Open Source Intelligence: what is it and how does it work?

Richard Canale, faculty member at Global Institute of Cyber, Intelligence & Security (GICIS) and Business Stream Manager at EW Solutions Ltd, asks whether Open Source Intelligence (OSINT) can be used to track the migration of terrorist technology:

We have operated in counter improvised explosive devices (C-IED) and electronic countermeasures (ECM) arenas for the majority of our working lives and have been struck by the lack of usable technical information and global threat trend available at the user level. IED technical data is invariably classified irrespective of the source when fed into the exploitation chain. On the intelligence side of life, analysts are given an area of responsibility and so are very focused in on their own “patch” but are seldom looking across continents.

We have been collecting open source information on radio controlled IED (RCIED) and when its collated in a single repository, the Open Source Threat Database (OSTD), the trends and potential migrations of RCIED know-how are apparent. The question is, can we say that because a device appears elsewhere that there has been conscious decision for that to happen?

Technical criteria

Technically, the choice of device largely comes down to a small number of important but simple and well-established factors:

  • Availability: Generally perpetrators will use what is available locally and what they are familiar with.
  • Cost: With very few exceptions most receivers in RCIED are relatively cheap even if the transmitters might not be.
  • Plug and Play: Operations in areas such as Syria and Iraq has necessitated those without the technical training or backgrounds to use systems that are easy to configure or that work, plug-and-play, out of the box.
  • Repeatability and reliability: Complex systems that require soldering on to boards or configuration via a laptop can introduce margins of error.

Social Media

Social media is a key enabler in the dissemination of threat information; an example is the Nokia 1280. This handset provides some attractive features for wiring that negates external switches, and offers soldering points. But so do many other cell phones and yet (Fig 1), appear all over the place and are nearly always linked with al-Qaeda aligned organisations.

Untitled
(Fig 1)

This is a small sample, but it demonstrates geographical spread; the configuration of the phones is uncannily similar. This is too much of a coincidence; there are a number of very easy to follow Jihadi videos that show how to configure the Nokia 1280. Almost plug-and-play, evidently reliable and repeatable, and appears to be organisation wide. Social media, word of mouth and training camps will all have something to do with this configuration type.

Organisational Directive

The Norwegian right-wing extremist Anders Breivik bombed Oslo on 22 July 2011 and then went on to a shooting spree. Concurrently, Breivik published his manifesto entitled “2083: A European Declaration of Independence”. This document contains a section on how to make explosives and provides a link to Firework Firing Systems.

fig2
(Fig 2)

In subsequent arrests of right-wing sympathisers in Europe in 2012 (Czech Republic and Poland) both the perpetrators had Alpha Fire firework remotes. It is not possible say unequivocally that there is a direct link, but they were reported as being sympathisers and coincidence cannot be overlooked. This system is cheap, plug and play, reliable and infinitely repeatable.

Migrant Jihadist or the “Caucasus Effect”

Although not necessarily peculiar to the Caucasus, the migration of mercenary or transient terrorists between troubled spots is bound to have an affect the types of devices that appear around the world.

fig3
(Fig 3)

Appliance controllers appear on a regular basis across a number of countries. Whilst most of the examples in Fig 3 are Islamist inspired, the use of the system by Maoists in India does break the mould somewhat.

Other examples of vehicles alarms and walkie-talkie systems that appear to have crossed borders or continents. Are these just a coincidence or are the perpetrators taking with them methodologies that they are familiar with? Without corroborative evidence or intelligence, at the OSINT level it isn’t easy to prove. But the coincidences, when viewed over time, are undeniable and the roles that the Internet and social media play are equally strong.

fig4
(Fig 4)

Does it help?

At the national agency level, where there is a requirement to send operatives overseas or track returning “home-grown” terrorists, this information is invaluable. For those in industry and/or national agencies with a requirement to design, develop and validate equipment capabilities and mission fills these trends can steer capability development.

To the original question, is it possible to spot trends and the movement of technology? The answer, based on the evidence above, is yes. Can it be used in a meaningful way? Yes, but it does not get away from the fundamentals of cost, availability, ease of use and reliability. Being prepared and trained to identify it when it happens is the key to saving lives and property and winning the information dominance battle.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Copyright: Security Buyer

Perimeter Protection: Balancing Physical and Technology

Joseph Clarke, Assistant Editor advocates for a hybrid approach to balancing physical and technological barriers in perimeter security…
Axis Communications Riyadh website

Axis Communications opens new office and experience centre in Saudi Arabia

Axis Communications has officially inaugurated its new office and Axis Experience Centre in Riyadh, Saudi Arabia.
GITEX Global 2024 website

GITEX GLOBAL 2024: AI revolution drives strategic tech innovation

GITEX GLOBAL 2024 concluded on Friday, showcasing artificial intelligence (AI) as a transformative force driving business and economic growth
AA_DAS_PR_ControlID_KingsAward2024_500x300

ASSA ABLOY biometric solution wins major security award

ASSA ABLOY has been recognised at the 25th Kings Excellence Awards. iDFace from Control iD won Best Biometric Product of the Year.
Olympics

Hanwha Vision cameras assist Olympic athletes in France

Hanwha Vision Europe has installed video surveillance in Paris, France to aid Olympic athletes and coaching in training and preparation.
Infloblox

Olympics Scammers Take Their Marks, Get Set, and Go!

Infoblox Threat Intel explores how bad actors are taking advantages of the public’s interest in the Olympic games from both…
Olympics

Enhancing Security at the Olympics with Facial Recognition

Sports hold profound significance in the lives of athletes, nations, and citizens alike, fostering a sense of unity and national pride.
Kate Hotson from Paxton visited the Royal Alexandra Children’s Hospit

Paxton Employees Vote to Fundraise for Rockinghorse Children’s Charity

The Brighton-based security technology developer, Paxton, is supporting the Rockinghorse Children’s Charity as their 2024 Charity of the Year
ASSA

Innovative, digital, reusable: a keyless locking solution

Protecting booths at trade shows is a challenge. After all, exhibitors want a constant stream of high traffic, especially from people…
halo

Halo scores hat-trick for football club security

Halo Solutions – the UK’s leading crowd safety and security operations platform  – has scored a hat-trick after Premier League club…
Scroll to Top