SlideShare a Scribd company logo
Open Source Intelligence
Analysis
Petr Špiřík
“True genius resides in the capacity for evaluation of uncertain,
hazardous, and conflicting information.”
Winston Churchill
About
The course
„You never know.“
„Truth is in the middle.“
„Can’t trust anything THEY say.“
„Don’t even try to understand.”
O RLY?
Petr Špiřík
Enterprise security, incident
response, security architecture
and design. This is what I do.
Cyber security, privacy, counter-
surveillance and threat
intelligence. This is what I like.
Education and the power of
knowledge. This is what I believe.
CC-BY-SA • Petr Špiřík
Method in the Madness
Open Source
Public domain
Internet centric
Unstructured
Unreliable
Overwhelming
Intelligence Analysis
Define problem
Collect data
Analyze information
Report conclusion
Check with reality
CC-BY-SA • Petr Špiřík
Problem definition
“If one does not know to which port one is sailing, no wind is
favorable.”
Seneca
CC-BY-SA • Petr Špiřík
Time Flow
Prediction
Forward looking
Limited assurance
Consistency is key factor
Am I the target of surveillance?
Explanation
What lead to current situation?
Which of these stories is true?
Opinions and behavior forming
How do vaccines cause autism?
CC-BY-SA • Petr Špiřík
Tangible problem
Right questions
True or false
Selection from menu
Realistic
Expected results
Ability to decide and act
Gather evidence
Debunk lie
CC-BY-SA • Petr Špiřík
Examples
Good
What is the root cause of Ukraine
crisis?
Should higher education be free
of charge?
Are government owned media
biased?
Bad
Learn something about Ukraine
and stuff.
Kids are unhappy at our schools,
this must change!
Is this whole world just an
illusion?
CC-BY-SA • Petr Špiřík
Collection
“Facts do not cease to exist because they are ignored.”
Aldous Huxley
CC-BY-SA • Petr Špiřík
Pick one
Data Driven
Holistic, mosaic, immersive
Information channels required
Establishes model
Hypothesis Driven
Problem focused
Hypothesis generation required
Solves one problem only
CC-BY-SA • Petr Špiřík
Data Driven
Sources
Validation of sources
credibility, accuracy, speed
Source management
review, update, remove
Typology
academic, research, news
Channels
Real time
RSS, Twitter & TweetDeck
Regular Google queries
weekly, monthly
Knowledge management system
notepad, wiki, Evernote
CC-BY-SA • Petr Špiřík
Hypothesis Driven
Google (Hacking)
Google operators provide
powerful tool
-site:bbc.co.uk (Germany OR
France) AND (Russia OR Putin OR
“Russian Federation”) filetype:pdf
Investigation with Maltego
Open source intelligence,
investigation and forensic tool
Community edition free of charge
Requires focus and dedication
Starting point and goal are
absolute must
CC-BY-SA • Petr Špiřík
Evidence Evaluation
Weight
Relative
Can change based on subject of
analysis
0% - not relevant
100% - critical evidence
Credibility
More stable
Function of source selection and
management
0% - aeronet.cz
100% - your mother
CC-BY-SA • Petr Špiřík
How much Information you Really need?
Incomplete information
We make incomplete information
decisions all the time
We will never have complete
information
Consistency beats superstar
intuitive guesses in the long run
Beware of indecision paralysis
Information Overload
You can always look for more
information
There is critical mass of
information that is “enough”
Additional information provided
beyond this point do not change
the result significantly
CC-BY-SA • Petr Špiřík
Analysis
“War is 90% information.”
Napoleon Bonaparte
CC-BY-SA • Petr Špiřík
Mind
Memory
Human mind is prone to errors
Tool is not important – the
process is
Think about thinking – some
errors can’t be avoided but can be
compensated
Record everything
Separation
Do one step at a time
Do not mix idea generation with
analysis
Do not make final judgment after
first hypothesis evaluation,
disregarding how strong it looks
Record everything
CC-BY-SA • Petr Špiřík
Situational vs. Theory Driven Analysis
Situational
Focus on specific situation
Location, culture, company
Understand the environment
Seek for issues present in given
context
