Coconote
AI notes
AI voice & video notes
Export note
Try for free
Exploring Open Source Intelligence (OSINT)
Oct 15, 2024
Lecture Notes: Open Source Intelligence (OSINT) by Veli Pekka Kivimäki
Introduction
Speaker:
Veli Pekka Kivimäki, aka VP
Analyst at Finnish Security Intelligence Service
Lectures at Johns Hopkins and UFSCOLA on OSINT
Formerly with Bellingcat investigation team
Topic:
Open Source Intelligence (OSINT)
Adversarial use of open sources
Future technologies in OSINT
AI in OSINT
What is OSINT?
Definition:
Intelligence from publicly available information
Not restricted to free information; includes purchasable commercial data
Process in OSINT:
Not just collection; involves processing, analysis, and production of intelligence
Terminology:
Different terms: Open Source Investigation vs. Intelligence
"Intelligence" is a loaded term with governmental connotations
Intelligence Process
Stages:
Collection of raw data
Processing to transform and analyze data
Analysis to produce actionable intelligence
Creation of finished intelligence products (reports, briefs)
Historical Context:
Began with printed materials, radio, TV in WWII
Cold War: CIA and BBC monitored Soviet media
Evolution of OSINT
Internet Impact:
Shift from institutional control to individual content creation
Broadens the scope of available information
Modern Challenges:
Fragmentation of internet users across regions
Variability in social media platforms and government controls
Current and Future OSINT Capabilities
Social Media:
Continuous influx of imagery and information
Key in recent events (e.g., Russia-Ukraine conflict)
Technological Advances:
Synthetic aperture radar (SAR), hyperspectral imaging
Tracking and geolocation from commercial satellites
Adversarial Use and Risks
Targeting Process:
Intelligence requirements lead to target selection
Systematic assessment and data gathering
Potential Vulnerabilities:
Social media oversharing, physical location data
Organizational structure, supply chains
Historical data and online breadcrumbs
Geolocation and Image Analysis
Geolocation Techniques:
Using minimal details to pinpoint locations
Example: Europol's child exploitation investigations
Image Vulnerabilities:
Reflections, facial recognition, location tagging risks
Data Leaks and Online Behavior
Data Breaches:
Systems breaches, cultural differences in data sales (e.g., Russia)
Consequences of online activities and leaks
Workplace Security:
Risks from remote work and information oversharing
Space-Based OSINT Tools
Commercial Satellite Capabilities:
Frequent earth imaging
Infrared, RF signal detection, and synthetic aperture radar
Reconnaissance Potential:
Patterns of life analysis
Structural mapping and emission detection
OSINT Security Concerns
Operational and Personal Security:
Importance of online presence management
Building a security-conscious culture
AI and OSINT
Application and Limits:
AI aids in processing, but human analysts remain crucial
Creative context and subtleties analyzed by humans
Adversarial AI:
Potential for automated social engineering
Experimentation needed in deployment
Conclusion
Shift in Intelligence Landscape:
Private industry leading innovation in technologies
Governments collaborating with commercial entities
Future of OSINT:
Fast evolution and increased privacy threats
Need for practical deployment of AI and OSINT solutions
End of lecture. Open for questions.
📄
Full transcript