Have a personal or library account? Click to login

Automated Target Profiling: Leveraging Artificial Intelligence for Open-Source Intelligence Collection

Open Access
|Jul 2025

References

  1. Dawson ME Jr. Cyber Warfare: Threats and Opportunities [Internet]. Porto, Portugal: Universidade Fernando Pessoa; 2020 [cited 2025 Apr 20]. Available from: https://bdigital.ufp.pt/entities/publication/5e93c236-588a-4564-bfb6-982d33fe11b4.
  2. Dawson M. Integrating intelligence paradigms into cyber security curriculum for advanced threat mitigation. In: Information Technology – New Generations. Cham, Switzerland: Springer Nature; 2024. pp. 77–81.
  3. Oerlemans JJ, Langenhuijzen S. Balancing national security and privacy: examining the use of commercially available information in OSINT practices. Int J Intell CounterIntell. 2025;38(2):579–597.
  4. Browne TO, Abedin M, Chowdhury MJM. A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications. Int J Inf Secur. 2024;23(4):2911–2938.
  5. Stryker C, Kavlakoglu E. What is Artificial Intelligence (AI)? [Internet]. Armonk, NY: IBM; 2024 Aug 9 [cited 2025 Apr 20]. Available from: https://www.ibm.com/think/topics/artificial-intelligence.
  6. Sevilla J, Heim L, Ho A, Besiroglu T, Hobbhahn M, Villalobos P. Compute trends across three eras of machine learning. In: International Joint Conference on Neural Networks (IJCNN). [Place unknown]: IEEE; 2022. pp. 1–8.
  7. IBM. What are large language models (LLMs)? [Internet]. Armonk, NY: IBM; 2023 Nov 2 [cited 2025 Apr 20]. Available from: https://www.ibm.com/think/topics/large-language-models.
  8. OpenAI. GPT-4 technical report [Internet]. [Place unknown]: arXiv; 2023 [cited 2025 Apr 20]. Available from: https://arxiv.org/abs/2303.08774.
  9. EuRepoC. Dashboard - EuRepoC: European Repository of Cyber Incidents [Internet]. [Place unknown]: EuRepoC; 2023 Oct 13 [cited 2025 Apr 20]. Available from: https://eurepoc.eu/dashboard/.
  10. Kost E. What is an advanced persistent threat (APT)? [Internet]. Mountain View, CA: UpGuard; 2024 Nov 17 [cited 2025 Apr 20]. Available from: https://www.upguard.com/blog/what-is-an-advanced-persistent-threat.
  11. Conti M, Dargahi T, Dehghantanha A. Cyber threat intelligence: Challenges and opportunities. Adv Inf Secur. 2018;1–6.
  12. Baker K. What is Cyber Threat Intelligence? [Internet]. Austin, TX: CrowdStrike; 2025 Mar 4 [cited 2025 Apr 20]. Available from: https://www.crowdstrike.com/enus/cybersecurity-101/threat-intelligence/.
  13. Hwang YW, Lee IY, Kim H, Lee H, Kim D. Current status and security trend of OSINT. Wirel Commun Mob Comput. 2022;2022:1–14.
  14. MITRE ATT&CK®. APT Groups [Internet]. [Place unknown]: MITRE; [cited 2025 Apr 20]. Available from: https://attack.mitre.org/groups/.
  15. United States. Cybersecurity Act of 2015, 6 U.S.C. §§ 1501–1533, 2015.
  16. United States. Cybersecurity Enhancement Act of 2014, 15 U.S.C. §§ 7421–7430, 2014.
  17. Sun N, Ding M, Jiang J, Xu W, Mo X, Tai Y, Zhang J. Cyber Threat Intelligence Mining for Proactive Cybersecurity defense: A survey and new perspectives. IEEE Commun Surv Tutor. 2023;25(3):1748–1774.
  18. Evangelista JR, Sassi RJ, Romero M, Napolitano D. Systematic literature review to investigate the application of Open Source Intelligence (OSINT) with Artificial Intelligence. J Appl Secur Res. 2020;16(3):345–369.
  19. RapidAPI. RapidAPI [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/.
  20. RealtimeAPI. Facebook RealtimeAPI [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/realtimeapi-realtimeapi-default/api/facebook-realtimeapi.
  21. RockApis. LinkedIn API8 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/rockapis-rockapis-default/api/linkedin-api8.
  22. AhnKiet N. Facebook Data API2 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/tml25092004/api/facebook-data-api2.
  23. davethebeast. Twitter241 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/davethebeast/api/twitter241.
  24. Meta. React [Internet]. [Place unknown]: Meta; [cited 2025 Apr 20]. Available from: https://reactjs.org/.
  25. Grinberg M. Flask [Internet]. [Place unknown]: [Publisher unknown]; [cited 2025 Apr 20]. Available from: https://flask.palletsprojects.com/.
  26. Jocher G, et al. YOLOv8 [Internet]. [Place unknown]: Ultralytics; [cited 2025 Apr 20]. Available from: https://docs.ultralytics.com/.
  27. Serengil SI. DeepFace [Internet]. [Place unknown]: [Publisher unknown]; [cited 2025 Apr 20]. Available from: https://github.com/serengil/deepface.
  28. Amazon Web Services, Inc. Amazon Web Services (AWS) [Internet]. [Place unknown]: AWS; [cited 2025 Apr 20]. Available from: https://aws.amazon.com/.
  29. Bier EA, Card SK, Bodnar JW. Entity-based collaboration tools for intelligence analysis. In: IEEE Symposium on Visual Analytics Science and Technology. Columbus, OH, USA: IEEE; 2008. pp. 99–106.
  30. Dawson M, Lieble M, Adeboje A. Open source intelligence: Performing data mining and link analysis to track terrorist activities. In: Information Technology – New Generations. Cham, Switzerland: Springer International Publishing; 2018. pp. 159–163.
Language: English
Page range: 184 - 190
Published on: Jul 5, 2025
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2025 Robert Soler, Maurice Dawson, Marc Colina, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.