What is OSINT: Open-source intelligence?
Publication Date/Time
2022-05-02T15:30:00+00:00
Country
Global
The lessons that OSINT provides to open-data portals
Open-source intelligence (OSINT)
[https://www.csoonline.com/article/3445357/what-is-osint-top-open-source-intelligence-tools.html]
is the practice of collecting and analysing information gathered from
open sources to produce actionable intelligence. This intelligence can
support, for example, national security, law enforcement and business
intelligence. OSINT investigates open (source) data collected for one
purpose and repurposes it to shed light on hidden topics. The whole
concept of OSINT sounds counter intuitive—using open data to reveal
information that organisations want to keep secret.

In the war in Ukraine, OSINT has been used to get a better idea of the
movements of Russian military equipment and also to understand real
progress during the war. This includes first-hand video footage
collected by ordinary citizens, but also data points collected, for
example, by web sites looking to track aircraft and train movement.

Open sources that feed into OSINT can be divided up into six
categories of information flow:

	* PUBLIC MEDIA – print newspaper, magazines, and television. 
	* INTERNET – online publications and blogs, discussion groups such
as forums, and social media websites, such as YouTube, Twitter and
Instagram.
	* PUBLIC GOVERNMENT DATA – public government reports, budgets,
press conferences, hearings, and speeches.
	* PROFESSIONAL AND ACADEMIC PUBLICATIONS – journals, conferences,
academic papers, and theses.
	* COMMERCIAL DATA – commercial imagery, business and financial
assessments, and databases.
	* GREY LITERATURE – technical reports, patents, business documents,
unpublished works, and newsletters.

 

OSINT-RELATED CHALLENGES AND THE ROLE FOR OPEN-DATA PORTALS

Data collected and repurposed for OSINT is unique as it cannot be
compared against an objective reality to see that the data is being
collected properly. Gathered weather data, for example, can be
compared against an observable reality of rain, while OSINT data is
looking to reveal an uncertain reality. Consequently, portals that
hold OSINT data (OSINT portals) operate in an environment of
uncertainty in which understanding and measuring data quality is key.

In the war in Ukraine, for example, local residents who film and take
pictures of destroyed equipment focus attention on Russian equipment
[https://www.economist.com/international/the-invasion-of-ukraine-is-not-the-first-social-media-war-but-it-is-the-most-viral/21808456]
that is being destroyed rather than on Ukrainian loses. Given that
Russian soldiers have reportedly had mobile phones confiscated
[https://www.washingtonpost.com/national-security/2022/03/27/russian-military-unsecured-communications/],
this can lead to a natural bias of _available_ information that is
skewed.

At the same time, some actors may also be interested in manipulating
the story that is being told by OSINT. For example, moderators of
OSINT data sort through pictures and videos that claim to be separate
incidents, but are actually from the same incident taken from a
different angles. Within the fog of war, unreliable data comes from
both innocent mistakes and purposeful deceptions. These manipulations
multiply the complexity of the task of ensuring the validity of the
data being collected, which ultimately determines its value. OSINT
gains value not through the amount of data being collected, but via
the meticulous research required to ensure its authenticity.

Clearly, OSINT provides real benefits with some caveats, creating a
wealth of data with uncertain reliability. In the case of OSINT, the
data needs to be vetted and put into context before being distributed
via a portal or platform. Open-data portals that distribute OSINT must
take a proactive role in ensuring data quality through selection and
validation. Without this context-giving role, the open data that OSINT
portals collect would quickly be dismissed as unreliable noise and as
a source of unreliable propaganda.

This is an important lesson—collecting vast quantities of data
without reorganising and qualifying it can reduce its value. Open-data
platforms are not necessarily conduits through which data flows
freely, they also play a valuable role as arbitrators of quality.
Ultimately, developers and users need to be able to easily access the
data, but also trust that the information they are using can be relied
upon to provide accurate results for the intended purpose.

