Role of Open Source Intelligence (OSINT) in Cybersecurity and Threat Analysis

Article Sidebar

Main Article Content

Ernest O. NONUM.
Oghenetega AVWOKURUAYE.
Tochukwu M. EZEMONYE

Abstract: Open-Source Intelligence (OSINT) has existed prior to modern technology. Military and political organizations employed OSINT to gather intelligence on their adversaries and opponents, respectively, for strategic decision making. In this era, OSINT is used both for cyber attacks by bad actors and for detecting cyber attacks. Its importance in cyber security cannot be overemphasized, especially when coupled with artificial intelligence. The objectives of the study were outlined, including delving into the basics of OSINT, its use in cyber security and investigations of some selected tools and techniques employed in OSINT. This study relies on a desk research approach, where existing data from various sources are reviewed to get background knowledge on the topic under study. The reasons for undertaking this study are also stated. The use of OSINT comes with challenges, limitations, privacy concerns, legal and ethical considerations, and OSINT threats. The study provides insights on how they are tackled, as well as OSINT applications. 

Role of Open Source Intelligence (OSINT) in Cybersecurity and Threat Analysis. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(3), 189-200. https://doi.org/10.51583/IJLTEMAS.2025.140300023

Downloads

References

Ludo Block (2023). The long history of OSINT, Journal of Intelligence History, DOI: 10.1080/16161262.2023.2224091 Office of the Director of National Intelligence. What is Intelligence. Retrieved from https://www.dni.gov/index.php/what-we-do/what-is-intelligence

Ritu Gill, 2023. What is Open-Source Intelligence. SANS. Retrieved from https://www.sans.org/blog/what-is-open-source-intelligence/ Cisco. What is Cybersecurity? Retrieved from https://www.cisco.com/site/us/en/learn/topics/security/what-is-cybersecurity.html

Alanoud A. et al., 2023. How Dark Web Monitoring can be Used for OSINT and Investigations. Journal of Theoretical and Applied Information Technology, Vol.101. No 10. Dep of Computer Networks and Communications, CCSIT, King Faisal University, Al Hassa 31982, Saudi Arabia. Retrieved from https://www.jatit.org/volumes/Vol101No10/15Vol101No10.pdf

Nema M., 2024. The Role of Open Source Intelligence in Advancing Cybersecurity. Uniethena. Retrieved from https://uniathena.com/role-open-source-intelligence-advancing-cybersecurity

Yogish P., & Krishna P., 2021. Open Source Intelligence & its Applications in Next Generation Cuber Security - A Literature Review. International Journal of Applied Engineering & Management, IJAEML Vol. 5. College of Computer Science & Information Science, Srinivas University, Mangalore, India.

Kriesch S. J., 2024. Integrating OSINT and Cyber Threat Intelligence to Enhance the Security of Enterprise IoT. University of Bamberg. Retrieved from https://www.researchgate.net/publication/381045472

DiSiEM, 2017. Techniques & Tools for OSINT-based Threat Analysis. Gibson H., Ramwell S.S., & Day T., (2016). Analysis, Interpretation and Validation of Open Source Data. In Open Source Intelligence Investigation from Strategy to Implementation. Springer-Verlay.

Scott B., 2024. The Ethical Considerations of OSINT: Privacy vs Information Gathering. Retrieved from https://www.medium.com/@scottbolen/the-ethical-considerations-of-osint-privacy-vs-information-gathering-63b5b2f76c55

World Customs Organization (2024). Study Report. Unlocking the Value of Open-Source Intelligence (OSINT) for Customs Enforcement. Retrieved from https://www.wcoomd.org/-/media/wco/public/global/pdf/topics/enforcement-and-compliance/activities-and-programmes/security-programme/osint-report_final.pdf

Cisco, 2023. What is Cyber Threat Intelligence? https://www.cisco.com/c/en/us/products/security/what-is-cyber-threat-intelligence.html

Steve, A. 2023. A History of OSINT: From Informing Spies to Detecting Lies. Skope Now https://www.skopenow.com/news/a-history-of-osint

Schaurer, F. and Störger, J. 2013. The Evolution of Open-Source Intelligence. The Intellingencer. Journal of the US Intelligence Studies Vol 19. No. 3. https://www.afio.com/publications/Schauer Storger Evo of OSINT WINTERSPRING2013.pdf

Homeland Security Today, 2024. Evolution of OSINT: From Coup Crisis to Cutting-Edge Advancements with Social Media, AI, and Data Analytics https://www.hstoday.us/subject-matter-areas/intelligence/evolution-of-osint-from-coup-crisis-to cutting-edge-advancements-with-social-media-ai-and-data-analytics/ eSecurity Institute, 2023. OSINT Framework. https://www.esecurityinstitute.com/osint-framework/Retrieved from htpps://www.x.com/zachxbt?t= 3Eu1FcA3tVkNFb 12guMbQ&s=09 Nmap. https://www.nmap.org/