Judgment prioritizes the situation
assessment and include issues
identified
Theory Driven
Focus on issue investigated
Abuse, espionage, conflict
Understand the issue
Seek for shared symptoms of the
issues in given context
Judgment prioritizes the issues
and assess how these are affecting
the situation
CC-BY-SA • Petr Špiřík
Problem deconstruction
Method
Useful for decision making
Define factors first
Assign them weight (up to 100%)
Define options
Quantify options (up to 100%)
Calculate the result
Sample Matrix
CC-BY-SA • Petr Špiřík
Should I go
to Erasmus?
Weight Erasmus
Czech
Republic
Cost 40 20 (8) 80 (32)
Timing 10 70 (7) 30 (3)
Experience
gained
50 60 (30) 40 (20)
Total 100 45 55
Competing Hypothesis I
Hypothesis Generation
Brainstorming and recording
No evaluation
Clear definition required
Identify key differences
Remove redundant or unclear
hypothesis
Evidence Gathering
Gather and validate evidence
Check evidence to each option
Strong/weak
Supporting/Disproving
Remove irrelevant evidence
CC-BY-SA • Petr Špiřík
Competing Hypothesis II
Review and conclusion
Identify promising hypothesis
Look for invalidation
Review evidence weight and
credibility
Review hypothesis
Make tentative judgments
Identify game changing evidence
Example
War in
Europe?
Yes, please.
Cold war
only.
Everything
is good
Crimean
crisis
+ ++ --
Greece vs.
EU talks
-- + -
ISIS
expansion
-- - -
CC-BY-SA • Petr Špiřík
Biases I
Evaluation of Evidence
Vividness
Absence of data
Thrive for consistency
Unassessed evidence
Confirmation bias
Cause and Effect
Favoring casual explanation
Favoring central scheme
Cause and effect
Internal vs. External drivers
Overestimating our importance
Mirror image/Projection
CC-BY-SA • Petr Špiřík
Biases II
Probabilities estimates
Availability rule
Anchoring
Verbal expressions
Complex scenarios
Base rate fallacy
Hindsight biases
“Everyone knew how this was
destined to end. I am surprised
you did not see it coming.”
Not problem of analysis itself
Problem of target audience
Can be discouraging
CC-BY-SA • Petr Špiřík
Reporting
“If you can’t explain it simply, you don’t understand it well enough.”
Albert Einstein
CC-BY-SA • Petr Špiřík
Audience
Formal
Professional assignment
Academic research
Reporting up
Focus on form
Credibility is at stake
Informal
Your own use
Circle of friends
Informing down
Don’t overdo it
Shoot early, update often
CC-BY-SA • Petr Špiřík
Structure
Top Down Approach
“Let the train crash. People want
to see the train crash.”
Lead with key judgment first
Do not start with data
Make a statement, do not ask
questions.
Length
One sentence for key message
One paragraph for executive
summary
One page for overview report
Anything above one page – nice,
but no one is going to read it.
CC-BY-SA • Petr Špiřík
Content
Be clear
Report is finished product
State the result
Provide estimates
Offer alternative conclusion
Be consistent
Create templates and use them
Align with problem statement
Keep the estimates consistent
Highlight game changing factors
CC-BY-SA • Petr Špiřík
Reality Check
If you know the enemy and know yourself you need not fear the results
of a hundred battles.”
Sun Tzu
CC-BY-SA • Petr Špiřík
Close the loop
Look forward
Note breaking points in advance
Prepare the paths
Follow up if triggered
Update your system
Did any evidence source changed
its reliability?
What was the feedback on the
report?
What tasks were waste of time?
Learn, adapt, improve.
CC-BY-SA • Petr Špiřík
Tips & Tricks
DO
Trust in your analysis
Aim for constant improvement
Train. Intelligence analysis is a skill
Make this count
Do not
Become overconfident
Expect to read the future
Lose focus on problem
Raise unrealistic expectations
CC-BY-SA • Petr Špiřík
Key Judgments
“Hope is not a strategy.
Fear is not an option.
Luck is not a factor.”
James Cameron
CC-BY-SA • Petr Špiřík
Thanks!
Petr Špiřík
petr.spirik@gmail.com
www.slideshare.net/zapp0/
Resources
Richards J. Heuer: Psychology of
Intelligence Analysis
Michael Bazzell: Open Source
Intelligence Techniques
Daniel Kahneman: Thinking, Fast
and Slow
CC-BY-SA • Petr Špiřík

