Vetting For Credibility In OSINT Essay

PAGES
1
WORDS
394
Cite

Vetting Publicly Available Information

Publicly available information may contain a great deal of misinformation. One challenge in open-source intelligence (OSINT) is vetting publicly available information so as to determine what is true vs. false. The question is: how does one vet said information? In an age of information overload, it can be difficult to know whats true and whats not. With the rise of the internet, anyone can publish anything they want, without having to go through the traditional channels of peer review and editorial oversight. As a result, it's more important than ever to be able to vet publicly available information. When it comes to OSINT, there are a few key things to keep in mind. The thesis is of this paper is: to vet properly, one must consider the source, look for corroborating evidence, and take into account the motive of the publisher of the information.

Outline

I. Introduction

II. Background

a. OSINT

b. Challenge

c. Need

d. Thesis statement

III. Consider the Source

a. If it's coming from a reputable news organization or government website, it's more likely to be accurate than if it's coming from an anonymous blog or social media post.

b. Conduct background checks (Appel, 2014)

IV. Look for Corroborating Evidence

a. If multiple sources are saying the same thing, that's a good sign that it's true. However, if there are conflicting reports, that's a red flag that you should do more research before believing anything.

b. How does the information compare to everything else that is found (McKeown et al., 2014)

V. Consider the Motive

a. If they stand to gain something by spreading false information, that's another reason to be skeptical (Glassman & Kang, 2012)

b. What is the reason for putting this information out there?

VI. Conclusion

a. By being mindful of these factors, one can help ensure that information is being vetted appropriately and effectively.

References

Appel, E. J. (2014).Cybervetting: Internet searches for vetting, investigations, and open-

source intelligence. Crc Press.

Glassman, M., & Kang, M. J. (2012). Intelligence in the internet age: The emergence and

evolution of Open Source Intelligence (OSINT).Computers in Human Behavior,28(2), 673-682.

McKeown, S., Maxwell, D., Azzopardi, L., & Glisson, W. B. (2014, August).

Investigating people: A qualitative analysis of the search behaviours of open-source intelligence analysts. InProceedings of the 5th Information Interaction in Context Symposium(pp. 175-184).

Cite this Document:

"Vetting For Credibility In OSINT" (2022, November 01) Retrieved May 7, 2024, from
https://www.paperdue.com/essay/vetting-credibility-osint-essay-2178941

"Vetting For Credibility In OSINT" 01 November 2022. Web.7 May. 2024. <
https://www.paperdue.com/essay/vetting-credibility-osint-essay-2178941>

"Vetting For Credibility In OSINT", 01 November 2022, Accessed.7 May. 2024,
https://www.paperdue.com/essay/vetting-credibility-osint-essay-2178941

Related Documents
Intelligence
PAGES 9 WORDS 2776

IV-3). Each of these topics represents a crucial part of the larger evacuation plan, because as will be discussed in greater detail below, each single element of the plan influences and affects every other. All of this information should already be included in the embassy's emergency action plan, but it would likely be supplemented in a noncombatant evacuation plan with information and intelligence available via the Department of Defense and

The necessity to safeguard intelligence information from parochialism and political pressures will be a strong argument in promoting a centralized and strong capability. This is contrary to leaving decisions that affect critical intelligence related concerns solely to the makers of policy. Centralization of policymaking process faces the politicization risk that stems from the department of DCI. It is only the Congress, the President, and Senior National Security Officials who can

The Church Committee concluded that these activities made the intelligence community a secret government that was illegal, unethical, and improper and did not reflect the people or the nation of America. Secret intelligence actions were used to disrupt, harass, and destroy domestic law-abiding citizens and groups. At the time, people were spied on with excessive intrusion with the methods being illegal. In addition, the intelligence agencies carried out secret infiltration

Intelligence Community
PAGES 10 WORDS 3077

Intelligence Community Many divergent global forecasts relating to the Intelligence Community have been fronted where relative harmony dominates market economies and democracies but the use of military force is diminishing among internationally relating nations. This is driven by rising political, military and economic competition along the borders of major culture and civilization, increasing the breakdown of order as states implodes, rogue states arming themselves with unconventional weaponry and competition among multiple

Intelligence Defining, Identifying and Cultivating Childhood Intelligence Intelligence is a complex and nuanced subject. Once evaluated under fairly rigid terms using standardized intelligence quotient (IQ) testing, intelligence is now understood in a far more varied and flexible way, with concepts such as emotional intelligence, technical intelligence and artistic intelligence undermining a singular perspective on that which defines the concept. As this subject has widened in its scope, so too have discussions about

Intelligence Testing
PAGES 4 WORDS 1312

Intelligence Testing Few concepts in psychology are more hotly debated than the idea of what constitutes human intelligence. The definition of intelligence has become part of current culture wars as well as an area of intense scientific debate. This paper examines one popular theory of intelligence, Howard Gardner's concept of 'multiple intelligences,' which has been proposed as an alternative to the theory of 'general intelligence,' or intelligence as a concept that