Canonical Ltd. (2024). Ubuntu Linux (Version 24.04.1 LTS). Retrieved from https://www.ubuntu.com/

Dobak, 1., 2024. Data Collection in the OSINT Investigation. Ludovika University of Public Service. Retrieved from https://www.researchgate.net

Ludo Block (2023). The long history of OSINT, Journal of Intelligence History, DOI: 10.1080/16161262.2023.2224091Office of the Director of National Intelligence. What is Intelligence. Retrieved from https://www.dni.gov/index.php/what-we-do/what-is-intelligence

Ritu Gill, 2023. What is Open-Source Intelligence. SANS. Retrieved from https://www.sans.org/blog/what-is-open-source-intelligence/ Cisco. What is Cybersecurity? Retrieved from https://www.cisco.com/site/us/en/learn/topics/security/what-is-cybersecurity.html

Alanoud A. et al., 2023. How Dark Web Monitoring can be Used for OSINT and Investigations. Journal of Theoretical and Applied Information Technology, Vol.101. No 10. Dep of Computer Networks and Communications, CCSIT, King Faisal University, Al Hassa 31982, Saudi Arabia. Retrieved from https://www.jatit.org/volumes/Vol101No10/15Vol101No10.pdf

Nema M., 2024. The Role of Open Source Intelligence in Advancing Cybersecurity. Uniethena. Retrieved from https://uniathena.com/role-open-source-intelligence-advancing-cybersecurity

Yogish P., & Krishna P., 2021. Open Source Intelligence & its Applications in Next Generation Cuber Security - A Literature Review. International Journal of Applied Engineering & Management, IJAEML Vol. 5. College of Computer Science & Information Science, Srinivas University, Mangalore, India.

Kriesch S. J., 2024. Integrating OSINT and Cyber Threat Intelligence to Enhance the Security of Enterprise IoT. University of Bamberg. Retrieved from https://www.researchgate.net/publication/381045472

DiSiEM, 2017. Techniques & Tools for OSINT-based Threat Analysis. Gibson H., Ramwell S.S., & Day T., (2016). Analysis, Interpretation and Validation of Open Source Data. In Open Source Intelligence Investigation from Strategy to Implementation. Springer-Verlay.

Scott B., 2024. The Ethical Considerations of OSINT: Privacy vs Information Gathering. Retrieved from https://www.medium.com/@scottbolen/the-ethical-considerations-of-osint-privacy-vs-information-gathering-63b5b2f76c55

World Customs Organization (2024). Study Report. Unlocking the Value of Open-Source Intelligence (OSINT) for Customs Enforcement. Retrieved from https://www.wcoomd.org/-/media/wco/public/global/pdf/topics/enforcement-and-compliance/activities-and-programmes/security-programme/osint-report_final.pdf

Cisco, 2023. What is Cyber Threat Intelligence? https://www.cisco.com/c/en/us/products/security/what-is-cyber-threat-intelligence.html

Steve, A. 2023. A History of OSINT: From Informing Spies to Detecting Lies. SkopeNow https://www.skopenow.com/news/a-history-of-osint

Schaurer, F. and Störger, J. 2013. The Evolution of Open-Source Intelligence. The Intellingencer. Journal of the US Intelligence Studies Vol 19. No. 3. https://www.afio.com/publications/Schauer Storger Evo of OSINT WINTERSPRING2013.pdf

Homeland Security Today, 2024. Evolution of OSINT: From Coup Crisis to Cutting-Edge Advancements with Social Media, AI, and Data Analytics

https://www.hstoday.us/subject-matter-areas/intelligence/evolution-of-osint-from-coup-crisis-to cutting-edge-advancements-with-social-media-ai-and-data-analytics/eSecurity Institute, 2023. OSINT Framework. https://www.esecurityinstitute.com/osint-framework/ Retrieved from htpps://www.x.com/zachxbt?t= 3Eu1FcA3tVkNFb 12guMbQ&s=09 Nmap. https://www.nmap.org/

Canonical Ltd. (2024). Ubuntu Linux (Version 24.04.1 LTS). Retrieved from https://www.ubuntu.com/ Dobak, 1., 2024. Data Collection in the OSINT Investigation. Ludovika University of Public Service. Retrieved from https://www.researchgate.net

Article Details

How to Cite

Role of Open Source Intelligence (OSINT) in Cybersecurity and Threat Analysis. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(3), 189-200. https://doi.org/10.51583/IJLTEMAS.2025.140300023