More Related Content

PPTX
Risk Management and Reliable Forecasting using Un-reliable Data (magennis) - ...
DOCX
Psych 540 uop course,psych 540 uop materials,psych 540 uop homework
PPT
Developing Analytic Technique and Defeating Cognitive Bias in Security
PDF
FROM SWOT TO TOWS
PPT
2004 06 intelligence analysis seminar
PPT
Eidws 111 opsec
PPT
Eidws 112 intelligence
PDF
Military_Intelligence_Professional_Bulletin_OCT_DEC_2015
Risk Management and Reliable Forecasting using Un-reliable Data (magennis) - ...
Psych 540 uop course,psych 540 uop materials,psych 540 uop homework
Developing Analytic Technique and Defeating Cognitive Bias in Security
FROM SWOT TO TOWS
2004 06 intelligence analysis seminar
Eidws 111 opsec
Eidws 112 intelligence
Military_Intelligence_Professional_Bulletin_OCT_DEC_2015

Viewers also liked (18)

PDF
OSINT- Leveraging data into intelligence
PDF
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
PPTX
Tools for Open Source Intelligence (OSINT)
PPTX
How to Use Open Source Intelligence (OSINT) in Investigations
PDF
Intelligence gathering during crisis management incidents
PDF
Case Study: Taxonomies as a Tool to Increase Discovery of Intelligence Commun...
PDF
Working Paper 05/2012 Future directions in civil-military responses to natura...
PDF
Presentation
PPT
Chin peng presentation
PPTX
PMESII-DIME framework
PPT
Open Source Intelligence Overview
PDF
Pivotal role of intelligence analysis in ILP
PPTX
Information Fusion Methods for Location Data Analysis
PPT
Competitive intelligence-analysis-tools-for-economic-development
PDF
Open Source Intelligence (Os Int) Link Directory December 2009
PPTX
PDF
Ontologijos, semantinis saitynas ir semantinė paieška
PPT
Open source intelligence
OSINT- Leveraging data into intelligence
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Tools for Open Source Intelligence (OSINT)
How to Use Open Source Intelligence (OSINT) in Investigations
Intelligence gathering during crisis management incidents
Case Study: Taxonomies as a Tool to Increase Discovery of Intelligence Commun...
Working Paper 05/2012 Future directions in civil-military responses to natura...
Presentation
Chin peng presentation
PMESII-DIME framework
Open Source Intelligence Overview
Pivotal role of intelligence analysis in ILP
Information Fusion Methods for Location Data Analysis
Competitive intelligence-analysis-tools-for-economic-development
Open Source Intelligence (Os Int) Link Directory December 2009
Ontologijos, semantinis saitynas ir semantinė paieška
Open source intelligence
Ad

Similar to Open source intelligence analysis (20)

PPTX
Introduction to Bayesian Truth Serum
PPTX
Bayesian truth-serum
PDF
The law and ethics of data-driven artificial intelligence
PDF
What data scientists really do, according to 50 data scientists
PDF
Towards Explainable Fact Checking (DIKU Business Club presentation)
PPTX
Survey Methodology for Security and Privacy Researchers
PPT
AAPOR 2012 Langer Probability
PDF
OSMC 2024 | The Subtle Art of Lying with Statistics Dave McAllister.pdf
PPTX
Investigating Performance: Design & Outcomes with xAPI | LSCon 2017
PDF
Customer insights for product strategy
PPTX
Hypothesis Testing: Overview
PPTX
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
PPT
Making light work of data- improving the UX of data rich interfaces- UX Austr...
PPTX
Supporting innovation in insurance with randomized experimentation
PPT
Analyzing and Interpreting Data statippt
PDF
Talking SoS with Shawn Riley - Slides from - A 25 Minute Primer On Cybersecur...
PPT
How NOT to Aggregrate Polling Data
PPTX
Startup Engineering Flashpoint Batch 3 Better Startups Faster
PPT
Mir 2012 13 session #4
PDF
2017 Edelman Trust Barometer - Technology
Introduction to Bayesian Truth Serum
Bayesian truth-serum
The law and ethics of data-driven artificial intelligence
What data scientists really do, according to 50 data scientists
Towards Explainable Fact Checking (DIKU Business Club presentation)
Survey Methodology for Security and Privacy Researchers
AAPOR 2012 Langer Probability
OSMC 2024 | The Subtle Art of Lying with Statistics Dave McAllister.pdf
Investigating Performance: Design & Outcomes with xAPI | LSCon 2017
Customer insights for product strategy
Hypothesis Testing: Overview
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
Making light work of data- improving the UX of data rich interfaces- UX Austr...
Supporting innovation in insurance with randomized experimentation
Analyzing and Interpreting Data statippt
Talking SoS with Shawn Riley - Slides from - A 25 Minute Primer On Cybersecur...
How NOT to Aggregrate Polling Data
Startup Engineering Flashpoint Batch 3 Better Startups Faster
Mir 2012 13 session #4
2017 Edelman Trust Barometer - Technology
Ad

More from zapp0 (7)

