nixintel Profile picture
May 6 21 tweets 5 min read
BULLSHINT is alive and well.

If you have gaps in your intelligence picture, it is ok to say "I don't know" or "I need more data to form a conclusion".

It is never acceptable to fill the gaps with speculation and call it intelligence. 🧵 1/
All forms of intelligence, including #OSINT, involve assessment, evaluation and analysis.

There are a few different models, but they mostly look somthing like this:

2/
You plan, collect raw information, process it, analyse it, and then finally disseminate it for action. Always with the overall mission in mind.

Good analysis and evaluation is what turns raw information into actionable intelligence. 3/
Analysis is the most important part of this cycle.

This is where crucial questions are asked:

- How reliable is this?
- Can I corroborate it?
- Are there other explanations for what we see?
- What impact could this have?
- What does this mean for my mission?

And so on... 4/
Here's a little acronym I was taught to summarise the rigorousness of this process:

The ABC of intelligence analysis:

Assume Nothing
Believe Nothing
Check Everything*

(Or sometimes Challenge everything 😉) 5/
When - and only when - the raw information has been through this process is it ready for dissemination as *intelligence*.

Sometimes you need to go through the intel cycle many times before you achieve your objectives. 6/
Raw data without assessment, evaluation, and analysis is not intelligence.

Picture of a tank? Not OSINT.
Flightradar track? Not OSINT.
Heat spot on a satellite map? Not OSINT.

7/
These are raw data sources that *may* ultimately provide useful intelligence, but until they have been evaluated, verified, and assessed, they are still just raw data sources.

8/
Yet in much public "OSINT" discourse we do not see this discipline.

The rush to be first, the drug of likes/retweets and the tingle of sensationalism has led to a new intel cycle model.

I present to you THE BULLSHINT CYCLE:

9/
The BULLSHINT cycle is certainly quicker than the traditional intelligence cycle and it usually generates a higher volume of output.

Producing BULLSHINT is easy and fast.
Producing good OSINT is hard. It takes time and practice.

10/
There is a misconception that anyone can do OSINT.

I do not necessarily agree.

If intelligence were just "finding things on the internet" or "fancy googling", then yes, this is accessible to most people.

But that is not what OSINT is.

11/
Having a laptop and a Twitter account does not automatically mean someone will produce good Open Source Intelligence.

In the same way having a piece of wood and a hammer does not mean someone will make quality furniture.

12/
This is not about gatekeeping - there is thankfully very little of that in the OSINT community - but about recognising that intelligence gathering is a skill that takes time and discipline to develop.

13/
Contrast the cautious, measured, methodical analysis of experienced practitioners like @KofmanMichael or @CovertShores with some of the sensationalist "OSINT" accounts that cover the Ukraine conflict, for example.

13b/
Simply putting the label "OSINT" on something does not mean that it is not BULLSHINT.

There are some giveaways that help to spot the difference:

14/
One of the biggest clues is how intelligence gaps are handled.

(And there are always gaps.)

Good OSINT admits this and acknowledges the limitations of any findings.

BULLSHINT cannot admit this, and so fills the gaps with speculation that has no supporting evidence.

15/
The speculation usually has its origins in the bias of the BULLSHINT practitioner.

(And everyone has bias).

US recon flight over the Black Sea? (Observation)

Must be proof that a ship is sinking! (Speculation).

16/
Other giveaways:

- "Sources say..." (never cites the sources)
- "It is believed..." (by who?)
- Presenting opinion as fact.
- Use of recycled and/or unverified media.

17/
And the most dangerous BULLSHINT trap (but often the most difficult to perceive).

In a polarised or partisan situation, the intelligence assessments only ever support one side or cause, or only anticipate positive outcomes for the analyst's side.

🚩Big red flag🚩

18/
If your favourite "OSINT" sources only ever show you what you wish to be true, treat them with intense scepticism.

Confirmation bias works like an slow-acting poison in intelligence analysis.

