Artwork

Indhold leveret af Lawfare and Goat Rodeo. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Lawfare and Goat Rodeo eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

How Open-Source Investigators are Documenting the War in Ukraine

52:38
 
Del
 

Manage episode 327997687 series 3347538
Indhold leveret af Lawfare and Goat Rodeo. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Lawfare and Goat Rodeo eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

Open-source investigations—sometimes referred to as OSINT, or open-source intelligence—have been crucial to public understanding of the Russian invasion of Ukraine. An enormous number of researchers have devoted their time to sifting through social media posts, satellite images, and even Google Maps to track what’s happening in Ukraine and debunk false claims about the conflict.

This week on Arbiters of Truth, our series on the online information ecosystem, we devoted the show to understanding how open-source investigations work and why they’re important. Evelyn Douek and Quinta Jurecic spoke to Nick Waters, the lead on Justice and Accountability at Bellingcat, one of the most prominent groups devoted to conducting these types of investigations. They talked about the crucial role played by open-source investigators in documenting the conflict in Syria—well before the war in Ukraine—and how the field has developed since its origins in the Arab Spring and the start of the Syrian Civil War. And Nick walked us through the mechanics of how open-source investigations actually happen, and how social media platforms have helped—and hindered—that work.



Hosted on Acast. See acast.com/privacy for more information.

  continue reading

152 episoder

Artwork
iconDel
 
Manage episode 327997687 series 3347538
Indhold leveret af Lawfare and Goat Rodeo. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Lawfare and Goat Rodeo eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

Open-source investigations—sometimes referred to as OSINT, or open-source intelligence—have been crucial to public understanding of the Russian invasion of Ukraine. An enormous number of researchers have devoted their time to sifting through social media posts, satellite images, and even Google Maps to track what’s happening in Ukraine and debunk false claims about the conflict.

This week on Arbiters of Truth, our series on the online information ecosystem, we devoted the show to understanding how open-source investigations work and why they’re important. Evelyn Douek and Quinta Jurecic spoke to Nick Waters, the lead on Justice and Accountability at Bellingcat, one of the most prominent groups devoted to conducting these types of investigations. They talked about the crucial role played by open-source investigators in documenting the conflict in Syria—well before the war in Ukraine—and how the field has developed since its origins in the Arab Spring and the start of the Syrian Civil War. And Nick walked us through the mechanics of how open-source investigations actually happen, and how social media platforms have helped—and hindered—that work.



Hosted on Acast. See acast.com/privacy for more information.

  continue reading

152 episoder

Semua episod

×
 
Loading …

Velkommen til Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Hurtig referencevejledning