Answers on OSINT for India 7 – Source Concepts
SIr, 1-Is there any comprehensive OSINT report publicly available which may help to know what the sources are? 2- How can OSINT help in generating high-grade intelligence?
SIr, 1-Is there any comprehensive OSINT report publicly available which may help to know what the sources are? 2- How can OSINT help in generating high-grade intelligence?
Sir, 1- OSINT definitely relates to HUMINT to the extent that it involves an analyst’s presence of mind. Primary data on OSINT (govt docs) are old and hardly any attention has been paid to cybersecurity, safer communications. Also, Open Source Info has increased tremendously over the years calling ICT engineers to research and produce more …
Continue reading “Answers on OSINT for India 6 – OSINT & HUMINT”
Sir please explain the picture.
Sir, kindly guide on – 1- How can OSINT ops be successively conducted on closed information states like China or North Korea? (Attaching a file I had downloaded) 2- Is the information that China generally makes public through its stare-run agencies reliable and sufficient? 3- Is there any research paper or unclassified information over the …
Continue reading “Answers on OSINT for India 3 – OSINT & Denied Areas”
Sir, I have noticed one particular characteristic of OSINT which is that any OSINT process involves two actions, namely, intelligence collection and then intelligence analysis. I have observed that OSINT collection process is technical and requires thorough understanding of different technologies, softwares and methodologies while intelligence analysis depends more upon the analyst’s judgment. This brings …
Continue reading “Answers on OSINT for India 2 – OSINT & Technical vs. OSINT & Analytical”
This book is addressing concerns of the excluded majority by explaining how present complex social conditions work in favour of generational aspirations to achieve a more positive future. As an experiences policy maker I see a real value in the author’s advise how to free enormous potential for cooperative undertakings among members of society at …
China has been mining Open Source Info of its major adversaries, namely, the US, India and the Europe. The latest Zhenhua leaks confirm this. Very little information is available over the methodology it adopts. Please guide on how China does it? China, like Japan, is good at collection and very poor at processing and sense-making. …