Friday, April 15, 2022

OSINT 2.

This is coolbert:

"Open source intelligence (OSINT) is the practice of collecting information from published or otherwise publicly available sources. OSINT operations, whether practiced by IT security pros, malicious hackers, or state-sanctioned intelligence operatives, use advanced techniques to search through the vast haystack of visible data to find the needles they're looking for to achieve their goals—and learn information that many don't realize is public"

HAVE OSINT WILL TRAVEL!

See from the prominent and quite active private OSINT dedicated organization Bellingcat:

A. OSINT resources as available.

B. How to use resources.

Resources as acknowledged and to include [but I would think hardly limited to]:

* Satellite Monitoring of Exercises. * Social Media Monitoring of Exercises. * Finding Instagram Location Labels. * Naval and Aircraft Monitoring of Exercises.

See additionally and thanks to Bellingcat two examples of how this OSINT done.

1. "Russia's 61st Separate Naval Infantry Brigade in the Donbass:

November 15, 2016.

2. "Open Source Monitoring of NATO Trident Juncture Exercises [military exercise as of 2018]"

November 6, 2018.

See previous blog entries in part referencing OSINT material:

https://militaryanalysis.blogspot.com/2022/02/osint.html

https://militaryanalysis.blogspot.com/2022/03/expedient.html

https://militaryanalysis.blogspot.com/2022/03/beno.html

https://militaryanalysis.blogspot.com/2022/03/intercepted.html

OSINT, don't leave home without it!

coolbert:





No comments: