Alex McKeever, a part-time furniture mover in Ridgewood, Queens, woke up Wednesday and started scrolling on his phone. Like many of us, he’s been obsessed with the invasion of Ukraine and has been spending ten hours a day trying to piece together what was happening from news coverage and social media. That morning, McKeever, who is 30, saw that someone had tweeted a video of destroyed vehicles in a suburb of Kyiv called Bucha. It appeared to be the aftermath of a significant battle. The blackened wreckage of numerous Russian military vehicles lay scattered and smoldering along the road. Where exactly, McKeever wondered, had it taken place?
He wasn’t idly musing. For the last six years, McKeever has been active in open-source intelligence, or OSINT, which involves gathering and analyzing online information in much the same way that government intelligence professionals analyze classified data: identifying when and where events took place, who was involved, what kinds of weapons were used, and so on.
The movement began in 2011, when internet hobbyists began studying social-media posts to identify war crimes and human-rights violations in Syria. It grew steadily in the years that followed, then accelerated when Russian forces started massing near Ukraine late last year. OSINT findings proved vital in validating the Biden administration’s claims throughout February that an attack was imminent, and they informed subsequent coverage by traditional print and broadcast outlets. That exposure, in turn, drew a wave of new volunteers, many of them eager to help the Ukrainian cause. “I’ve had 50, 60 people a day getting in touch, offering their skill sets,” says Ross Burley, executive director of the Centre for Information Resilience, a U.K. nonprofit focused on countering misinformation. “We’ve had teachers, engineers, doctors. It’s staggering how everyone is coming together for this.” Continue reading New York: The DIY Intelligence Analysts Feasting on Ukraine