Leveraging OSINT for Identifying and Mitigating Cybercrime Threats in Online Media Environments
Pemanfaatan OSINT untuk Identifikasi dan Mitigasi Ancaman Kejahatan Cyber di Lingkungan Media Daring
DOI:
https://doi.org/10.21070/ups.8335Keywords:
Open Source Intelligence (OSINT), Cybercrime Investigation, Online Media Security, Digital Threat Identification, Cybersecurity Mitigation, Automated Metadata Extraction, Entity Relationship Visualization, NER-based FootprintingAbstract
Cybercrime in online media poses significant digital threats. This study develops an automated OSINT tool using Python to collect and analyze public data from search engines (Google, DuckDuckGo, etc.) and social platforms (Twitter, Telegram). Combining spaCy's Named Entity Recognition (NER) and regex, the tool extracts metadata (names, emails, phone numbers) and visualizes results via interactive HTML reports (Bootstrap 5). Ethical analysis of public data confirms the tool's effectiveness in identifying exposed information and supporting mitigation strategies. The research advances practical OSINT solutions for cybersecurity.
Downloads
References
“2025 Data Breach Investigations Report,” Verizon Business. Accessed: Apr. 28, 2025. [Online]. Available: https://www.verizon.com/business/resources/reports/dbir/
“Open Source Intelligence Techniques,” Guide books. Accessed: Apr. 28, 2025. [Online]. Available: https://dl.acm.org/doi/abs/10.5555/3033260
M. F. Alby, I. F. Ruslan, and M. L. Muharman, “Information Security Test on Websites and Social Media Using Footprinting Method,” in Proceedings of the 8th International Conference on Industrial and Business Engineering, in ICIBE ’22. New York, NY, USA: Association for Computing Machinery, Jan. 2023, pp. 521–525. doi: 10.1145/3568834.3568868.
X. Schmitt, S. Kubler, J. Robert, M. Papadakis, and Y. LeTraon, “A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate,” in 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS), Oct. 2019, pp. 338–343. doi: 10.1109/SNAMS.2019.8931850.
“OSINT in the Context of Cyber-Security | SpringerLink.” Accessed: Apr. 28, 2025. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-319-47671-1_14
“CSS, Bootstrap, & Responsive Design | SpringerLink.” Accessed: Apr. 28, 2025. [Online]. Available: https://link.springer.com/chapter/10.1007/978-1-4842-2044-3_6
“Discovering Personal Data Security Issues: Insights from ‘Have I Been Pwned’ | SpringerLink.” Accessed: Apr. 28, 2025. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-031-70906-7_22
“TATA KELOLA PERLINDUNGAN DATA PRIBADI DI ERA METAVERSE (TELAAH YURIDIS UNDANG-UNDANG PERLINDUNGAN DATA PRIBADI) | Sulistianingsih | Masalah-Masalah Hukum.” Accessed: Apr. 28, 2025. [Online]. Available: https://ejournal.undip.ac.id/index.php/mmh/article/view/51319
K. Shye Lianq and V. Selvarajah, “Footprinting and Reconnaissance: Impact and Risks,” in 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), Apr. 2022, pp. 1–5. doi: 10.1109/ICDCECE53908.2022.9793237.
S. Harris, “All-in-one CISSP exam guide,” (No Title), Accessed: Apr. 28, 2025. [Online]. Available: https://cir.nii.ac.jp/crid/1130000798088792832
M. Y. Samad, B. K. Ningtiyas, Fiqih, F. Rosny, and D. A. Permatasari, “Anticipating Cyber Espionage: Open Source Intelligence (OSINT) Investigation and Cyber Counterintelligence,” JSRCS, vol. 5, no. 2, pp. 167–184, Nov. 2024, doi: 10.31599/288ab341.
I. Harouni, “The Modern Methods of Data Analysis in Social Research,” sej, vol. 6, no. 1, pp. 56–70, Mar. 2024, doi: 10.34118/sej.v6i1.3806.
“Proposing a New Combined Indicator for Measuring Search Engine Performance and Evaluating Google, Yahoo, DuckDuckGo, and Bing Search Engines based on Combined Indicator - Azadeh Hajian Hoseinabadi, Mehrdad CheshmehSohrabi, 2024.” Accessed: Apr. 29, 2025. [Online]. Available: https://journals.sagepub.com/doi/abs/10.1177/09610006221138579
“Application of Named Entity Recognition via Twitter on SpaCy in Indonesian (Case Study : Power Failure in the Special Region of Yogyakarta) | Indonesian Journal of Information Systems.” Accessed: Apr. 29, 2025. [Online]. Available: https://ojs.uajy.ac.id/index.php/IJIS/article/view/4677
“Introduction to Bootstrap | SpringerLink.” Accessed: Apr. 29, 2025. [Online]. Available: https://link.springer.com/chapter/10.1007/978-1-4842-6203-0_1
“Have I Been Pwned: Check if your email has been compromised in a data breach.” Accessed: Apr. 29, 2025. [Online]. Available: https://haveibeenpwned.com/
Downloads
Additional Files
Posted
License
Copyright (c) 2025 UMSIDA Preprints Server

This work is licensed under a Creative Commons Attribution 4.0 International License.
