Using OSINT To Monitor The War In Ukraine

The role of open source intelligence in response to Russia’s invasion of Ukraine has attracted significant interest and the US Defense Intelligence Agency (DIA) has been relying on public and commercially available information to keep eyes on Russian attacks in Ukraine.
 
The DIA recently invited a group of reporters to see recovered remnants of unmanned aerial vehicles made in Iran and used by Russia in its war on Ukraine, and they said thsat open-source intelligence has played “an outsized” and “critical” role in gathering information.

“When we get a requirement, in this case, monitoring the Russian military and their aggression, the general public around the world is our source,” a senior defense intelligence official told reporters.

“There's a lot more data outside in the world than there is that the IC’s collected, and so we're getting better organised to use it, and it's paying great dividends to understand what's happening.”

The White House has shown that there are increased defense ties between Iran and Russia, and DIA confirmed Russia was using Iran-made drones earlier this year.

Iran said  that in 2022 it sent Russia drones,but that was before the war started, and they have denied continued involvement, despite some statements that it was still sending materials and working with Russia to build a factory.

Analysts showed reporters drone parts from the Middle East and Ukraine that were known to be Iran-made and explained some of their classified intel with information that had already been made public.

News reports in April 2022 were the first indication, defense intelligence officials said. But one of the key uses of open-source intelligence is inspiration.

The data often comes from social media, news reports, and commercially available databases, among other sources with a focus on foreign military targets.
 
A growing constellation of researchers, from academia, civil society and commercial organisations to law enforcement and the UK government, offer regular assessments on everything related to the war using publicly available information.

The sharing of open-source intelligence on social media has raised ethical concerns, including over the sharing of graphic images of bodies and of potentially military-sensitive data.

Matthew Ford of the University of Sussex has noted that "Ukrainians fear such images will reveal their tactics, techniques, and procedures," and that Ukrainians have therefore undertaken a degree of self-censorship.

Concerns have also been raised about the potential dissemination of misinformation, such as through fake accounts posing as insider sources.

Defense Intelligence Agency:     Defense One:     Wikipedia:     Forecast International:     The Economist:     RUSI

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« Police Use AI To Detect Drivers Using Mobile Phones
Russian Hackers Hit Italian Banks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.