D4. Circular Reporting

D4. Circular Reporting


Know what circular reporting is and suggest ways in which it can be avoided.


Circular reporting, also known as “echo”, is when a piece of information from a single source is repeated by multiple other sources without independent verification. This repetition misleads analysts by making them believe there is more evidence that supports a claim.

Example: A well-established media publishes a rumour about a company's financial instability. Other media publish the same rumour without even verifying the information's authenticity. Because of this repetition, the rumour is amplified and impacts the company’s stock price despite the unfounded original claim.

There are several strategies to utilise to avoid circular reporting.

Identify original sources: Analyst must do their best to trace back the information to the primary source, e.g. scrutinise citations, identify source bias and cross reference information with independent sources.

Scrutinise Information Dissemination Patterns: Be vigilant of information that spreads quickly across multiple sources, especially across sources that share similar biases or perspectives. Look for additional evidence that supports or confirms the original information but comes from a source that is not directly connected to or influenced by the original source.

Employ Source Evaluation Techniques: Evaluate the reliability, credibility, and biases of each source. Understand the source motivation, access to information and manipulation.

Documents information Provenance: Maintain records of where the information originated, how it was obtained, and any assessment of the source's reliability. This document will help to identify circular reporting instances and keep intelligence products transparent and defensible.


Understand the importance of managing sources effectively to prevent this occurring.


To prevent circular reporting from occurring, the analyst must manage their sources effectively. Here are the key aspects of Effective Source Management:

Source Diversification: To mitigate the risk of falling into circular reporting, analysts must have a diverse range of sources with varying perspectives, backgrounds and access to information.

Source Network Analysis: Now go beyond individual sources and map out the network of information flow. Identify key nodes, potential echo chambers (an environment where individuals are exposed primarily to information and opinions that confirm their existing beliefs e.g. social media groups, News websites, and Online communities) and information brokers who might manipulate the narrative.

Structured Information Management: Implement systems to capture, store, process and analyse information from different sources. This includes management of the reliability of the source, its details, and its biases.

Continuous Source Re-evaluation: Sources tend to be dynamic. Hence, their reliability, credibility, and access to information can change over time. The analyst must re-evaluate their sources based on new information, observed behaviours and changes in the information landscape.

Collaboration and information sharing: As the threat landscape is continuously evolving, organisations must foster collaboration and information sharing between them. The collective intelligence echo system can be strengthened by sharing insight about source reliability, potential biases and observed instances of circular reporting.

Conclusion

Addressing the challenge of circular reporting requires a multi-faceted approach of rigorous source evaluation, effective source management practices, and conscious effort to seek out diverse perspectives. With the adoption of these measures, analysts can significantly reduce the risk of falling prey to information echo chambers and produce more reliable and actionable intelligence.

要查看或添加评论,请登录

Nomene C.的更多文章

  • Crest Pratical Threat Intelligence Analyst Exam

    Crest Pratical Threat Intelligence Analyst Exam

    A. Key Concepts The key concepts underlying intelligence-led cyber threat assessments.

  • F5. CREST Code of Conduct

    F5. CREST Code of Conduct

    Demonstrate understanding of code as it applies to the individual. The CREST Code of Conduct outlines the…

  • F4. Dealing With Legal/ Ethical Uncertainty

    F4. Dealing With Legal/ Ethical Uncertainty

    Know appropriate action if given a task of questionable legality /ethics. When you receive a task that is legally or…

  • F3. Key Legislation Pertaining to Intelligence Collection in the UK

    F3. Key Legislation Pertaining to Intelligence Collection in the UK

    Demonstrate working understanding of the constraints on intelligence collection operations imposed by : Computer Misuse…

  • F2. Handling of Classified Material

    F2. Handling of Classified Material

    Understand GPMS classifications and their meaning. The Government Protective Marking Scheme (GPMS) is a classification…

  • F1. Understanding Requirement for Adherence to Legal/ Ethical Standards

    F1. Understanding Requirement for Adherence to Legal/ Ethical Standards

    Identify examples of illegal and unethical behaviour. Here are a few examples of illegal and unethical behaviours.

  • E3. Intelligence sharing

    E3. Intelligence sharing

    Understanding of “Need to Know” and “Need to Share” concepts. The limitation of the traditional “need to know” approach…

  • E2. Unstructured / Human Readable TI.

    E2. Unstructured / Human Readable TI.

    Understanding of the key advantages/disadvantages of spoken and written dissemination. Human-readable threat…

  • E1. Structured/ Machine Readable TI

    E1. Structured/ Machine Readable TI

    Knowledge of STIX, CYBOX and TAXII and how they relate to each other. STIX (Structured Threat Information eXpression)…

    2 条评论
  • D6. Analytical Techniques.

    D6. Analytical Techniques.

    Be able to interpret data in graphical format, for example : A network diagram A timeline A histogram A scatterplot A…

社区洞察

其他会员也浏览了