When the world gets closer.

We help you see farther.

Sign up to our expressly international daily newsletter.

Already a subscriber? Log in .

You've reached your limit of one free article.

Get unlimited access to Worldcrunch

You can cancel anytime .


Exclusive International news coverage

Ad-free experience NEW

Weekly digital Magazine NEW

9 daily & weekly Newsletters

Access to Worldcrunch archives

Free trial

30-days free access, then $2.90
per month.

Annual Access BEST VALUE

$19.90 per year, save $14.90 compared to monthly billing.save $14.90.

Subscribe to Worldcrunch

Open-Source Methods, The Cyber Weapon Anyone Can Use In Ukraine War

Since the beginning of the war in Ukraine, journalists and citizens have used open source online intelligence to help the war effort and fight disinformation. NGOs and amateur investigators are even using it to look for evidence of human rights abuses.

​A woman checks in her phone the list of belongings recovered in the debris of her flat destroyed in the combats in Borodianka, Ukraine

A woman checks in her phone the list of belongings recovered in the debris of her flat destroyed in the combats in Borodianka, Ukraine

Anna Lippert

“#OSINT”: These five mysterious letters and hashtag have flourished on social media since Russia’s offensive in Ukraine. Open Source Intelligence is older than this conflict which broke out last February, but it the idea became better known to the general public as videos, photos and other conflict-related content abound, especially on social networks.

Stay up-to-date with the latest on the Russia-Ukraine war, with our exclusive international coverage.

Sign up to our free daily newsletter.

What’s hidden behind this acronym is a set of methods allowing the exploitation of open sources on the Internet: videos or photos posted on social media, location data, satellite images or the positions of planes and ships shared by a number of websites.

Journalists, NGOs and even anonymous citizens have seized these techniques in the context of the conflict in Ukraine to fight against disinformation, to inform about military positions, or to look for evidence of war crimes.

Tools from Switzerland

The tools and data used for OSINT are “completely accessible, and it’s even quite simple to do,” Benjamin, the man behind the @COUPSURE Twitter account says. According to him, there is no need to be informatics-savvy. “I don’t even know how to code,” he admits. Benjamin works for an engineering firm in Switzerland and he became known for his open source investigation on Russia’s military deployment at the borders of Ukraine.

Using open source data may help to find the origin of a social media post, to geolocate, date or authenticate a photo or a video, or to spot the location of troops. It combines fact-checking and data analysis. For instance, the Bellingcat collective, created in 2014, lead investigations on the Syrian civil war or the crash of the Malaysia Airlines Flight MH17 thanks to open sources.

Investigating war crimes

A myriad of content posted on social media about the war in Ukraine, whether genuine or not, are tools for many cyber investigators. The OSINT community ensures it is able to geolocate, identify and recontextualize certain images or videos. In the course of the months preceding the invasion of Ukraine by Russia, OSINT made it possible to geolocate some troops’ moves. “We would often see Russians saying they were retreating from the Ukrainian borders, and within a few hours, the OSINT community managed to prove that it was not the case,” Benjamin says.

We look for nearby military targets which could have been a legitimate target.

Once these videos and photos are authenticated, they are also used by NGOs to search for evidence of war crimes and human rights abuses. For instance, Human Rights Watch (HRW) uses open source investigation in addition to its field investigation and testimonies collected on site. This technology becomes “essential” to investigate human rights violations, especially in places where NGOs cannot go, says Gabriela Ivens, the Head of Open Source Research in the Digital Investigations Lab at Human Rights Watch.

Telegram, a goldmine for investigators

In Ukraine, HRW mainly uses photos and videos of the conflicts provided by journalists and humanitarians on the ground, but also those found on social media. Telegram, which is a very popular messasing platform in Russia and Ukraine, accounts for much of the exploited content. “We also use satellite images, but during the first weeks of the conflicts the sky above Ukraine was too cloudy for us to exploit them,” Ivens says.

Once the data related to an alleged attack on civilians is gathered, HRW’s investigators seek to locate and date the images. Then “we look for nearby military targets which could have been a legitimate target, or evidence that the attack was disproportionate. We look for the type of weapons used, the chain of command, the affected buildings and the human toll,” the cyber investigator says.

Finding such information requires resorting to a wide range of tools and resources as a complement to images and testimonies. OSINT constantly widens the scope of possibilities. HRW identified the people involved in strikes against civilians in Idlib, Syria, by analyzing Facebook posts and military press conferences or by online tracking the locations of Russian and Syrian aircraft in this area. “All sources can be useful if we put them together,” Ivens says.

This meticulous work, during which investigators identify, authenticate and analyze online content, can last for months. It is archived and safely kept by the NGO. The evidence gathered might indeed be transmitted to an international judicial authority in the context of a procedure against human rights violations in Ukraine.

\u200bFootage showing bombed out field hospital In Mariupol's Azovstal steel plant

Footage showing bombed out field hospital In Mariupol's Azovstal steel plant

Cover Images/ZUMA

How reliable are open source investigators?

NGOs and journalists affiliated with a media outlet do not have a monopoly on open source investigation. The OSINT community is made up of “all sorts of people”, some of whom are completely anonymous, Benjamin says. Professionals and amateurs alike put their skills together to investigate. Cartography specialists, “people with a passion for radio who try to pick up Russian frequencies,” or aviation enthusiasts who track aircraft in the sky can be found indiscriminately among this bunch. Some have joined collectives like Bellingcat or the Center for Information Resilience, which also count journalists as their members.

Every conflict is also an information war

Open Source Intelligence and its cyber investigators with various profiles have stepped in on the analysis of the conflict in Ukraine, and especially on Twitter, where they often share their findings. But how reliable are they?

Just like for websites or online articles, you have to pay attention to who did the work. Many OSINT investigations were conducted by specialized journalists, some of whom work for fact-checking services. Others work for NGOs or recognized collectives of investigators such as Bellingcat.

Many anonymous Internet users like @COUPSURE have seen their work recognized. Over time, their findings were then empirically recognized as reliable, for example when they are cited or retweeted by journalists who recognize the seriousness of their approach. But you must remain vigilant in a context where every conflict is also an information war between stakeholders.

You've reached your limit of free articles.

To read the full story, start your free trial today.

Get unlimited access. Cancel anytime.

Exclusive coverage from the world's top sources, in English for the first time.

Insights from the widest range of perspectives, languages and countries.

food / travel

Inside The Search For Record-Breaking Sapphires In A Remote Indian Valley

A vast stretch of mountains in India's Padder Valley is believed to house sapphire reserves worth $1.2 billion, which could change the fate of one of the poorest districts of Jammu and Kashmir.

Photo of sapphire miners at work in Jammu and Kashmir’s Kishtwar district

Sapphire mining in Jammu and Kashmir’s Kishtwar district

Jehangir Ali

GULABGARH — Mohammad Abbas recalls with excitement the old days when he joined the hunt in the mountains of Jammu and Kashmir’s Kishtwar district to search the world’s most precious sapphires.

Kishtwar’s sapphire mines are hidden in the inaccessible mountains towering at an altitude of nearly 16,000 feet, around Sumchan and Bilakoth areas of Padder Valley in Machail – which is one of the most remote regions of Jammu and Kashmir.

“Up there, the weather is harsh and very unpredictable,” Abbas, a farmer, said. “One moment the high altitude sun is peeling off your skin and the next you could get frostbite. Many labourers couldn’t stand those tough conditions and fled.”

Abbas, 56, added with a smile: “But those who stayed earned their reward, too.”

A vast stretch of mountains in Padder Valley nestled along Kishtwar district’s border with Ladakh is believed to house sapphire reserves worth $1.2 billion, according to one estimate. A 19.88-carat Kishtwar sapphire broke records in 2013 when it was sold for nearly $2.4 million.

In India, the price of sapphire with a velvety texture and true-blue peacock colour, which is found only in Kishtwar, can reach $6,000 per carat. The precious stone could change the socio-economic landscape of Kishtwar, which is one of the economically most underdeveloped districts of Jammu and Kashmir.

Keep reading...Show less

The latest