The DeepState project analysts rely on various sources and types of information to formulate their conclusions, often including the following:
1. Open-Source Intelligence (OSINT)
Publicly available data from media outlets, social networks, satellite imagery, and government publications.
Examples: News reports, social media activity, and public records.
2. Geospatial Intelligence (GEOINT)
Satellite and aerial imagery for visual evidence of events, troop movements, or infrastructure changes.
Example: Identifying military buildup or damage to facilities.
3. Signals Intelligence (SIGINT)
Intercepted communications, such as phone calls, emails, or radio transmissions.
Example: Monitoring communications between military units.
4. Human Intelligence (HUMINT)
Information from human sources, including informants, defectors, or on-the-ground contacts.
Example: Testimonies from individuals within affected regions.
5. Cyber Intelligence
Data from cyber activities, such as hacking or monitoring digital communication patterns.
Example: Analyzing malicious activities or uncovering digital footprints of operations.
6. Historical and Contextual Data
Trends and patterns from past conflicts, economic indicators, or political developments.
Example: Comparing current movements to historical conflicts to predict outcomes.
7. Social Media Monitoring
Tracking posts, hashtags, and online discourse for real-time updates and sentiment analysis.
Example: Verifying events through eyewitness videos or posts on platforms like Twitter or Telegram.
8. Economic and Supply Chain Data
Insights into resources like energy, food supplies, or financial transactions to assess stability.
Example: Monitoring sanctions or disruptions to trade routes.
9. Technical and Scientific Data
Data from sensors, seismic activity, or environmental monitoring tools.
Example: Measuring explosions or environmental impacts in conflict zones.
10. Collaborative Analysis and Cross-Referencing
Collaboration with other organizations or agencies to cross-verify and corroborate findings.
Example: Sharing intelligence with trusted partners for validation.
Would you like an example of how this type of analysis is applied to a real-world scenario?
Comments