X obtains location data from IP geolocation (which is usually accurate to country level) but also from cell tower/wireless network locations.
(One reason why switching to a VPN is often not enough to bypass geoblocking on some apps).
2/
Frequent travel confuses this process a little. I have accessed X in at least four countries in the past month, and this is currently reflected in the location uncertainty in my bio.
Will monitor to see how/when this changes by staying put for a bit.
3/
The author argues that OSINT is distinct from other INT sources (SIGINT, HUMINT, IMINT etc) because it is defined by how accessible it is ("publicly available",) rather than the nature of the source (signals, human, images etc).
2/n
The impact of this confusing taxonomy is that OSINT becomes a "junk drawer" of ill-defined types of information.
Unlike other INTs, the source type is vague and unclear.
3/n
Another very different true story from intelligence history.
It's certainly the most disgusting act of intel gathering I've ever heard of.
Here's how poor opsec and the careless toilet habits of Soviet soldiers became a reliable source of intel for NATO in the Cold War... 1/
After WW2 Germany was divided into Allied and Russian occupation zones.
Mistrust and paranoia between the two sides was rife and each was afraid of the other side launching a surprise attack on the other... 2/
To counter this, each side agreed to allowing a military mission from the opposing side to be stationed on their territory and observe military exercises.
That way it would be impossible for NATO/Soviet forces to prepare for an attack without being observed by the other. 3/