Why open-source intelligence can help and hinder understanding of what's happening in Gaza, Israel
CBC
Social media platforms have been flooded with horrific footage from Israel and Gaza since Oct. 7 — the day the Palestinian militant group Hamas carried out a surprise assault on Israel, armed with cameras and smartphones in the arsenal of weapons used in the slaughter and kidnapping of hundreds of Israeli civilians.
In the aftermath, as Israel bombed the Gaza strip in retaliation, the deaths of thousands of Palestinians have also been captured on camera: images of airstrikes levelling homes and buildings and bodies being pulled from mountains of concrete rubble.
As brutal as it may be to watch, the imagery is a trove of information for researchers and investigators like Sam Dubberley, the managing director of digital investigations at Human Rights Watch, who is among those working to preserve and analyze as much of this material as possible.
It's referred to as open-source intelligence, or OSINT, a valuable resource for determining what happens in conflicts and war zones and for gathering evidence of potential war crimes and human rights violations.
But the effort it takes to collect and verify such information is more complicated than ever, say OSINT experts, due to the sheer volume of content that has emerged so quickly and the amount of false or misleading material muddying the waters.
"It's our job at Human Rights Watch to go through this information and try and establish [the] facts," Dubberly told CBC News from Berlin. "But it means looking through a lot of pain, you know, a lot of pain in Israel and a lot of pain in Palestine."
OSINT is basically any form of information that isn't top secret, said Andy Carvin, managing editor of the Atlantic Council's Digital Forensic Research Lab (DFRLab) based in Washington, D.C.
"In the context of conflict, it's typically referring to all of that eyewitness footage and video and other content circulating across the internet and trying to make sense of it," he said.
Carvin's first foray into gathering OSINT happened while working for a policy research organization after the 2001 Sept. 11 attacks, when he developed an email list for eyewitnesses, journalists and others to share their accounts of what happened. He further honed his OSINT gathering techniques while leading the social media team at NPR and monitoring the 2011 Arab Spring uprisings across the Middle East and North Africa.
There's rarely a "clear smoking gun," said Carvin, explaining how one piece of intelligence on its own is not enough to tell a complete and reliable story about an individual event or attack.
One of the first and simplest steps for OSINT analysts, like Vancouver-based Ritu Gill, is to verify visual material using a reverse image search — uploading a photo or video thumbnail to a search engine, such as Google Images or TinEye, to determine the original source and whether the footage already existed on the internet before the event, and has been reshared out of context."
Once verified, Gill explained, analysts can then attempt to piece the puzzle together by cross-referencing a video or photo with messages on social media channels, satellite imagery, maps, geolocation tools, public records and news stories.
The importance of verifying and analyzing open-source intelligence was highlighted in the aftermath of a deadly, nighttime blast at the al-Ahli Arab Hospital in Gaza City on Oct. 17.
Initial reports, citing Hamas-run government officials, accused Israel of firing an airstrike at the facility and killing hundreds of people sheltered there, while the Israeli Defence Forces blamed a failed rocket launch by Islamic Jihad, another militant group in Gaza.