Article deals with legal possibilities of obtaining information on the Internet.
It indicates methods of obtaining information legally (such as open source
intelligence) and methods recognized in Polish law as unlawful (such as activities
aimed at disrupting the operation of an IT system). The article also discusses
the issues of phishing, the use of false identity in the Internet (so-called sock
puppetry), as well as the information potential of metadata analysis.
PEER REVIEW INFORMATION
Article has been screened for originality
REFERENCES(7)
1.
Demidova N., Shcherbakova T., Vergelis M., Spam and Phishing in Q1 2018, Kaspersky.com,23.05.2018, https://securelist.com/spam-an... (dostęp: 12.11.2018).
Hern A., Fitness Tracking App Strave Gives Away Location of Secret US Army Bases, „The Guardian”, 28.01.2018, https://www.theguardian.com/wo... (dostęp: 9.08.2018).
Jasiołek K., Spear phishing, czyli ataki spersonalizowane, Komputer Świat, 13.08.2013, https:// www.komputerswiat.pl/aktualnosci/bezpieczenstwo/spear-phishing-czyli-ataki-spersonalizowane/m5th9v9 (dostęp: 12.11.2018).
Mider D., Garlicki J., Mincewicz W., Pozyskiwanie informacji w Internecie metodą Google Hacking – biały, szary czy czarny wywiad?, „Przegląd Bezpieczeństwa Wewnętrznego” 2019, nr 20.
Stromczyński B., Waszkiewicz P., Biały wywiad w praktyce pracy organów ścigania na przykładzie wykorzystania serwisów społecznościowych, „Prokuratura i Prawo” 2014, nr 5.
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.