OSINT limitations for risk analysis
There are several limitations in the use of OSINT for risk analysis, related to both collection and processing/analysis of information. Collection of information Modus operandi
The section explores ways in which open-source information – and specifically social media – can be used to improve the understanding and response of security practitioners in the field of migration and to improve threat analysis in the context of cross-border crimes, in general. Topics include advantages and disadvantages of using information from social media for law-enforcement/intelligence-related purposes as well as an in-depth exploration of the type of insights that social media content can provide to security practitioners. The main emphasis is on the analytical component (e.g. integrating open-source information into intelligence analysis products addressing migration), though the challenges of data collection are also briefly addressed (e.g. building a directory of sources, source verification). In addition to identifying practices and useful resources this section also discusses different applications of using open source information for migration-related analysis.
There are several limitations in the use of OSINT for risk analysis, related to both collection and processing/analysis of information. Collection of information Modus operandi
There are multiple accounts on Facebook and Telegram advertising false documents. Some of these accounts are specialized just on false documents, while other accounts offer
Telegram accounts selling drugs can be easily identified from both a combination of name, profile photos and description Some accounts include in their name clear
Larger human smuggling operations often build a brand that they employ both online (e.g. profile pictures; as a watermark on photos showcasing their activity) and
There are several types of social media channels, which can be relevant for identifying and analysing human smuggling activities, such as: General information channels about
First step is building a comprehensive description of the threat in the “real world”. This is achieved through: Extensive consultations with end-users to understand the
MIRROR has received funding from the European Union’s Horizon 2020 research and innovation action program under grant agreement No 832921.
CRiTERIA has received funding from the European Union’s Horizon 2020 research and innovation action program under grant agreement No 101021866.
© All rights reserved