PPTX
Enterprise incident response 2017
PPTX
Enterprise security management II
PPTX
Enterprise security incident management
PPTX
Cyberwar: (R)evolution?
PPTX
Civilian OPSEC in cyberspace
PPTX
Education to cyber security
PPTX
Cyberwar
Enterprise incident response 2017
Enterprise security management II
Enterprise security incident management
Cyberwar: (R)evolution?
Civilian OPSEC in cyberspace
Education to cyber security
Cyberwar

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Institutional Correction lecture only . . .
PDF
Computing-Curriculum for Schools in Ghana
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
Cell Structure & Organelles in detailed.
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
master seminar digital applications in india
Lesson notes of climatology university.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Microbial diseases, their pathogenesis and prophylaxis
Institutional Correction lecture only . . .
Computing-Curriculum for Schools in Ghana
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial disease of the cardiovascular and lymphatic systems
102 student loan defaulters named and shamed – Is someone you know on the list?
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Cell Types and Its function , kingdom of life
Cell Structure & Organelles in detailed.
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Final Presentation General Medicine 03-08-2024.pptx
master seminar digital applications in india

Open source intelligence analysis

  • 1. Open Source Intelligence Analysis Petr Špiřík “True genius resides in the capacity for evaluation of uncertain, hazardous, and conflicting information.” Winston Churchill
  • 2. About The course „You never know.“ „Truth is in the middle.“ „Can’t trust anything THEY say.“ „Don’t even try to understand.” O RLY? Petr Špiřík Enterprise security, incident response, security architecture and design. This is what I do. Cyber security, privacy, counter- surveillance and threat intelligence. This is what I like. Education and the power of knowledge. This is what I believe. CC-BY-SA • Petr Špiřík
  • 3. Method in the Madness Open Source Public domain Internet centric Unstructured Unreliable Overwhelming Intelligence Analysis Define problem Collect data Analyze information Report conclusion Check with reality CC-BY-SA • Petr Špiřík
  • 4. Problem definition “If one does not know to which port one is sailing, no wind is favorable.” Seneca CC-BY-SA • Petr Špiřík
  • 5. Time Flow Prediction Forward looking Limited assurance Consistency is key factor Am I the target of surveillance? Explanation What lead to current situation? Which of these stories is true? Opinions and behavior forming How do vaccines cause autism? CC-BY-SA • Petr Špiřík
  • 6. Tangible problem Right questions True or false Selection from menu Realistic Expected results Ability to decide and act Gather evidence Debunk lie CC-BY-SA • Petr Špiřík
  • 7. Examples Good What is the root cause of Ukraine crisis? Should higher education be free of charge? Are government owned media biased? Bad Learn something about Ukraine and stuff. Kids are unhappy at our schools, this must change! Is this whole world just an illusion? CC-BY-SA • Petr Špiřík
  • 8. Collection “Facts do not cease to exist because they are ignored.” Aldous Huxley CC-BY-SA • Petr Špiřík
  • 9. Pick one Data Driven Holistic, mosaic, immersive Information channels required Establishes model Hypothesis Driven Problem focused Hypothesis generation required Solves one problem only CC-BY-SA • Petr Špiřík
  • 10. Data Driven Sources Validation of sources credibility, accuracy, speed Source management review, update, remove Typology academic, research, news Channels Real time RSS, Twitter & TweetDeck Regular Google queries weekly, monthly Knowledge management system notepad, wiki, Evernote CC-BY-SA • Petr Špiřík
  • 11. Hypothesis Driven Google (Hacking) Google operators provide powerful tool -site:bbc.co.uk (Germany OR France) AND (Russia OR Putin OR “Russian Federation”) filetype:pdf Investigation with Maltego Open source intelligence, investigation and forensic tool Community edition free of charge Requires focus and dedication Starting point and goal are absolute must CC-BY-SA • Petr Špiřík
  • 12. Evidence Evaluation Weight Relative Can change based on subject of analysis 0% - not relevant 100% - critical evidence Credibility More stable Function of source selection and management 0% - aeronet.cz 100% - your mother CC-BY-SA • Petr Špiřík
  • 13. How much Information you Really need? Incomplete information We make incomplete information decisions all the time We will never have complete information Consistency beats superstar intuitive guesses in the long run Beware of indecision paralysis Information Overload You can always look for more information There is critical mass of information that is “enough” Additional information provided beyond this point do not change the result significantly CC-BY-SA • Petr Špiřík
