Anonymity About GEOINT.

Fixxx

Moderator
Joined
Aug 21, 2024
Messages
177
Reaction score
571
Points
93
1732135326296.png

The world has already gotten used to social networks and the fact that users create and upload millions of images and videos to the internet every day. However, not everyone considers that a seemingly harmless selfie at the workplace can be used by malicious actors to hack a company and a photo from a hotel can be used for blackmail. With the development of technology and the expanded use of geoinformation systems, the threats in the field of cybersecurity have also increased, requiring more careful attention to the data being published. In this article we will explore what GEOINT is, how malicious actors use your photos for their purposes and why people examine Google Maps.


What is GEOINT?


GEOINT (GEOspatial INTelligence) is geospatial intelligence, which includes the analysis and use of images and geospatial information to obtain information about activities on Earth. GEOINT combines several disciplines: cartography, diagramming, image analysis and imagery intelligence. GEOINT is geospatial intelligence. This project was announced in the USA three years ago, primarily for national security purposes, as well as for mineral exploration, logistics, cartography and other civilian needs. Geospatial intelligence is based on images from the Earth's surface (people, places, equipment, buildings, etc). Geoinformation security can be defined as measures to protect information from cyber incidents in geoinformation systems. GEOINT is usually associated with the military but more and more civilian organizations in telecommunications, transportation, public health and safety, as well as real estate, are using geospatial intelligence to improve the quality of everyday life. In broader use, geospatial intelligence is needed for emergency planning, general security monitoring and protecting critical infrastructure.
One interesting practical example that highlights the importance of privacy issues in geoinformation systems is the capture of a criminal who had been hiding for 20 years. He was discovered through street photographs in the Google Street View service. There are also several cases where such photos have helped solve crimes. On one hand, this underscores the social benefit of such services. On the other hand, it highlights the privacy issue. However, such services usually "blur" people's faces and only provide photos of faces to law enforcement agencies.

The development of technology has also led to a new stage in geospatial intelligence. The emergence of powerful analytical software, ubiquitous geolocation data, far-reaching broadband connections, rapidly evolving computing power, accessible cloud storage, advanced analytics and artificial intelligence have all played a role in the revolution of geospatial intelligence. Currently, geospatial intelligence technologies are at a level that allows for determining the location from a photo or video image, for example, a flag against a white wall. In addition to geolocation, a certain amount of additional data can be obtained from the parameters: time of day, weather conditions, etc. Typically, images for analysis are taken from open sources.
Law enforcement agencies use GEOINT for investigations and capturing criminals. For example, in 2019, law enforcement officers in Sacramento arrested a drug dealer. The criminal sent potential buyers a photo of marijuana lying in his palm. The fingerprint was clearly visible in the photo, which led to the identification of the perpetrator. A photograph can become evidence in a criminal case. For instance, in the spring of 2023 there was a leak of Pentagon data. A member of the National Guard, Jack Teixeira, came under suspicion. Authorities conducted a search of his home. Later, the media reported that the published photographs were taken by Teixeira in his home: the edges of the photographs matched the interior.

The most common method of geospatial intelligence is image or video analysis to determine where they were taken. Therefore, almost anyone using the internet and various services can conduct simple geospatial intelligence. For example, a jealous wife can deduce from her husband's social media photos that he is not on a business trip but visiting his rival. This capability is also exploited by malicious actors.

An example of careless handling of geoinformation is a case a few years ago when a fitness app revealed the coordinates of U.S. military bases. Observant users noticed unusual activity from a large number of athletes in Afghanistan and Syria. In these countries, fitness trackers recorded cyclical activity along the same routes, noticeably distanced from populated areas. It later became clear that these were the routes of military patrols. Nowadays, geoinformation is treated with much more caution. An example of careless handling of personal information can be seen in an interview with Michael Oren, the former Israeli ambassador to the U.S. Observant viewers noticed that during the filming from his home, a piece of paper with a login and password appeared in the frame.


How criminals use GEOINT?


Be vigilant and cautious when sharing your photos on social networks. Like any other information obtained through theft or leakage, data from open sources can be used by malicious actors for their purposes. Here are a few methods:
  • Phishing using geolocation. By determining your location, malicious actors can personalize phishing messages. For example, if you are at a resort, you are unlikely to ignore a message supposedly from the emergency services warning about dangerous weather conditions in that area.
  • Physical threats. Criminals can identify server centers or critical infrastructure and then direct physical intrusions against them.
  • Espionage and surveillance. Malicious actors can use geodata to track individuals or organizations, monitoring their movements, connections with people, habits and even plans to use this information for their own interests. For example, to create more convincing social engineering attacks or for blackmail.
Overall, the use of geospatial intelligence by malicious actors poses a serious threat to data security, personal information, and critical infrastructure. Individuals make the same mistakes as businesses: they post a large amount of information about themselves and their surroundings in open access. The more information a user shares about themselves, regardless of the sources (social networks, official and unofficial accounts on media platforms, etc) - the more information that can potentially be used by malicious actors. Various services and tools are used for geospatial intelligence to collect data from open sources. Here are some of them:
  • Google Maps - a web mapping platform from Google. It provides satellite photos, aerial photography, street maps, interactive 360° street panoramas and real-time traffic conditions.
  • OpenStreetMap - an open collaborative project to create a free editable geographic database of the world.
  • Soar Earth - a service for collecting and researching satellite images, aerial photographs and drone images.
  • GeoHack Tools - this service provides a list of OSINT resources for your selected area on the map. Maps/satellite images, photographs, real-time weather, flight and maritime tracking, railroads, peaks and even fitness device data.
There are many tools used for GEOINT, including GeoSpy, PeakVisor, ArcGIS, QGIS and find2places. Currently, these tools are actively being developed and enhanced with artificial intelligence capabilities. The range of tools for geospatial intelligence is vast and constantly expanding.


Geoguessing


In the context of geospatial intelligence, it's worth mentioning the phenomenon of geoguessing. The term originated from the browser game GeoGuessr, released in 2013. The game uses Google Street View maps and the player is required to guess the location of a street/alley/highway in the world by marking it on Google Maps. Since 2015, the game has also been available as an app for iOS. The game has become so popular that competitions and tournaments are held for it. In 2023, the World Championship final for GeoGuessr took place in Stockholm with a prize pool of $50,000. Clues include road markings, the language of signs and labels captured in the frame, animals and people appearing in the shot and other details. The most professional players can recognize a location on the map from a 3D image within seconds. Achieving such results requires spending a significant amount of time studying maps.


How to protect Geodata?


Geospatial intelligence is used in various fields: from military to commercial. Geospatial intelligence tools are improving and becoming accessible to a wide audience. Even a school student can use Yandex's image search or look for a location in Google Maps. Experts suggest that the use of artificial intelligence will play a significant role in the development of GEOINT. Overall, the entire history of geointelligence relies solely on images and videos, as well as the analysis of their content. OSINT is a highly popular topic today, but there are also specialized tools for GEOINT. Primarily, these are various maps, satellite images and similar resources. However, with the emergence of AI, more interesting tools are appearing. For example, PeakVisor can analyze a mountain range in a photo and indicate where it's located. Or Geolocation Estimation, which attempts to guess the location of an object from a photo using AI. Demand creates supply and such tools will continue to emerge. Some precautions can help prevent or minimize the risk of your data being used by malicious actors. The simplest thing you can do is not to post your photos in open access and if you still want to share, choose a neutral background and remove the file's metadata. Additionally, it's advisable to disable geolocation on devices and browsers.
 
Top Bottom