Using OSINT To Monitor The War In Ukraine

The role of open source intelligence in response to Russia’s invasion of Ukraine has attracted significant interest and the US Defense Intelligence Agency (DIA) has been relying on public and commercially available information to keep eyes on Russian attacks in Ukraine.
 
The DIA recently invited a group of reporters to see recovered remnants of unmanned aerial vehicles made in Iran and used by Russia in its war on Ukraine, and they said thsat open-source intelligence has played “an outsized” and “critical” role in gathering information.

“When we get a requirement, in this case, monitoring the Russian military and their aggression, the general public around the world is our source,” a senior defense intelligence official told reporters.

“There's a lot more data outside in the world than there is that the IC’s collected, and so we're getting better organised to use it, and it's paying great dividends to understand what's happening.”

The White House has shown that there are increased defense ties between Iran and Russia, and DIA confirmed Russia was using Iran-made drones earlier this year.

Iran said  that in 2022 it sent Russia drones,but that was before the war started, and they have denied continued involvement, despite some statements that it was still sending materials and working with Russia to build a factory.

Analysts showed reporters drone parts from the Middle East and Ukraine that were known to be Iran-made and explained some of their classified intel with information that had already been made public.

News reports in April 2022 were the first indication, defense intelligence officials said. But one of the key uses of open-source intelligence is inspiration.

The data often comes from social media, news reports, and commercially available databases, among other sources with a focus on foreign military targets.
 
A growing constellation of researchers, from academia, civil society and commercial organisations to law enforcement and the UK government, offer regular assessments on everything related to the war using publicly available information.

The sharing of open-source intelligence on social media has raised ethical concerns, including over the sharing of graphic images of bodies and of potentially military-sensitive data.

Matthew Ford of the University of Sussex has noted that "Ukrainians fear such images will reveal their tactics, techniques, and procedures," and that Ukrainians have therefore undertaken a degree of self-censorship.

Concerns have also been raised about the potential dissemination of misinformation, such as through fake accounts posing as insider sources.

Defense Intelligence Agency:     Defense One:     Wikipedia:     Forecast International:     The Economist:     RUSI

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« Police Use AI To Detect Drivers Using Mobile Phones
Russian Hackers Hit Italian Banks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

OneVisage

OneVisage

Our award-winning 3DAuth digital identity platform turns any consumer mobile device into a real-time 3D facial scanner that securely authenticates the user in seconds.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

Secure Innovations

Secure Innovations

Secure Innovations is a cybersecurity firm dedicated to providing top-tier cyber security solutions for the Defense and the Intelligence Community.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Everything Blockchain

Everything Blockchain

Everything Blockchain is a development, architecture, and software designer of Blockchain that also provides services specializing in blockchain technologies and decentralized processing.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Traced

Traced

TRACED is changing the detection paradigm. Empowering defenders to go on the offense to engage cyber attackers before they compromise your organization.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.