75 research outputs found

    Muckraker websites (American and European examples)

    Get PDF
    The goal of the article is to compare contemporary websites used by investigative reporters for organising their inquiries and propagating their outcomes. To achieve that goal, I compare the experiences of American and European muckrakers in conducting investigative activities through websites. I analysed 10 such projects in total, 3 from the USA and 7 from Europe. The discussed criteria include the modes of financing, the size of annual budgets, the modes of operation, and HR policies.The goal of the article is to compare contemporary websites used by investigative reporters for organising their inquiries and propagating their outcomes. To achieve that goal, I compare the experiences of American and European muckrakers in conducting investigative activities through websites. I analysed 10 such projects in total, 3 from the USA and 7 from Europe. The discussed criteria include the modes of financing, the size of annual budgets, the modes of operation, and HR policies

    INFORMACIJE IZ OTVORENIH IZVORA – OSNOVA ZA POSLOVNO-OBAVJEŠTAJNU DJELATNOST

    Get PDF
    The paper discusses the relationship between business intelligence (BI) and intelligence discipline based on information from open sources, better known as OSINT (open-source intelligence). The importance of the intelligence methodology – the intelligence cycle – is emphasized, which presupposes planning, systematic collection of information, its processing and analysis, and dissemination to end users. The goal is, ultimately, to make a business decision based on the knowledge. The development of BI and OSINT is discussed as well as the ideas that emerged in the 1970s when the importance of intelligence logic in the sphere of economy, and in society in general, was pointed out. Given the lack of empirical examples, the paper points out at the normative level that successful business is possible by relying on business intelligence (BI) and open-source information (OSINT), assuming the possession of analytical capacities, above all human and technological, which are capable to extrapolate the information necessary for a quality business decision from the immeasurable amount of data.Rad tematizira odnos poslovno-obavještajnog djelovanja, poznatijeg pod terminom business intelligence (BI) i prikupljačke obavještajne discipline koja počiva na informacijama iz otvorenih izvora, poznatije pod kraticom O-SINT (open source intelligence). Ističe se važnost obavještajne metodologije – obavještajnog ciklusa – koja pretpostavlja planiranje, sustavno prikupljanje informacija, njihovu obradu i analizu te diseminaciju prema krajnjim korisnicima. Cilj je, u konačnici, donošenje poslovne odluke na temelju prikupljenog znanja. U radu se govori o razvoju BI-a i OSINT-a i idejama koje su se javile sedamdesetih godina 20. stoljeća kada se ukazivalo na važnost obavještajne logike u sferi gospodarstva, ali u društvu općenito. S obzirom na nedostatne empirijske primjere, u radu se na normativnoj razini ukazuje kako je uspješno poslovanje moguće oslanjanjem na poslovno-obavještajno djelovanje (BI), odnosno informacije iz otvorenih izvora (OSINT), uz pretpostavku posjedovanja analitičkih kapaciteta, ljudskih i tehnoloških, koji su u stanju iz nemjerljive količine podataka ekstrapolirati informacije neophodne za kvalitetnu poslovnu odluku

    People, Partnerships and Collaboration: Understanding and Improving Intelligence in Counterinsurgency

    Get PDF
    The goal of intelligence is to inform decision makers. While this general goal holds true for counterinsurgencies, the nature of the target requires an understanding of intelligence that is unique from the traditional Cold War focus on nation-state adversaries. This paper seeks to build upon the substantial current literature on population-centric counterinsurgency, theoretical studies of intelligence as a discipline, and the recent literature on military intelligence in counterinsurgency to construct an innovative model of intelligence as it relates to full-spectrum counterinsurgency. This model of intelligence is then utilized to provide recommendations on how intelligence efforts in counterinsurgency can be improved, advocating a new intelligence model, based on flexibility and adaptation and enabled by expanded human intelligence capabilities, networked integration and collaboration, and an emphasis on local partnerships

    Why haven\u27t technologies fixed open source intelligence?

