Serveur d'exploration SRAS

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Intelligence and global health: assessing the role of open source and social media intelligence analysis in infectious disease outbreaks

Identifieur interne : 000507 ( Pmc/Corpus ); précédent : 000506; suivant : 000508

Intelligence and global health: assessing the role of open source and social media intelligence analysis in infectious disease outbreaks

Auteurs : Rose Bernard ; G. Bowsher ; C. Milner ; P. Boyle ; P. Patel ; R. Sullivan

Source :

RBID : PMC:6153980

Abstract

Purpose

Open Source Intelligence (OSINT) and Signals Intelligence (SIGINT) from the clandestine intelligence sector are being increasingly employed in infectious disease outbreaks. The purpose of this article is to explore how such tools might be employed in the detection, reporting, and control of outbreaks designated as a ‘threat’ by the global community. It is also intended to analyse previous use of such tools during the Ebola and SARS epidemics and to discuss key questions regarding the ethics and legality of initiatives that further blur the military and humanitarian spaces.

Methods

We undertake qualitative analysis of current discussions on OSINT and SIGINT and their intersection with global health. We also review current literature and describe the debates. We built on quantitative and qualitative research done into current health collection capabilities.

Results

This article presents an argument for the use of OSINT in the detection of infectious disease outbreaks and how this might occur.

Conclusion

We conclude that there is a place for OSINT and SIGINT in the detection and reporting of outbreaks. However, such tools are not sufficient on their own and must be corroborated for the intelligence to be relevant and actionable. Finally, we conclude that further discussion on key ethical issues needs to take place before such research can continue. In particular, this involves questions of jurisdiction, data ownership, and ethical considerations.


