Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2022 | XLVIII | 3 | 297-309

Article title

Assessing the potential of OSINT on the Internet in supporting military operations

Authors

Content

Title variants

Languages of publication

Abstracts

EN
This article briefly discusses some of the selected open-source intelligence methods on the Internet, which may be utilised to support activities of the armed forces. The paper examines this issue in two particular dimensions. On the one hand, it overviews some of the most popular means allowing supporting conventional operations, for instance, by geolocating hostile military infrastructure or troops. On the other hand, it explores some of the selected methods allowing to support cyber warfare. It concludes that open-source intelligence offers increasing capabilities, for instance, in detecting targets for offensive cyber operations or geolocating hostile troops. Nevertheless, it also has considerable limitations, particularly in terms of susceptibility to disinformation.

Year

Volume

Issue

3

Pages

297-309

Physical description

Dates

published
2022

Contributors

author
  • University of Silesia, Katowice, Poland

References

  • Aidarbekova A., Kaparov A., “Launching an Open Source Flight Database for Kazakhstan in Wake of Protests”, Bellingcat, 8 January 2022, https://www.bellingcat.com/resources/2022/01/08/launching-an-open-source-flight-database-for-kazakhstan-in-wake-of-protests/ [accessed:14 January 2022].
  • Bateman T., “HMS Defender: AIS Spoofing is opening up a new front in the war on reality”, euronews, uptaded 28 June 2021, https://www.euronews.com/next/2021/06/28/hmsdefender-ais-spoofing-is-opening-up-a-new-front-in-the-war-on-reality [accessed: 14 January 2022].
  • Bean H., “The DNI’s Open Source Center: An Organizational Communication Perspective”, International Journal of Intelligence and Counter Intelligence, vol. 20, issue 2, 2007, pp. 240–257, https://doi.org/10.1080/08850600600889100.
  • Bellingcat Investigation Team, “Gun Safety, Self Defense, and Road Marches – Finding an ISIS Training Camp”, Bellingcat, 22 August 2014, https://www.bellingcat.com/resources/casestudies/2014/08/22/gun-safety-self-defense-and-road-marches-finding-an-isis-training-camp [accessed: 5 January 2022].
  • Böhm I., Lolagar S. “Open source intelligence. Introduction, legal, and ethical considerations”, International Cybersecurity Law Review, no. 2, 2021, pp. 317–337, https://doi.org/10.1365/s43439-021-00042-7.
  • Bou-Harb E., Debbabi M., Assi C., “Cyber Scanning. A Comprehensive Survey”, IEEE Communications Survey & Tutorials, vol. 16, no. 3, 2014, pp. 1496–1519, https://doi.org/10.1109/SURV.2013.102913.00020.
  • Brake D.R., “Are We All Online Content Creators Now? Web 2.0 and Digital Divides”, Journalof Computer-Mediated Communication, vol. 19, issue 3, 2014, pp. 591–609, https://doi.org/10.1111/jcc4.12042.
  • brO, 5Ghz Interference Tracker, OSINT Editor, 14 February 2020, https://www.osinteditor.com/resources/guides/5ghz-interference-tracker [accessed: 14 January 2022].
  • Bullee J.W., Montoya L., Junger M., Hartel P., “Spear phishing in organisations explained”, Information and Computer Security, vol. 25, no. 5, 2017, pp. 593–613, https://doi.org/10.1108/ICS03-2017-0009.
  • Coakley A., “Borderline: Tinder profiles of Polish troops appear in Belarus”, The Independent, 15 November 2021, https://www.independent.co.uk/news/world/europe/belarus-polandborder-tinder-troops-b1957953.html [accessed: 14 January 2022].
  • Google Search Appliance. Search Protocol Reference, Mountain View, CA: Google, 2015, https://static.googleusercontent.com/media/www.google.com/pl//support/enterprise/static/gsa/docs/admin/current/gsa_doc_set/xml_reference/xml_reference.pdf [accessed: 25 May 2022].
  • Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security House of Representatives, One Hundred Ninth Congress, First Session, June 21, 2005, Serial No. 109-22, Washington: U.S. Government Printing Office, 2007, https://www.govinfo.gov/content/pkg/CHRG-109hhrg24962/html/CHRG109hhrg24962.htm [accessed: 5 January 2022].
  • “How to use the Twitter geocode to search tweets by location”, TweetBinder, https://www.tweetbinder.com/blog/twitter-geocode [accessed: 14 January 2022].
