Research Article

Military Information Leak Response Technology through OSINT Information Analysis Using SNSes

Table 1

OSINT information collection database via terrorism and cyberterrorism SNS.

OSINT databaseNationCollection agencyPurposeCollected informationCollection methodAmount of information

ISVGUnited StatesSam Houston State University
Counterterrorism(i) TerrorismPassive (researcher)150,000
(ii) Terrorist
(ii) Organizations
(iii) Location
(iv) Weapons used

STARTUnited StatesMaryland UniversityCounterterrorism(i) Terrorism
(ii) Terrorist
(iii) Organizations
Passive (researcher)110,000
(i) Location
(ii) Extent of damage

C-TASRepublic of KoreaKISACyberterrorism response(i) Cyber threat informationAutomatic (information sharing)Private
(ii) Malignant code, weakness