Using OSINT To Monitor The War In Ukraine

The role of open source intelligence in response to Russia’s invasion of Ukraine has attracted significant interest and the US Defense Intelligence Agency (DIA) has been relying on public and commercially available information to keep eyes on Russian attacks in Ukraine.
 
The DIA recently invited a group of reporters to see recovered remnants of unmanned aerial vehicles made in Iran and used by Russia in its war on Ukraine, and they said thsat open-source intelligence has played “an outsized” and “critical” role in gathering information.

“When we get a requirement, in this case, monitoring the Russian military and their aggression, the general public around the world is our source,” a senior defense intelligence official told reporters.

“There's a lot more data outside in the world than there is that the IC’s collected, and so we're getting better organised to use it, and it's paying great dividends to understand what's happening.”

The White House has shown that there are increased defense ties between Iran and Russia, and DIA confirmed Russia was using Iran-made drones earlier this year.

Iran said  that in 2022 it sent Russia drones,but that was before the war started, and they have denied continued involvement, despite some statements that it was still sending materials and working with Russia to build a factory.

Analysts showed reporters drone parts from the Middle East and Ukraine that were known to be Iran-made and explained some of their classified intel with information that had already been made public.

News reports in April 2022 were the first indication, defense intelligence officials said. But one of the key uses of open-source intelligence is inspiration.

The data often comes from social media, news reports, and commercially available databases, among other sources with a focus on foreign military targets.
 
A growing constellation of researchers, from academia, civil society and commercial organisations to law enforcement and the UK government, offer regular assessments on everything related to the war using publicly available information.

The sharing of open-source intelligence on social media has raised ethical concerns, including over the sharing of graphic images of bodies and of potentially military-sensitive data.

Matthew Ford of the University of Sussex has noted that "Ukrainians fear such images will reveal their tactics, techniques, and procedures," and that Ukrainians have therefore undertaken a degree of self-censorship.

Concerns have also been raised about the potential dissemination of misinformation, such as through fake accounts posing as insider sources.

Defense Intelligence Agency:     Defense One:     Wikipedia:     Forecast International:     The Economist:     RUSI

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« Police Use AI To Detect Drivers Using Mobile Phones
Russian Hackers Hit Italian Banks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

WireX Systems

WireX Systems

WireX is an innovative network intelligence and forensics company that is changing the way businesses resolve cyber-attacks.

Watchcom Security Group

Watchcom Security Group

Watchcom is one of Norway's foremost suppliers of information security consultancy services.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.