 

FURTHER EXAMPLES OF OSINT PORTALS

While OSINT has received media attention given the war in Ukraine, it
has been gaining momentum for the last decade. Several institutions
have been incorporating OSINT into their practice, including national
security, law enforcement, and non-governmental organisations, such as
Bellingcat [https://www.bellingcat.com/], the Center for Information
Resilience [https://www.info-res.org/] and Oryx
[https://www.oryxspioenkop.com].

Bellingcat, an independent international collective of researchers,
investigators and citizen journalists, has been a particularly heavy
user of the kind of open data that OSINT provides. In one piece of
reporting, Bellingcat attempted to identify key suspects in the
downing of Malaysian Airlines Flight 17
[https://www.bellingcat.com/news/uk-and-europe/2019/06/19/identifying-the-separatists-linked-to-the-downing-of-mh17/]
over eastern Ukraine in 2014. Based on images taken from social media
and phone intercepts that the Ukrainian Security Service made
available on YouTube, Bellingcat published a report
[https://www.bellingcat.com/app/uploads/2015/10/MH17-The-Open-Source-Evidence-EN.pdf]
outlining evidence that a Buk Missile launcher downed the airline.
They also published the names of the individuals that they believed
responsible. Other examples of their work include exposing illegal
shipping precursors of the nerve agent Sarin to Syria by Belgian
companies
[https://www.bellingcat.com/news/mena/2018/04/18/belgium-illegally-shipped-96-tonnes-sarin-precursor-syria/],
revealing the use of drones by non-state actors in Syria and Iraq
[https://www.bellingcat.com/news/mena/2018/06/18/first-isis-iraq-now-israel-idf-use-commercial-drones/],
and most recently mapping incidents of civilian harm in Ukraine
[https://www.bellingcat.com/news/2022/03/17/hospitals-bombed-and-apartments-destroyed-mapping-incidents-of-civilian-harm-in-ukraine/].

The Center for Information Resilience, a non-profit organisation based
in the United Kingdom, dedicates itself to countering misinformation,
exposing human rights abuses and combatting online behaviour that is
harmful to women and minority groups. Currently, they are part of the
OSINT community of researchers that are studying the war in Ukraine
with the aim of providing reliable information on the conflict through
verified open-source evidence. Recently, they published their findings
on the Yalivshchyna Burial Site and the mass graves after the Russian
invasion
[https://www.info-res.org/post/the-yalivshchyna-burial-site-mass-graves-after-russian-invasion]
after combing through information on the Russia-Ukraine Monitor Map
[https://maphub.net/Cen4infoRes/russian-ukraine-monitor].

Oryx is a blog website run by two military analysts since 2014 that is
devoted to investigating and sharing information about conflict
research, OSINT and military history. A recent example of their work
is a list of destroyed and captured vehicles and equipment
[https://www.oryxspioenkop.com/2022/02/attack-on-europe-documenting-equipment.html]
from Russia and Ukraine since the invasion on 24 February 2022. This
list only includes destroyed vehicles and equipment where a photo or
videographic evidence of the destruction is available. Users are
welcome to add links or files of additional photos and videos that
show destroyed vehicle and equipment to be verified by the team and
later added to the list.

 

OSINT AND OPEN DATA PORTALS: A POWERFUL ALLIANCE

Open source intelligence relies heavily on ordinary, unpaid citizens
in much the same way that open source software relies on ordinary,
unpaid developers. Without this army of unpaid OSINT supporters, who
collect and check the quality of raw data, OSINT would lack its
authority and quality. The decentralised and crowd-sourced nature of
OSINT erodes the ability of centralised authorities—whether
government or corporate—to hide certain truths. This is not to say
that crowd-sourced judgements always lead to sound analysis. As with
any data source, information should be corroborated and continually
questioned. This, however, makes open data portals all the more
important in providing a governance structure and framework that
allows OSINT to thrive.
