Using OSINT To Monitor The War In Ukraine

The role of open source intelligence in response to Russia’s invasion of Ukraine has attracted significant interest and the US Defense Intelligence Agency (DIA) has been relying on public and commercially available information to keep eyes on Russian attacks in Ukraine.
 
The DIA recently invited a group of reporters to see recovered remnants of unmanned aerial vehicles made in Iran and used by Russia in its war on Ukraine, and they said thsat open-source intelligence has played “an outsized” and “critical” role in gathering information.

“When we get a requirement, in this case, monitoring the Russian military and their aggression, the general public around the world is our source,” a senior defense intelligence official told reporters.

“There's a lot more data outside in the world than there is that the IC’s collected, and so we're getting better organised to use it, and it's paying great dividends to understand what's happening.”

The White House has shown that there are increased defense ties between Iran and Russia, and DIA confirmed Russia was using Iran-made drones earlier this year.

Iran said  that in 2022 it sent Russia drones,but that was before the war started, and they have denied continued involvement, despite some statements that it was still sending materials and working with Russia to build a factory.

Analysts showed reporters drone parts from the Middle East and Ukraine that were known to be Iran-made and explained some of their classified intel with information that had already been made public.

News reports in April 2022 were the first indication, defense intelligence officials said. But one of the key uses of open-source intelligence is inspiration.

The data often comes from social media, news reports, and commercially available databases, among other sources with a focus on foreign military targets.
 
A growing constellation of researchers, from academia, civil society and commercial organisations to law enforcement and the UK government, offer regular assessments on everything related to the war using publicly available information.

The sharing of open-source intelligence on social media has raised ethical concerns, including over the sharing of graphic images of bodies and of potentially military-sensitive data.

Matthew Ford of the University of Sussex has noted that "Ukrainians fear such images will reveal their tactics, techniques, and procedures," and that Ukrainians have therefore undertaken a degree of self-censorship.

Concerns have also been raised about the potential dissemination of misinformation, such as through fake accounts posing as insider sources.

Defense Intelligence Agency:     Defense One:     Wikipedia:     Forecast International:     The Economist:     RUSI

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« Police Use AI To Detect Drivers Using Mobile Phones
Russian Hackers Hit Italian Banks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

Binarly

Binarly

Binarly has developed an AI-powered platform to protect devices against emerging firmware threats.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

Increase Your Skills (IYS)

Increase Your Skills (IYS)

Armed and ready: raise awareness of cyberattacks in your company with the Full-Service Awareness Platform from IYS – fast and effective. We help you develop a robust, sustainable security strategy.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.