Due to Google Maps’ monopolization of online GIS mapping platforms and GPS providers, the service is available nearly everywhere in the world where Android is the primary platform of use – which is to say, nearly everywhere in the world. Much of the content will center around Syria, where the majority of my work and research has been directed. In the below guide, I will explore the practical application of user-created photosopheres, platform-generated street views, and organizational content management policies towards both OSINT research work and individual security measures. There are relatively simple steps behind securing most content on Google Maps, but certain security settings must be engaged by the user directly. This comparatively open flow of information on Google Maps is both a great benefit for researchers, who can access geotagged, geolocated, and roughly dated information uploaded by individuals, but also a risk to users and organizations who don’t take proper precautions when uploading content. Like other platforms, Google Maps provide users with the ability not only to upload media and other content directly to a location-based GIS map, but also to place text reviews at various businesses and geo-locations around the world. One of the biggest potential security vulnerabilities to an individual user, and thus one of the most useful tools for an OSINT researcher to verify information with, is Google Maps. In many cases, these users are enabled by app and device features which encourage participation and the submission of content. Google’s expansive location tracking via Android has been widely criticized, and although the company has taken steps in recent weeks to secure the privacy of its users on the Google platform, a major threat to Google’s user security still exists: the users themselves. In June of 2019, Facebook deactivated most of their graph search functionality, in a move which was intended to increase the privacy of users but which also left many investigators without the essential tools needed to perform their research. Companies have taken various steps to address this, with some notable examples. OSINT researchers can easily utilize Google Maps tools to verify information and establish suspect timelines.įor years, social media companies like Facebook have come under increased pressure for the amount of publicly shared and openly accessible user data available for search on their platforms.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |