, serious and organized crime at the local, regional and international levels is becoming ever closer, with the collapse of borders and the free movement of persons.Over 5,000 organized crime groups operating in the European Union, identified according to uniform European criteria and operating at international level.NATO OSINT Handbook, Saclant, Norfolk,2001. Europol: Serious and Organized Crime Threat Assesment 2017.

One of the most common crime scenes in the world today is cyber space, where crime is committed or services are provided or information is transmitted to criminal groups, terrorists, and radicalization can also be promoted. Filtering, analyzing, and utilizing evaluated information from an open source can be a great help in preventing and detecting serious and organized crime, as well as in detecting crimes below this level. Previously, gathering open source information was a secondary task of the secret services, but with the spread of the information revolution web newsletters, radios, blogs, and social media posts were all transformed into information sources that could be useful data sources with appropriate and systematic filtering.

OSINT tools:

• innovative data mining and data analysis methods,

• intelligent linguistic search method,

• smart search engines,

• thematic sorting system (e.g. automating RSS feed monitoring),

• monitoring community sites (e.g. instant risk assessment of flash mobs),

• evaluating the source code of websites, displaying hidden content,

• domain search, whois tools (retrieve data associated with the domain subscriber of the site),

• Hungarian and international press monitoring.

Key OSINT Areas:

* Internet news,

• gray literature,

• social network,

• traditional media,

• open data repositories,

• records (e.g. Firminfo, Takarnet). LASZLO Balint: Terrorelharitasi Informacios es Bunugyi Elemzo Kozpont (Counter-Terrorism Information and Criminal Analysis Centre, -In. (szerk): Resperger Istvan: A nemzetbiztonsag elmelete a kozszolgalatban (Theory of national cecurity in the civil service, 2018. p. 139.

In Hungary, the Counter-terrorism Information and Criminal Analysis Center continuously examines Hungary's security and criminal situation and analyse Hungary's national security, criminal and terrorism threat situation. The Counter-terrorism Information and Criminal Analysis Center operates an open source information and processing service (OSINT Center) and provide analysed information for Law Enforcement Agencies, National Security Services and other contributors. With this task, the organizational element of the central criminal OSINT was created, and now the Department performs its tasks in an organizational form and provides its services.

"By monitoring, evaluating and analyzing blogs, news sources at domestic level and abroad, the central OSINT can filter out, for example:

- Expected directions for the development of the latest designer drugs (risky compounds), online distribution networks, target, potential online or real- world distribution sites (chat, blog).

- Changes in risk levels, group formation initiatives in the process of radicalization.

- Changes in the financial position of organized crime groups that have already been identified in the course of asset recovery activities, which seek to remove criminal profits from the scope of the authorities

- Relations between domestic and foreign criminal organizations, movement of money derived from crime. "14

The most commonly used OSINT methodological tools for crime detection are lexical, textual content analysis, social network analysis, geoinformatics analyse based on the data of user's social media tools and combinations thereof.

The Cybercrime Unit of the National Bureau of Investigation of Rapid Response and Special Service provides assistance to other police units and gives OSINT methodological training in the detection of specific crimes.

Based on the above OSINT as a criminal investigation tool has become an indispensable investigative tool nowdays.

Bibliography

1. ALFRED Rolington: Strategiai hirszerzes a XXI. szazadban: A mozaikmodszer (Strategic Intelligence for the 21'st Century: The Mosaic Method), Antal Jozsef Tudaskozpont, 2015.

2. DI NICOLA Andrea - GOUNEV Philip - LEVI Michael - RUBIN Jennifer: Study on paving the way for future policy initiatives in the field of fight against organised crime: The effectiveness of specific criminal law measures targeting organised crime, Final report, February 2014, Brussel

3. LASZLO Balint: Terrorelharitasi Informacios es Bunugyi Elemzo Kozpont (Counter-Terrorism Information and Criminal Analysis Centre, -In. (szerk): Resperger Istvan: A nemzetbiztonsag elmelete a kozszolgalatban (Theory of national security in the civil service, 2018.

4. Europol: Serious and Organized Crime Threat Assesment 2017.

5. EXPLANATORY REPORT of the Recommendation Rec (2005) 10 of the commitee of Ministers to member states on "special investigation techniques" in relation to serious crimes including acts of terrorism.

6. GABOR Levay: OSINT (Open Source Intelligence) - Nyilt informacios hirszerzes. ZMNE, Egyetemi jegyzet, Budapest, 2006.

7. NATO OSINT Handbook, Saclant, Norfolk,2001.

8. PETER Nyeste: A leplezett eszkozok hatekonysaga (Effectiveness of special investigative means), Pecsi Hataror Tudomanyos Kozlemenyek Vol. XIX.2017.

9. PETER Nyeste: Specialis nyomozasi eszkozok az Europai Unio tagallamaiban (Special Investigative means in the Member States of the European Union), Belugyi Szemle Vol. 64. 2016.

10. PETER Nyeste: Bunugyi OSINT (Criminal OSINT), In: FERENC Szendrei (szerk): Handbook of Criminal Intelligence, Dialog Campus Kiado, 2019.

11. RECOMMENDATION REC (2005) 10 of the commitee of Ministers to member states on "special investigation techniques" in relation to serio us crimes including acts of terrorism.

12. 5842/2/2010 Council of The European Union, Draft Internal Security Strategy for the European Union: "Towards a European Security Model" https://www.europol.europa.eu/socta-report 1994.evi XXXIV. torveny a rendorsegrol (Police Act) 2007.evi. XC. torveny a buntetoeljarasrol (Criminal Procedure Law)

Размещено на Allbest.ru

...

Подобные документы

  • The purpose of state punishment. Procedure of criminal case. The aim of punishment. Theories of Punishment. The Difficult Child. Last hired, first fired. The Health Professions. Traditional Collector's Editions. Hospital and Specialist Services.

    шпаргалка [41,7 K], добавлен 23.03.2014

  • Characteristics of Applied Sciences Legal Linguistics and its main components as part of the business official Ukrainian language. Types of examination of texts and review specific terminology used in legal practice in interpreting legal documents.

    реферат [17,1 K], добавлен 14.05.2011

  • Determination of the notion of the legal territory of estimation. Sensor bases of information for legal estimating activity (estimation). Legal estimating abilities. Motivation of applied psychotechnics for legal estimating, and self-estimating.

    реферат [19,3 K], добавлен 13.02.2015

  • Three models of juvenile system. The modern system of juvenile justice in Britain and Russia. Juvenile court. Age of criminal responsibility. Prosecution, reprimands and final warnings. Arrest, bail and detention in custody. Trial in the Crown Court.

    курсовая работа [28,2 K], добавлен 06.03.2015

  • Understanding the science of constitutional law. Organization of state power and the main forms of activity of its bodies. The study of the constitutional foundations of the legal status of the citizen, local government. Research on municipal authorities.

    реферат [15,3 K], добавлен 14.02.2015

  • Interaction of the courts of general jurisdiction and the Constitutional court of Ukraine. Impact of the institute of complaints on human rights. Analis of an independent function of the Constitutional court and courts of the criminal jurisdiction.

    статья [19,6 K], добавлен 19.09.2017

  • The principles of the international law and the international contracts are the component of legal system of the Russian Federation. The question of application of the norms of the international law and contracts in activity of the Constitutional Court.

    реферат [16,0 K], добавлен 07.01.2015

  • The concept and features of the state as a subject of international law. The sovereignty as the basis of the rights and duties of the state. Basic rights and obligations of the state. The international legal responsibility of states. Full list of rights.

    курсовая работа [30,1 K], добавлен 17.05.2016

  • "E-democracy" is a public use of Internet technologies Analysis of the problems dialogue information and of the notional device, uniform and available for specialists, facilities of the electronic constitutional court, on-line participation of citizens.

    реферат [17,1 K], добавлен 14.02.2015

  • Проблеми становлення інформаційного суспільства в Україні. Світова електронна мережа правових документів global legal information network. Види і мета юридичної відповідальності в інформаційному праві. Перспективи розвитку загального законодавства.

    реферат [25,0 K], добавлен 22.05.2009

  • System of special legal supremacy of the Constitution guarantees the main source of law. The introduction and improvement of the process of constitutional review in the Dnestr Moldavian Republic. Interpretation of the provisions of the Constitution.

    реферат [19,8 K], добавлен 14.02.2015

  • The article covers the issue of specific breaches of international law provisions owed to Ukraine by Russia. The article also examines problems in the application of international law by Russia. In the course of the Russian aggression against Ukraine.

    статья [42,0 K], добавлен 19.09.2017

  • The foundations of the constitutional system of the Russian Federation. The civil society as the embodiment of balance of private and public interests. Legal and functional character of the civil society. Institutional structure of constitutional system.

    реферат [19,5 K], добавлен 07.01.2015

  • The differences between the legal norm and the state institutions. The necessity of overcoming of contradictions between the state and the law, analysis of the problems of state-legal phenomena. Protecting the interests and freedoms of social strata.

    статья [18,7 K], добавлен 10.02.2015

  • Creation history International Partnership for Human Rights. Projects aiming to advance the rights of vulnerable communities, such as women, children, migrants and minorities, who are subject to human rights abuses in different parts of the world.

    презентация [472,6 K], добавлен 04.10.2012

  • The official announcement of a state of emergency in the country. Legal measures that State Party may begin to reduce some of its obligations under the International Covenant on Civil and Political Rights. Ensure public order in emergency situations.

    реферат [19,2 K], добавлен 08.10.2012

  • Concept of development basic law. Protection of freedom through the implementation of the principle of subsidiarity. Analysis of the humanitarian aspects of the legal status of a person. Systematic review of articles of the constitution of Russia.

    реферат [21,2 K], добавлен 14.02.2015

  • In world practice constitutional control is actually a develop institute with nearly bicentennial history. In this or that form it is presented and successfully functions in the majority of democratic states. Constitutionally legal liability in Russia.

    реферат [51,3 K], добавлен 10.02.2015

  • The steady legal connection of the person with the state, expressing in aggregate of legal rights and duties. The Maastricht Treaty of 1992. Establishment of the European Economic Community. Increase of the number of rights given to the citizens.

    реферат [22,5 K], добавлен 13.02.2015

  • Degradation of environment in cities has brought to destruction of ecosystems and its inconvertible nature. At characteristics of the occupied (housing) lands in the city as important condition of formation of favorable ambience of environment for people.

    статья [20,4 K], добавлен 10.02.2015

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.