19/ END.
Edited to clarify: I opened this thread with a tweet from @CovertShores as an example of good OSINT practice that is in contrast to some other more sensationalist "intel".

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with nixintel

nixintel Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @nixintel

Mar 22
Another very different true story from intelligence history.

It's certainly the most disgusting act of intel gathering I've ever heard of.

Here's how poor opsec and the careless toilet habits of Soviet soldiers became a reliable source of intel for NATO in the Cold War... 1/
After WW2 Germany was divided into Allied and Russian occupation zones.

Mistrust and paranoia between the two sides was rife and each was afraid of the other side launching a surprise attack on the other... 2/
To counter this, each side agreed to allowing a military mission from the opposing side to be stationed on their territory and observe military exercises.

That way it would be impossible for NATO/Soviet forces to prepare for an attack without being observed by the other. 3/
Read 18 tweets
Mar 21
I've been reading up on the history of OSINT recently (although it wasn't always called "OSINT" of course...).

I found an interesting early example of image-based intelligence going back to WW2.

These days we'd call it "crowdsourced"... 1/
In 1942 the allies were struggling for reliable images of locations in Nazi-occupied Europe. These were needed to plan bombing raids and operations like D-Day.

The allies had reconnaissance planes, but they were limited by range and weather, and were often shot down. 2/
So in 1942 the head of British intelligence, Admiral Godfrey, put out an appeal on BBC radio for listeners to send in photographs and postcards they had from mainland Europe, especially if the area was of military interest. 3/
Read 5 tweets
Feb 22
Reality check on why sanctions on Russia will also have a detrimental impact on the West:

telegraph.co.uk/business/2022/…

(behind paywall, so summarised below)...
1) Russia has its own digital payment system, Mir, which will mitigate the economic impact of removal from SWIFT.

2) Note that Russia would regard SWIFT removal as equivalent to a declaration of war in the event it was implemented: nytimes.com/2022/01/31/us/…
3) Russia supplies 43% of the world's Palladium, which is essential for the electronics industry.

4) It controls 90% of the world's neon, which is required for microchip production (lasers that etch chips use neon).
Read 9 tweets
Oct 4, 2021
Last week a key ransomware threat actor was arrested in Kiev, Ukraine.

I wondered if it was possible to do a little geolocation and find out where he was living the high life.

The source video is the official release from the Ukranian Police:

Using YouTube-dl to download the video and FFMPEG to split into a series of stills makes finding clues a little easier.

(Guide here: nixintel.info/osint-tools/us…)

You can also use Frame-by-Frame to do this in your browser (HT @salaheldinaz)

watchframebyframe.com/watch/yt/I20fa…
Here are the key images with exterior detail:

1) Yellow/Green pipe construction outside.
2) "Autograph" sign on the wall. ImageImage
Read 12 tweets
Jul 24, 2020
[THREAD] OSINT/Opsec tip:

Twitter accounts list profiles that they are following / followed by in chronological order.

The first few accounts that a Twitter user chooses to follow offer a great insight into who the account might belong to.
So if I want to know who might be associated to a Twitter account, looking at the fist 5-10 accounts they chose to follow offer more insights than, say, the 500th account they chose to follow.
Where the same few Twitter accounts appear early on in both followed/following lists this indicates a higher chance of prior association. Why did you choose to follow the first Twitter accounts in your Followed list? Chances are you had some prior interest/association.
Read 5 tweets
May 29, 2020
THREAD: #Geolocation of images taken indoors is infinitely more difficult than geolocating those taken outside, but there are still some resources that can help. Time for some real #OSINT nerdery looking at how plug sockets can help with geolocating an indoor image...
There are 14 different types of plug socket in use around the world. They are categorised from A to N:
Some are very common, being used in a wide range of countries. One legacy of Britain's past is that many former colonies still use the same plug socket as mainland UK (Type G, in case you didn't know...)

iec.ch/worldplugs/typ…
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(