  • Imholtz A.A. Jr., “The American (FBIS) Side of the Story”, https://www.iwm.org.uk/sites/default/files/files/2018-11/The%20American%20%28FBIS%29%20Side%20of%20the%20Story%20-%20August%20Imholtz%20.pdf [accessed: 5 January 2022].
  • Lakomy M., Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw, Katowice: Wydawnictwo Uniwersytetu Śląskiego, 2015.
  • Lakomy M., “Listening to the ‘Voice of Islam’: The Turkestan Islamic Party’s Online Propaganda Strategy”, Studies in Conflict & Terrorism, https://doi.org/10.1080/1057610X.2021.1914361.
  • Lakomy M., “Mapping the online presence and activities of the Islamic State’s unofficial propaganda cell: Ahlut-Tawhid Publications”, Security Journal, vol. 34, 2021, pp. 358–384, https://doi.org/10.1057/s41284-020-00229-3.
  • Maj M., “Jak namierzyć lokalizację (tajnych) polskich baz wojskowych?”, Niebezpiecznik.pl, 23 August 2018, https://niebezpiecznik.pl/post/polskie-bazy-wojskowe-lokalizacja [accessed:14 January 2022].
  • “MI6 chief ’s cover blown by wife’s holiday snaps on Facebook”, The Indian Express, 6 July 2009, https://indianexpress.com/article/news-archive/web/mi6-chiefs-cover-blown-by-wifesholiday-snaps-on-facebook [accessed: 17 January 2022].
  • Mider D., “Czarny i czerwony rynek w sieci The Onion Router – analiza funkcjonowania darkmarketów”, Przegląd Bezpieczeństwa Wewnętrznego, no. 21, 2019, pp. 154–190.
  • Oryx, “The fight for Nagorno-Karabakh: Documenting Losses On The Sides of Armenia and Azerbaijan”, Oryx blog, 27 September 2020, https://www.oryxspioenkop.com/2020/09/thefight-for-nagorno-karabakh.html [accessed: 14 January 2022].
  • OSINT Essentials, Twitter, https://www.osintessentials.com/twitter [accessed: 17 January 2022].
  • Roser M., Ritchie H., Ortiz-Ospina E., “Internet”, Our World in Data, 2015, https://ourworldindata. org/internet [accessed: 17 January 2022].
  • Sarowski Ł., “Od Internetu Web 1.0 do Internetu Web 4.0 – ewolucja form przestrzeni komunikacyjnych w globalnej sieci”, Rozprawy Społeczne, vol. 11, no. 1, 2017, pp. 32–39, https://doi.org/10.29316/rs.2017.4.
  • Školkay A., Filin J., “A Comparison of Fake News Detecting and Fact-Checking AI Based Solutions”, Studia Medioznawcze, vol. 20, no. 4, 2019, pp. 365–383, https://doi.org/10.33077/uw.24511617.ms.2019.4.187.
  • Strick B., “Uncovering A Pro-Chinese Government Information Operation on Twitter and Facebook: Analysis of the #MilesGuo Bot Network”, Bellingcat, 5 May 2020, https://www.bellingcat.com/news/2020/05/05/uncovering-a-pro-chinese-government-information-operation-ontwitter-and-facebook-analysis-of-the-milesguo-bot-network [accessed: 5 January 2022].
  • Strobel W.P., Gordon M.R., “Russia’s Military Buildup Near Ukraine Is an Open Secret”, The Wall Street Journal, 4 January 2022, https://www.wsj.com/articles/russias-military-buildup-nearukraine-is-an-open-secret-11641292202 [accessed: 14 January 2022].
  • “Tajne obiekty wojskowe z całego świata zaświeciły się na żółto na tej mapie. Sprawdź, czy twój domtakże”, Niebezpiecznik.pl, 29 January 2018, https://niebezpiecznik.pl/post/tajne-obiektywojskowe-z-calego-swiata-zaswiecily-sie-na-zolto-na-tej-mapie [accessed: 14 January 2022].
  • Temple-Raston D., “How the U.S. Hacked ISIS”, NPR, 26 September 2019, https://www.npr.org/2019/09/26/763545811/how-the-u-s-hacked-isis [accessed: 14 January 2022].
  • Tylutki K., “Informacja masowego rażenia – OSINT w działalności wywiadowczej”, Przegląd Bezpieczeństwa Wewnętrznego, no. 19, 2018, pp. 166–192.
  • Ware J.L., “Geospatial Intelligence and Engineers”, Military Engineer, vol. 98, no. 640, 2006,pp. 57–58.
  • Williams H.J., Blum I., Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise, Santa Monica: RAND Corporation, 2018.
  • Wolfsfeld G., Segev E., Sheafer T., “Social Media and the Arab Spring: Politics Comes First”,The International Journal of Press/Politics, vol. 18, no. 2, 2013, pp. 115–137, https://doi.org/10.1177/1940161212471716.
  • Zięba R., Instytucjonalizacja bezpieczeństwa europejskiego, Warszawa: Wydawnictwo Scholar, 1999.

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
2165717

YADDA identifier

bwmeta1.element.ojs-doi-10_48269_2451-0718-btip-2022-3-022
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.