Close Menu
Beverly Hills Examiner

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Does P.O.D. Get a Shoutout in the New Superman Movie?

    July 16, 2025

    The attacks on Tim Cook are half-baked—despite Apple stumbling over AI 

    July 15, 2025

    Trump Poised To Remove Illegal Aliens From The Census In A Major Blow To Blue States

    July 15, 2025
    Facebook X (Twitter) Instagram
    Beverly Hills Examiner
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    Beverly Hills Examiner
    Home»Technology»Open Source Intelligence May Be Changing Old-School War
    Technology

    Open Source Intelligence May Be Changing Old-School War

    By AdminMay 25, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Open Source Intelligence May Be Changing Old-School War


    Ford says that the high level of mobile connectivity among Ukrainians and a notable absence of combat footage from smartphones and headcams, especially in the early phases of the war, suggest an effective information operation may be underway. “No doubt the Ukrainians fear such images will reveal their tactics, techniques, and procedures,” says Ford. So Ukrainians may simply be censoring themselves.

    Social media platforms and cell phones are also a force multiplier for traditionally weaker military powers, like Ukraine, especially when it comes to coordinating intelligence collection for targeting activities. “Targeting information is now being exchanged online,” Ford says. “Successful kills have been celebrated on Telegram. Chatbots have been established, helping Ukrainians share target coordinates with their smartphones. Identifying targets doesn’t involve complex military systems; it works from civilian information infrastructures.”

    “The problem with crowdsourced intelligence in a war like Ukraine is standardizing the reporting,” Ford says. For example: “You want to be able to identify the vehicle, geo-locate it, then map against any available signals or satellite imagery, or other collection disciplines, fusing it into actionable target information.”

    The Russian invasion of Ukraine is not only the 21st century’s first conventional war in Europe, it is the “most digitally connected in history,” according to Ford. “If the Ukrainians can make that intelligence actionable quicker than the Russians, they can use their limited remote fires, artillery, drones, and maybe even missiles or air power effectively. The objective, therefore, is to find, fix, and finish Russian forces more quickly than the Russians can do this themselves.”

    When Russia launched its full-scale invasion in late February, the US, its allies, and Russia concluded that Ukraine’s forces were asymmetrically disadvantaged against Putin’s endowed and historically brutal counterpart. US officials expected the country to fall in days. Yet despite the US’s monumental success predicting Russia’s intentions and plans and offering warnings, American intelligence agencies incorrectly assessed Ukraine’s prospects—the current subject of an internal review.

    Facing the full onslaught of Russia’s armed forces, Ukraine’s military resilience may even have come as a bit of a surprise to Ukrainians themselves, Ford suspects. Yet mistaken judgments about the expected balance between strong and weak powers, accompanied by strategic surprise, may be a common occurrence in the information age. Before the acknowledged role of social media in fueling the Arab Spring, or the reported significance of thumb drives in more recent counterintelligence failures—telecommunications, open source infrastructure, and cheap and accessible consumer technology have impacted the parity calculus for state and non-state actors alike.

    Indeed, it was the worldwide growth of telecommunications in the 1990s that empowered Al-Qaeda to conduct its successful covert military attacks on US soil on September 11, 2001. But in the run-up to those attacks, the US Department of Defense hadn’t drafted a net assessment on the military or intelligence capabilities of what was later described by the 9/11 Commission as America’s “most dangerous foreign enemy.” The concept was unimaginable then, but it shouldn’t be now.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleEverything You Know about Shark Conservation Is Wrong
    Next Article MSNBC political analyst suggests Democrats paint GOP as the ‘anti-Christian’ party

    RELATED POSTS

    A former OpenAI engineer describes what it’s really like to work there

    July 15, 2025

    NZXT Discount Codes: 50% Off

    July 15, 2025

    Following YouTube, Meta announces crackdown on ‘unoriginal’ Facebook content

    July 14, 2025

    The Structure of Ice in Space Is Neither Order nor Chaos—It’s Both

    July 14, 2025

    Study warns of ‘significant risks’ in using AI therapy chatbots

    July 13, 2025

    Everything We Know About the Interstellar Object 3I/ATLAS

    July 13, 2025
    latest posts

    Does P.O.D. Get a Shoutout in the New Superman Movie?

    Superman may be rekindling interest in a ’90s-era nu metal band after potentially referencing the…

    The attacks on Tim Cook are half-baked—despite Apple stumbling over AI 

    July 15, 2025

    Trump Poised To Remove Illegal Aliens From The Census In A Major Blow To Blue States

    July 15, 2025

    Backstreet Boys singer joins celebrity beach privacy battles with new lawsuit

    July 15, 2025

    A former OpenAI engineer describes what it’s really like to work there

    July 15, 2025

    Ancient rocks show earliest evidence of tectonic activity on Earth

    July 15, 2025

    Friendship review – The Wario to I Love You Man’s…

    July 15, 2025
    Categories
    • Books (638)
    • Business (5,545)
    • Film (5,480)
    • Lifestyle (3,586)
    • Music (5,534)
    • Politics (5,533)
    • Science (4,891)
    • Technology (5,477)
    • Television (5,156)
    • Uncategorized (1)
    • US News (5,531)
    popular posts

    Has WWE become another cog in the Netflix machine?

    Has WWE become another cog in the Netflix machine? About Little White Lies Little White…

    Facebook parent Meta raises price of its Quest 2 VR headset by $100

    July 26, 2022

    Silicon Valley Bank: Bill Ackman says regulators did well

    March 13, 2023

    Tool Announce 3-LP Vinyl Edition of Fear Inoculum

    June 27, 2022
    Archives
    Browse By Category
    • Books (638)
    • Business (5,545)
    • Film (5,480)
    • Lifestyle (3,586)
    • Music (5,534)
    • Politics (5,533)
    • Science (4,891)
    • Technology (5,477)
    • Television (5,156)
    • Uncategorized (1)
    • US News (5,531)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    Ancient rocks show earliest evidence of tectonic activity on Earth

    July 15, 2025

    Friendship review – The Wario to I Love You Man’s…

    July 15, 2025

    ‘Today’ Hoda Kotb Gives Kelly Clarkson Big Diss

    July 15, 2025
    © 2025 Beverly Hills Examiner. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT