Claim Missing Document
Check
Articles

Found 2 Documents
Search

Open-Source Intelligence (OSINT) Tools for Law Enforcement Ramadhany, Gilang Perdana
ENDLESS: INTERNATIONAL JOURNAL OF FUTURE STUDIES Vol. 7 No. 3 (2024): ENDLESS: International Journal of Future Studies
Publisher : Global Writing Academica Researching & Publishing

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper aims to provide an overview of the main findings and conclusions of the research conducted. Within the complex and diverse domain of cyberspace, law enforcement authorities are faced with the increasingly difficult task of addressing the growing difficulties presented by highly skilled cyber adversaries. Open Source Intelligence (OSINT) tools have become essential instruments in the cybernetic battleground since they leverage the extensive pool of publicly accessible digital information. This study conducts a comprehensive analysis of the technical functionalities, versatility, and strategic significance of several Open Source Intelligence (OSINT) tools in enhancing the proactive and reactive approaches of law enforcement agencies in countering cyber threats. This study aims to provide a comprehensive understanding of the significant impact of OSINT tools on many aspects of digital forensics, threat intelligence gathering, and predictive analytics. It achieves this by combining quantitative analyses with real-world application scenarios. The empirical findings presented in this study highlight the utmost importance of these technologies in enabling a more comprehensive, evidence-based, and proactive strategy for preventing cybercrime. With the growing complexity of the digital threat landscape, the integration of Open Source Intelligence (OSINT) tools into law enforcement's repertoire becomes vital. This integration provides a promising solution for effectively traversing hazardous cyber terrains.
Analysis of the Utilization of the Case Management System Model at the Intelligence Directorate of the Densus 88 Anti-Terror Unit, Indonesian National Police Ramadhany, Gilang Perdana; Handayani, Riska Sri; Badry, Ahmad Ibrahim
International Journal of Social Science and Community Service Vol. 4 No. 1 (2026): January
Publisher : CV. Proaksara Global Transeduka

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70865/ijsscs.v4i1.116

Abstract

Integrated data management has become critical for intelligence analysis, particularly in terrorism-related crime handling. The Intelligence Directorate of Detachment 88 AT Polri faces significant challenges managing case data from multiple units and information sources. This study analyzes the utilization of a Case Management System (CMS) model in supporting intelligence analysis activities at Detachment 88. A qualitative approach was employed through in-depth interviews with key informants (Director of Intelligence, Head of Sub-Directorate of Analysis, and intelligence analysts) and document analysis of internal reports and national policies conducted during 2020-2023. Findings indicate that integrated CMS implementation positively impacts analysis speed, information accuracy, and cross-unit coordination. However, limitations persist including partial data integration due to format differences, reliance on manual verification processes, slow processing of large-volume data from social media and CCTV, and network infrastructure constraints in operational areas. System interoperability plays a crucial role in supporting timely and precise intelligence decision-making. The study identifies three critical pillars for CMS effectiveness: multi-source data integration, adaptation to evolving terrorism methods utilizing digital technology, and robust data security mechanisms including encryption and role-based access controls. CMS must evolve from a data repository to an AI-enabled analytical platform with automated data fusion, modular architecture, and layered security protocols to effectively counter dynamic terrorism threats while maintaining strict confidentiality standards.