Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 5

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  OSINT
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Cyberspace as a place of information acquisition is in constant flux. Recognizing the threats and challenges associated with it is one of the key elements influencing national security. Knowledge of the current conditions affecting information security and the possibility of obtaining information is an essential element of the work of the institutions forming the state security system. This article will outline the factors affecting the future of information operation and distribution in the digital world25confirming the increased need for OSINT in state institutions, especially in the face of new challenges. These include: hacktivism, the dissemination of specialized tools and technologies for data acquisition and analysis among the network user community, hybrid and diplomatic-propaganda activities carried out in the info-sphere by nation states. The article will also provide a forecast of the development of cyberspace in the context of future OSINT activities.
PL
Cyberprzestrzeń jako miejsce pozyskiwania informacji podlega ciągłym przemianom. Rozpoznawanie związanych z nią zagrożeń i wyzwań stanowi jeden z elementów wpły-wających na bezpieczeństwo narodowe. Znajomość aktualnych uwarunkowań wpły-wających na bezpieczeństwa informacji i możliwości ich uzyskania stanowi niezbędny element pracy instytucji tworzących system bezpieczeństwa państwa. W niniejszym artykule przedstawiono czynniki wpływające na przyszłość funkcjonowania i dystry¬bucji informacji w świecie cyfrowym potwierdzające wzrost konieczności stosowania OSINT w instytucjach państwowych, szczególnie w obliczu nowych wyzwań. Należą do nich: haktywizm, upowszechnienie wśród użytkowników sieci specjalistycznych narzędzi i technologii do pozyskiwania i analizy danych, działania hybrydowe i dyplomatyczno-pro-pagandowe prowadzone w infosferze przez państwa narodowe. Ponadto przedstawiono prognozę rozwoju cyberprzestrzeni w kontekście przyszłych działań OSINT.
EN
The Russian invasion of Ukraine on 24 February 2022 heralded a new “social media war” era. This “hybrid warfare” extends beyond the military landscape and includes attacks in cyberspace and fake news with the aim of destabilising governments. The goal of this paper is to present a high-level of architecture based on imagery intelligence (IMINT) and geospatial intelligence (GEOINT) using geographic datasets and state-of-the-art methods. Integration with intelligence information (like Open-Source Intelligence [OSINT]) produces multiintelligent knowledge for security and defence decision-making end users. The results depict a harmonious and creative collaboration between IMINT, OSINT, and GEOINT. OSINT data helps to identify and describe the meteorological conditions that are present, contributing to the procedure’s responsiveness. Weather and dense cloud cover above Ukraine poses a challenge for optical imaging satellites, but synthetic aperture radar (SAR) sensor satellites can operate at night and overcome the problem. We carried out OSINT and IMINT analysis, monitoring the situation shortly after the invasion. OSINT data helped in the choice of an appropriate area of interest. Using the right Earth observation satellite system and artificial intelligence/machine learning algorithms is the best way to keep an eye on many different sites over long periods, send out alerts about unusual activity, and find new places where incoherent changes might be happening.
EN
The objective of this paper is to demonstrate the possibility of tracking and identifying military and other security personnel, operating in secretive or restricted areas. Such exposure might have dire consequences from the perspective of counterintelligence or physical security. Open Source Intelligence (OSINT) and Social Media Intelligence methods and techniques were employed to gather and analyse information on security and military personnel and expose their activities on-line. The case studies presented in the article exemplify utilisation of the new “Suunto” fitness application for open-source-based intelligence research. Despite general Operational Security rules that require all personal data such as names, pictures and habits to be kept discreet, open-source based research with one of the most popular fitness applications allowed the identification of military personnel and government agents operating in Afghanistan, Mali, Syria or working at national military facilities. In a single case, it took the author less than thirty minutes to identify personal details of a US Army soldier in Afghanistan and a Special Forces officer in one of the European countries and obtain their home addresses and pictures of them and their families. The results of the research show how OSINT techniques concerning fitness applications are useful both for intelligence and counterintelligence, specifically for malicious and terrorist purposes, and how necessary it is to make fitness and other, supposedly personal, activity private, especially for those who carry out sensitive missions and work in a restricted or secretive environment.
EN
The amount of textual information published on the Internet is considered to be in billions of web pages, blog posts, comments, social media updates and others. Analyzing such quantities of data requires high level of distribution – both data and computing. This is especially true in case of complex algorithms, often used in text mining tasks. The paper presents a prototype implementation of CLUO – an Open Source Intelligence (OSINT) system, which extracts and analyzes significant quantities of openly available information.
5
Content available remote Proces wywiadowczy. Cz. 1
EN
Within intelligence profession, intelligence means different things to many people, depending upon their functions, roles and perspectives. The term is applied to the product resulting from the processing of information concerning foreign nations, other hostile target and areas of military operations as well as institutions and certain kind of activities. Here it is called the process referred to the intelligence cycle. The cycle describes the basic process which gives the form and context to intelligence activity. In its simplest form the intelligence cycle is described as a four-stage process beginning with the articulation of requirements by a consumer – policy maker, governmental administration or military commander and his staff. Next comes the collection of information related to the requirements, then analysis of the raw information that produces the final intelligence. The last stage is the dissemination of the product to the original requester or other interested and authorized consumers. The articulation of the requirements is the most important part of the process and it is seldom as simple as it might seem. That requirement must be translated into a form that is susceptible to collection by a given collection field (intelligence source) - HUMINT, SIGINT, IMINT, MASINT, OSINT. The collection refers to the gathering of raw data, through espionage, technical means, and exploitation of open sources.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.