  • 14. Analysis “War is 90% information.” Napoleon Bonaparte CC-BY-SA • Petr Špiřík
  • 15. Mind Memory Human mind is prone to errors Tool is not important – the process is Think about thinking – some errors can’t be avoided but can be compensated Record everything Separation Do one step at a time Do not mix idea generation with analysis Do not make final judgment after first hypothesis evaluation, disregarding how strong it looks Record everything CC-BY-SA • Petr Špiřík
  • 16. Situational vs. Theory Driven Analysis Situational Focus on specific situation Location, culture, company Understand the environment Seek for issues present in given context Judgment prioritizes the situation assessment and include issues identified Theory Driven Focus on issue investigated Abuse, espionage, conflict Understand the issue Seek for shared symptoms of the issues in given context Judgment prioritizes the issues and assess how these are affecting the situation CC-BY-SA • Petr Špiřík
  • 17. Problem deconstruction Method Useful for decision making Define factors first Assign them weight (up to 100%) Define options Quantify options (up to 100%) Calculate the result Sample Matrix CC-BY-SA • Petr Špiřík Should I go to Erasmus? Weight Erasmus Czech Republic Cost 40 20 (8) 80 (32) Timing 10 70 (7) 30 (3) Experience gained 50 60 (30) 40 (20) Total 100 45 55
  • 18. Competing Hypothesis I Hypothesis Generation Brainstorming and recording No evaluation Clear definition required Identify key differences Remove redundant or unclear hypothesis Evidence Gathering Gather and validate evidence Check evidence to each option Strong/weak Supporting/Disproving Remove irrelevant evidence CC-BY-SA • Petr Špiřík
  • 19. Competing Hypothesis II Review and conclusion Identify promising hypothesis Look for invalidation Review evidence weight and credibility Review hypothesis Make tentative judgments Identify game changing evidence Example War in Europe? Yes, please. Cold war only. Everything is good Crimean crisis + ++ -- Greece vs. EU talks -- + - ISIS expansion -- - - CC-BY-SA • Petr Špiřík
  • 20. Biases I Evaluation of Evidence Vividness Absence of data Thrive for consistency Unassessed evidence Confirmation bias Cause and Effect Favoring casual explanation Favoring central scheme Cause and effect Internal vs. External drivers Overestimating our importance Mirror image/Projection CC-BY-SA • Petr Špiřík
  • 21. Biases II Probabilities estimates Availability rule Anchoring Verbal expressions Complex scenarios Base rate fallacy Hindsight biases “Everyone knew how this was destined to end. I am surprised you did not see it coming.” Not problem of analysis itself Problem of target audience Can be discouraging CC-BY-SA • Petr Špiřík
  • 22. Reporting “If you can’t explain it simply, you don’t understand it well enough.” Albert Einstein CC-BY-SA • Petr Špiřík
  • 23. Audience Formal Professional assignment Academic research Reporting up Focus on form Credibility is at stake Informal Your own use Circle of friends Informing down Don’t overdo it Shoot early, update often CC-BY-SA • Petr Špiřík
  • 24. Structure Top Down Approach “Let the train crash. People want to see the train crash.” Lead with key judgment first Do not start with data Make a statement, do not ask questions. Length One sentence for key message One paragraph for executive summary One page for overview report Anything above one page – nice, but no one is going to read it. CC-BY-SA • Petr Špiřík
  • 25. Content Be clear Report is finished product State the result Provide estimates Offer alternative conclusion Be consistent Create templates and use them Align with problem statement Keep the estimates consistent Highlight game changing factors CC-BY-SA • Petr Špiřík
  • 26. Reality Check If you know the enemy and know yourself you need not fear the results of a hundred battles.” Sun Tzu CC-BY-SA • Petr Špiřík
  • 27. Close the loop Look forward Note breaking points in advance Prepare the paths Follow up if triggered Update your system Did any evidence source changed its reliability? What was the feedback on the report? What tasks were waste of time? Learn, adapt, improve. CC-BY-SA • Petr Špiřík
  • 28. Tips & Tricks DO Trust in your analysis Aim for constant improvement Train. Intelligence analysis is a skill Make this count Do not Become overconfident Expect to read the future Lose focus on problem Raise unrealistic expectations CC-BY-SA • Petr Špiřík
  • 29. Key Judgments “Hope is not a strategy. Fear is not an option. Luck is not a factor.” James Cameron CC-BY-SA • Petr Špiřík
  • 30. Thanks! Petr Špiřík petr.spirik@gmail.com www.slideshare.net/zapp0/ Resources Richards J. Heuer: Psychology of Intelligence Analysis Michael Bazzell: Open Source Intelligence Techniques Daniel Kahneman: Thinking, Fast and Slow CC-BY-SA • Petr Špiřík