This thesis explores the role of Open Source Intelligence generated by civil society organisations in the ongoing Israel-Hamas conflict using a framework introduced by Hannah Van Beek and Sebasiaan...Show moreThis thesis explores the role of Open Source Intelligence generated by civil society organisations in the ongoing Israel-Hamas conflict using a framework introduced by Hannah Van Beek and Sebasiaan Rietjens.Show less
Web 2.0 fundamentally transformed the nature of publicly available information, allowing civilians to conduct detailed investigations of security issues using only open sources. In recent years,...Show moreWeb 2.0 fundamentally transformed the nature of publicly available information, allowing civilians to conduct detailed investigations of security issues using only open sources. In recent years, these online open-source investigation (OOSI) groups have attracted more attention, particularly in the media. This thesis evaluates the concept of civilian OOSI using two competing theoretical perspectives. According to Pantumsinchai’s interpretation of actor-network theory, these groups have an inherent propensity to spread misinformation, but according to Nhan et al.’s interpretation of nodal governance theory, these groups can be powerful security actors if they properly manage their characteristics. This thesis uses a qualitative case study of Bellingcat’s (a civilian OOSI group) investigation of the downing of Malaysia Airlines Flight 17 in 2014. Using this case study method, I conclude that Nhan et al.’s nodal governance theory is the superior theoretical lens for examining civilian OOSI and that the proliferation of misinformation is not an inherent issue with civilian OOSIShow less
Master thesis | Crisis and Security Management (MSc)
open access
Increasingly, law enforcement focuses on the prevention of crime. In this approach, the role of information is important. Especially combined with the technological advancements of Internet and...Show moreIncreasingly, law enforcement focuses on the prevention of crime. In this approach, the role of information is important. Especially combined with the technological advancements of Internet and social media make that using publicly accessible information is inevitable. Whether this implies that such “open-source information” is freely accessible to law enforcement officers tasked with intelligence-led policing and creating intelligence remains to be the question. By means of a literary analysis, document analysis, interviews with practitioners and a single case study this research aimed to find out how intelligence officers can make use of this vast and valuable amount of information whilst adhering to security principles of surveillance and entrapment. This study found that there is no judicial framework built around creating intelligence as is the case with ongoing criminal investigations and surveillance is only partially possible. Article 3 of the Police Directive functions as the basis of officer’s functioning and any privacy breach that is more than necessary needs to be carefully considered under principles of proportionality and necessity. The assessment of these is thus vital, especially when applied to issues of national security – e.g. right-wing extremism – where these two principles have the opportunity of clashing. The study also found that a clear distinction between tasks of the public prosecutor and the municipality is of importance in order for intelligence officers to engage in effective intelligence-led policing. Finally, the attitude towards information as merely “nice-to-have” within intelligence-led policing needs to shift towards “need-to-have” to properly assess necessity and proportionality.Show less