Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine
dc.contributor.author | Rheault, Elliott | en |
dc.contributor.author | Nerayo, Mary | en |
dc.contributor.author | Leonard, Jaden | en |
dc.contributor.author | Kolenbrander, Jack | en |
dc.contributor.author | Henshaw, Christopher | en |
dc.contributor.author | Boswell, Madison | en |
dc.contributor.author | Michaels, Alan J. | en |
dc.date.accessioned | 2024-10-01T12:56:20Z | en |
dc.date.available | 2024-10-01T12:56:20Z | en |
dc.date.issued | 2024-08-13 | en |
dc.date.updated | 2024-09-27T13:18:09Z | en |
dc.description.abstract | In most open-source intelligence (OSINT) research efforts, the collection of information is performed in an entirely passive manner as an observer to third-party communication streams. This paper describes ongoing work that seeks to insert itself into that communication loop, fusing openly available data with requested content that is representative of what is sent to second parties. The mechanism for performing this is based on the sharing of falsified personal information through one-time online transactions that facilitate signup for newsletters, establish online accounts, or otherwise interact with resources on the Internet. The work has resulted in the real-time <i>Use and Abuse of Personal Information</i> OSINT collection engine that can ingest email, SMS text, and voicemail content at an enterprise scale. Foundations of this OSINT collection infrastructure are also laid to incorporate an artificial intelligence (AI)-driven interaction engine that shifts collection from a passive process to one that can effectively engage with different classes of content for improved real-world privacy experimentation and quantitative social science research. | en |
dc.description.version | Published version | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.citation | Rheault, E.; Nerayo, M.; Leonard, J.; Kolenbrander, J.; Henshaw, C.; Boswell, M.; Michaels, A.J. Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine. J. Cybersecur. Priv. 2024, 4, 572-593. | en |
dc.identifier.doi | https://doi.org/10.3390/jcp4030027 | en |
dc.identifier.uri | https://hdl.handle.net/10919/121244 | en |
dc.language.iso | en | en |
dc.publisher | MDPI | en |
dc.rights | Creative Commons Attribution 4.0 International | en |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | en |
dc.subject | open-source intelligence | en |
dc.subject | OSINT | en |
dc.subject | privacy experimentation | en |
dc.subject | personal information | en |
dc.title | Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine | en |
dc.title.serial | Journal of Cybersecurity and Privacy | en |
dc.type | Article - Refereed | en |
dc.type.dcmitype | Text | en |