{"id":316,"date":"2025-12-06T00:41:42","date_gmt":"2025-12-06T00:41:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/traviszywicki\/?p=316"},"modified":"2025-12-06T00:46:06","modified_gmt":"2025-12-06T00:46:06","slug":"article-review-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/traviszywicki\/2025\/12\/06\/article-review-1\/","title":{"rendered":"Article Review 1"},"content":{"rendered":"\n<p>Article Review #1: Policy Considerations of Open-Source Intelligence: A Study of Bellingcat&#8217;s Online Investigation Patterns (2014\u20132024)<\/p>\n\n\n\n<p>Student Name: Travis Zywicki<\/p>\n\n\n\n<p>School of Cybersecurity, Old Dominion University<\/p>\n\n\n\n<p>CYSE 201S: Cybersecurity and the Social Sciences<\/p>\n\n\n\n<p>Instructor Name: Diwakar Yalpi<\/p>\n\n\n\n<p>Date: Oct 5, 2025<\/p>\n\n\n\n<p>BLUF&nbsp;<\/p>\n\n\n\n<p>Pittman and Walsh (2025) provide a detailed analysis of Bellingcat\u2019s open source intelligence (OSINT) practices from 2014 to 2024. Their analysis highlights the intersection of public participation, ethics, and technology in intelligence gathering. The authors argue that while OSINT promotes wider availability of information, it simultaneously introduces growing concerns about privacy and the safety of people whose data is exposed during the investigations.<\/p>\n\n\n\n<p>Connection to Social Science<\/p>\n\n\n\n<p>This article strongly supports the foundational themes of social sciences, particularly those relating to the relationship between technology, power, and human behavior. OSINT is not a technical venture but one shaped by ethical considerations and social responsibility. Pitman and Walsh demonstrate how the expansion of information online transforms public engagement in global events, affecting domains like political activism and journalism. The work is grounded in concepts relating to the social sciences with ethics, collective behavior, and the relationship between individuals and institutions that promote critical reflection on the influence of digital communities on things like policy making, public opinion, and national security.<\/p>\n\n\n\n<p>Research Question, Hypothesis, IV, and DV<\/p>\n\n\n\n<p>The central question this study brings forth is defining characteristics of Bellingcat\u2019s open source investigations. While the authors do not state an official hypothesis, their framework suggests an increase in online investigations over the decade and the relative escalation of ethical and policy challenges. The Independent Variables include country, year, topic, and type of data used in each investigation, while the Dependent Variable is the pattern and nature of Bellingcat\u2019s investigation.<\/p>\n\n\n\n<p>Research Methods<\/p>\n\n\n\n<p>Using a quantitative method, Pitman and Walsh examine data from 286 Bellingcat investigations conducted over ten years. Each investigation is classified by the Independent Variable with pattern identification facilitated through descriptive statistical methods. The Methodology effectively illustrates how public data can be used to identify the broader digital trends in the aspect of social science.<\/p>\n\n\n\n<p>Data and Analysis<\/p>\n\n\n\n<p>Data for the study is taken directly from Bellingcat\u2019s public reports. The findings indicate that Russia and the United States represent the focus of roughly 40% of all investigations. The majority of these investigations address military conflict and human security with 26.1% and 17.7% respectively, and nearly 98% rely on visual evidence such as pictures or videos. Social media emerges as the predominant information source with 31%. The authors acknowledge that, although transparency enhances credibility, it can also make risks for individuals whose social media content is included in these investigations.<\/p>\n\n\n\n<p>Marginalized Groups<\/p>\n\n\n\n<p>Pitman and Walsh address the impact of these investigations on marginalized populations. The inclusion of individuals\u2019 content in the investigations can subject them to heightened scrutiny or danger, with documented cases of misidentification and subsequent harassment. Pittman and Walsh advocate for these organizations like Bellingcat to implement ethical standards to those protecting human research subjects, thus safeguarding individual rights and safety.<\/p>\n\n\n\n<p>Societal Impact<\/p>\n\n\n\n<p>Ultimately, this study underscores the importance of open source intelligence. Bellingcat\u2019s work demonstrates how such platforms can enhance institutional accountability and inform the public, but it also exposes the necessity for detailed ethical guidelines and privacy protections. The research calls governments, corporations, and civil society to develop clear and responsible policies for the use of online data.<\/p>\n\n\n\n<p>Class Tie-In<\/p>\n\n\n\n<p>Pittman and Walsh\u2019s article ties directly into our class by showing us how open source intelligence practices reflect key social science principles. Principles like ethics and human behavior in today&#8217;s society. Their research reflects our class&#8217;s discussions about empirical research, ethical neutrality and the societal impact of digital investigations.<\/p>\n\n\n\n<p>Conclusion<\/p>\n\n\n\n<p>Pitman and Walsh\u2019s article effectively places OSINT at the intersection of social science and cybersecurity, telling us how these technological tools can both strengthen civic participation and generate ethical dilemmas. The study provides transparency with individual privacy, and it stimulates critical consideration of information ethics in an increasingly interconnected world.<\/p>\n\n\n\n<p>Reference Pitman, L., &amp; Walsh, L. (2025). Policy considerations of open-source intelligence: A study of Bellingcat\u2019s online investigation patterns (2014\u20132024). <a href=\"https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1202&amp;context=ijcic\">https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1202&amp;context=ijcic<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1: Policy Considerations of Open-Source Intelligence: A Study of Bellingcat&#8217;s Online Investigation Patterns (2014\u20132024) Student Name: Travis Zywicki School of Cybersecurity, Old Dominion University CYSE 201S: Cybersecurity and the Social Sciences Instructor Name: Diwakar Yalpi Date: Oct 5, 2025 BLUF&nbsp; Pittman and Walsh (2025) provide a detailed analysis of Bellingcat\u2019s open source intelligence&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/traviszywicki\/2025\/12\/06\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":31340,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/posts\/316"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/users\/31340"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/posts\/316\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}