Using OSINT To Monitor The War In Ukraine

The role of open source intelligence in response to Russia’s invasion of Ukraine has attracted significant interest and the US Defense Intelligence Agency (DIA) has been relying on public and commercially available information to keep eyes on Russian attacks in Ukraine.
 
The DIA recently invited a group of reporters to see recovered remnants of unmanned aerial vehicles made in Iran and used by Russia in its war on Ukraine, and they said thsat open-source intelligence has played “an outsized” and “critical” role in gathering information.

“When we get a requirement, in this case, monitoring the Russian military and their aggression, the general public around the world is our source,” a senior defense intelligence official told reporters.

“There's a lot more data outside in the world than there is that the IC’s collected, and so we're getting better organised to use it, and it's paying great dividends to understand what's happening.”

The White House has shown that there are increased defense ties between Iran and Russia, and DIA confirmed Russia was using Iran-made drones earlier this year.

Iran said  that in 2022 it sent Russia drones,but that was before the war started, and they have denied continued involvement, despite some statements that it was still sending materials and working with Russia to build a factory.

Analysts showed reporters drone parts from the Middle East and Ukraine that were known to be Iran-made and explained some of their classified intel with information that had already been made public.

News reports in April 2022 were the first indication, defense intelligence officials said. But one of the key uses of open-source intelligence is inspiration.

The data often comes from social media, news reports, and commercially available databases, among other sources with a focus on foreign military targets.
 
A growing constellation of researchers, from academia, civil society and commercial organisations to law enforcement and the UK government, offer regular assessments on everything related to the war using publicly available information.

The sharing of open-source intelligence on social media has raised ethical concerns, including over the sharing of graphic images of bodies and of potentially military-sensitive data.

Matthew Ford of the University of Sussex has noted that "Ukrainians fear such images will reveal their tactics, techniques, and procedures," and that Ukrainians have therefore undertaken a degree of self-censorship.

Concerns have also been raised about the potential dissemination of misinformation, such as through fake accounts posing as insider sources.

Defense Intelligence Agency:     Defense One:     Wikipedia:     Forecast International:     The Economist:     RUSI

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« Police Use AI To Detect Drivers Using Mobile Phones
Russian Hackers Hit Italian Banks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Heimdal Security

Heimdal Security

Heimdal Security provides proactive protection against cyber threats including ransomware, exploit kits and financial malware.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

FraudHunt

FraudHunt

FraudHunt protects your website from account fraud, ad fraud, fraud clicks, and malicious bots.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

Prompt

Prompt

Prompt supports the creation of partnerships and the setting up of industrial-institutional applied R&D projects for all ICT sectors.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

WebSec

WebSec

WebSec is a cybersecurity firm based in Amsterdam (NL) and Wyoming (US), specializing in offensive security services including penetration testing, red teaming, and tailored security assessments.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.

Innerworks

Innerworks

Innerworks intelligent bot detection. Innerworks is building the future of behavioural data on web3.