Research Article
Military Information Leak Response Technology through OSINT Information Analysis Using SNSes
Table 1
OSINT information collection database via terrorism and cyberterrorism SNS.
| OSINT database | Nation | Collection agency | Purpose | Collected information | Collection method | Amount of information |
| ISVG | United States | Sam Houston State University
| Counterterrorism | (i) Terrorism | Passive (researcher) | 150,000 | (ii) Terrorist (ii) Organizations (iii) Location (iv) Weapons used |
| START | United States | Maryland University | Counterterrorism | (i) Terrorism (ii) Terrorist (iii) Organizations | Passive (researcher) | 110,000 | (i) Location (ii) Extent of damage |
| C-TAS | Republic of Korea | KISA | Cyberterrorism response | (i) Cyber threat information | Automatic (information sharing) | Private | (ii) Malignant code, weakness |
|
|