    Get PDF
    Abstract The Intelligence Community (IC) reached consensus after 9/11/2001 on the importance of Open Source Intelligence (OSINT) due to the changing nature of the global threat environment, the information explosion, and the changing intelligence requirements of the IC. Voluminous amounts of information, much of it with potential application for use in intelligence operations, continue to challenge IC intelligence analysts’ capabilities to harness, and effectively use in finished all-source intelligence production. Government reform commissions, senior IC officials, along with OSINT and technology advocates, have all espoused the growing importance of OSINT, and have outlined many ways in which the IC should improve including through improved OSINT training and expertise, along with the application of technologies and tools to assist IC analysts to perform the OSINT mission. This thesis examines how OSINT became important again after the events of 9/11, and the systematic efforts to institutionalize OSINT within the IC. This thesis examines the envisioned state of OSINT as published in the 2006 National Open Source Enterprise OSINT vision, that OSINT would be used as the “Source of First Resort”, and examines past IC efforts to implement technological solutions to make OSINT better for IC analysts. This examination attempts to answer the simple question of why haven’t technologies fixed OSINT yet? The thesis outlines many of the IC cultural challenges and limitations of the IC, as reflected in the literature, and personal observations of IC challenges that have inhibited OSINT, or may do so in the future. The thesis concludes by highlighting where OSINT has been and the unclear status of OSINT in the future IC. It is unknown whether OSINT will ever reach its full potential within the IC, or if on-going OSINT initiatives and reform efforts will repeat past trends. Further research may be required to understand future IC OSINT initiatives and how well OSINT fares in the coming years

    Publicly shared intelligence

    Full text link

    Cyber Intelligence. A obtenção de informações a partir de fontes abertas no Ciberespaço

    Get PDF
    Na sequência do desenvolvimento de estratégias de segurança e defesa no ciberespaço, surgiu a necessidade de Portugal desenvolver a sua própria Estrutura Nacional de Cibersegurança, de modo a fazer face às exigências internacionais, ao nível económico, político e militar. Desta forma, o Conceito Estratégico de Defesa Nacional, aprovado a 21 de março de 2013,em Conselho de Ministros, confirma a relevância da obtenção de informações no ciberespaço pelo caráter imprevisível, multifacetado e transnacional das novas ameaças e preconiza a edificação, ao nível das Forças Armadas, de uma capacidade de Ciberdefesa. Tendo em consideração o binómio Segurança e Defesa, a condução de operações de gestão de crises no ciberespaço é fortemente influenciada pela forma como é realizada a gestão de informação aberta e como é efetuada a sua utilização (des)cuidada, neste novo domínio de interação de natureza virtual. Assim, é fundamental que exista uma cooperação interinstitucional civil-militar, baseada num ciberespaço livre, aberto e seguro, de forma a garantir uma decisão mais informada e eficaz. O presente trabalho aborda a obtenção de informações através de fontes abertas no ciberespaço, inserindo-se o tratamento deste tema na mudança do paradigma da aplicação/adaptação dos conceitos de Segurança e de Defesa, à Era da Informação. Neste âmbito,procura-se equacionar a recolha de informações e produção do conhecimento situacional sobre as ciberameaças, no contexto da tomada de decisão em situações de gestão de crises, melhorando a resiliência nacional no ciberespaço. Face aos desafios e ameaças emergentes neste novo ambiente de interação global, a Ciberdefesa representa um novo desafio para a Segurança Nacional dos Estados e para a condução eficaz das operações de gestão de crises, reunindo para esse efeito capacidades civis e militares, que devem trabalhar em conjunto para atingir um objetivo comum. O objetivo do presente trabalho está centrado no desenvolvimento de um modelo proactivo e preventivo de informações, capaz de reforçar a capacidade de recolha e análise de informações no ciberespaço e de integrar, em tempo oportuno, a informação obtida na condução das operações de Ciberdefesa. Esta atividade deve, ainda, intercetar e negar as atividades de informações conduzidas por terceiros.Abstract Along with the development of national cyber security and cyber defence strategies, Portugal felt the urgency to develop it’s own National Cyber Security Structure in order to face international demands on economic, political and military levels. The National Strategic Defence Concept, approved on March 21st 2013 by the cabinet council, emphasizes the Cyber Intelligence relevance regarding the new threats, as they are unpredictable and transnational, advocating the creation of cyber defence capabilities by the Armed Forces. Considering Security and Defence binomial, the cyber crisis management operations are strongly influenced by the way open source information is processed and how is (un)carefully used in this new domain of interaction of virtual nature. So it is of the upmost importance that civil-military inter-institutional cooperation thrives based on an open, free and safe cyberspace, in order to insure an informed and effective decision-making. This paper addresses the open source intelligence gathering through cyberspace, by inserting the treatment of this theme in the changing paradigm of the security and defence concepts application/adaptation, to the Information Age. In this perspective, consider collecting information and situational awareness production about the cyber threats in the context of decision making in crisis management situations, improving the national resilience in cyberspace. Facing the challenges and emerging threats in this new environment of global interaction, Cyber defence represents a new challenge for homeland security and for the effective crisis management operations, gathering civil and military skills that should work together to attain a common goal. This paper is focused on the development of a proactive and preventive Cyber Intelligence Model, capable of reinforcing the Cyber Intelligence collect and analysis capabilities and integrate them, on time, in the Cyber defence operations. This activity should also be able to intercept and deny the information conducted by others

    Indonesian security responses to resurgent Papuan separatism : an open source intelligence case study

    Get PDF
    Simplistic but commonly held beliefs about State security functions would hold that the State manages an exclusive supply of the best possible quality of information, to which the public can only become privy via scandalous 'leaks'. Whether conducting counter-insurgencies, or intelligence collection and analysis of such operations, a State's special apparatus is often accorded an intelligence mystique, and its functions assumed to be specially endowed with 'the real story', far removed from 'low grade' information available to journalists, NGOs and other non-State actors and agents. In challenging such views, this paper sets out to detail various aspects of the Indonesian counter-insurgency in Irian Jaya/Papua, with a view to two distinct goals. The first objective is to attain an overview of the counter-insurgency's political context and some of its implications for regional security. The second is to assert the rich, though seemingly neglected, intelligence value of public domain information as evident in the Papua case. Reliance is placed upon a critical appraisal of many sources, especially Indonesian press reporting, in the discussion heading towards both destinations. Maps, tables and appendices are used to present the most specific and detailed aspects of the research made during the drafting of this paper. It must be emphasised that this study uses only information that has already been revealed in the public domain. Any analysis and opinion by the author is entirely his own, and made in a private capacity

    360 degree port MDA - a strategy to improve port security

    Get PDF
    CHDS State/LocalOur national security and prosperity depend in part on secure and competitive ports. Effective public and private sector collaboration is needed in a world with myriad security challenges and fierce global competition. Although steps have been taken in the years since 9/11 to realize these twin goals, much more needs to be done. The current maritime domain awareness (MDA) paradigm needs to be expanded to provide comprehensive awareness of intermodal operations in our ports. An effective Open Source Intelligence (OSINT) program that succeeds in leveraging intermodal data is fundamental to better port-level MDA. Developing effective port level MDA and using it to enhance the security of our ports relies on the effective organization of public and private sector resources. The joint operations centers called for in the SAFE Port Act, once broadened to include key intermodal players, provide an excellent organizational model to pursue enhanced port security.http://archive.org/details/degreeportmdastr109452559Comptroller, U.S. Coast Guard (USCG

    OSINT – Gondolatok a kérdéskörhöz = OSINT – Thoughts on the Issue

    Get PDF
    corecore