Url:
DOI: 10.1007/s10389-018-0899-3
PubMed: 30294522
PubMed Central: 6153980

Links to Exploration step

PMC:6153980

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Intelligence and global health: assessing the role of open source and social media intelligence analysis in infectious disease outbreaks</title>
<author>
<name sortKey="Bernard, Rose" sort="Bernard, Rose" uniqKey="Bernard R" first="Rose" last="Bernard">Rose Bernard</name>
<affiliation>
<nlm:aff id="Aff1">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Conflict and Health Research Group,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="Aff2">King’s Centre for Global Health, Suite 2.13 Weston Education Centre, Cutcombe Road, London, SE5 9RJ UK</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Bowsher, G" sort="Bowsher, G" uniqKey="Bowsher G" first="G." last="Bowsher">G. Bowsher</name>
<affiliation>
<nlm:aff id="Aff1">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Conflict and Health Research Group,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Milner, C" sort="Milner, C" uniqKey="Milner C" first="C." last="Milner">C. Milner</name>
<affiliation>
<nlm:aff id="Aff1">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Conflict and Health Research Group,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Boyle, P" sort="Boyle, P" uniqKey="Boyle P" first="P." last="Boyle">P. Boyle</name>
<affiliation>
<nlm:aff id="Aff3">
<institution-wrap>
<institution-id institution-id-type="GRID">grid.419381.6</institution-id>
<institution>International Prevention Research Institute,</institution>
</institution-wrap>
Lyon, France</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Patel, P" sort="Patel, P" uniqKey="Patel P" first="P." last="Patel">P. Patel</name>
<affiliation>
<nlm:aff id="Aff4">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Department of War Studies,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Sullivan, R" sort="Sullivan, R" uniqKey="Sullivan R" first="R." last="Sullivan">R. Sullivan</name>
<affiliation>
<nlm:aff id="Aff1">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Conflict and Health Research Group,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">30294522</idno>
<idno type="pmc">6153980</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6153980</idno>
<idno type="RBID">PMC:6153980</idno>
<idno type="doi">10.1007/s10389-018-0899-3</idno>
<date when="2018">2018</date>
<idno type="wicri:Area/Pmc/Corpus">000507</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">000507</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">Intelligence and global health: assessing the role of open source and social media intelligence analysis in infectious disease outbreaks</title>
<author>
<name sortKey="Bernard, Rose" sort="Bernard, Rose" uniqKey="Bernard R" first="Rose" last="Bernard">Rose Bernard</name>
<affiliation>
<nlm:aff id="Aff1">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Conflict and Health Research Group,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="Aff2">King’s Centre for Global Health, Suite 2.13 Weston Education Centre, Cutcombe Road, London, SE5 9RJ UK</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Bowsher, G" sort="Bowsher, G" uniqKey="Bowsher G" first="G." last="Bowsher">G. Bowsher</name>
<affiliation>
<nlm:aff id="Aff1">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Conflict and Health Research Group,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Milner, C" sort="Milner, C" uniqKey="Milner C" first="C." last="Milner">C. Milner</name>
<affiliation>
<nlm:aff id="Aff1">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Conflict and Health Research Group,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Boyle, P" sort="Boyle, P" uniqKey="Boyle P" first="P." last="Boyle">P. Boyle</name>
<affiliation>
<nlm:aff id="Aff3">
<institution-wrap>
<institution-id institution-id-type="GRID">grid.419381.6</institution-id>
<institution>International Prevention Research Institute,</institution>
</institution-wrap>
Lyon, France</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Patel, P" sort="Patel, P" uniqKey="Patel P" first="P." last="Patel">P. Patel</name>
<affiliation>
<nlm:aff id="Aff4">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Department of War Studies,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Sullivan, R" sort="Sullivan, R" uniqKey="Sullivan R" first="R." last="Sullivan">R. Sullivan</name>
<affiliation>
<nlm:aff id="Aff1">
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Conflict and Health Research Group,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</nlm:aff>
</affiliation>
</author>
</analytic>
<series>
<title level="j">Zeitschrift Fur Gesundheitswissenschaften</title>
<idno type="ISSN">2198-1833</idno>
<idno type="eISSN">1613-2238</idno>
<imprint>
<date when="2018">2018</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<sec>
<title>Purpose</title>
<p id="Par1">Open Source Intelligence (OSINT) and Signals Intelligence (SIGINT) from the clandestine intelligence sector are being increasingly employed in infectious disease outbreaks. The purpose of this article is to explore how such tools might be employed in the detection, reporting, and control of outbreaks designated as a ‘threat’ by the global community. It is also intended to analyse previous use of such tools during the Ebola and SARS epidemics and to discuss key questions regarding the ethics and legality of initiatives that further blur the military and humanitarian spaces.</p>
</sec>
<sec>
<title>Methods</title>
<p id="Par2">We undertake qualitative analysis of current discussions on OSINT and SIGINT and their intersection with global health. We also review current literature and describe the debates. We built on quantitative and qualitative research done into current health collection capabilities.</p>
</sec>
<sec>
<title>Results</title>
<p id="Par3">This article presents an argument for the use of OSINT in the detection of infectious disease outbreaks and how this might occur.</p>
</sec>
<sec>
<title>Conclusion</title>
<p id="Par4">We conclude that there is a place for OSINT and SIGINT in the detection and reporting of outbreaks. However, such tools are not sufficient on their own and must be corroborated for the intelligence to be relevant and actionable. Finally, we conclude that further discussion on key ethical issues needs to take place before such research can continue. In particular, this involves questions of jurisdiction, data ownership, and ethical considerations.</p>
</sec>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct>
<analytic>
<author>
<name sortKey="Aid, M" uniqKey="Aid M">M Aid</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Barboza, P" uniqKey="Barboza P">P Barboza</name>
</author>
<author>
<name sortKey="Vaillant, L" uniqKey="Vaillant L">L Vaillant</name>
</author>
<author>
<name sortKey="Le Strat, Y" uniqKey="Le Strat Y">Y Le Strat</name>
</author>
<author>
<name sortKey="Hartley, D" uniqKey="Hartley D">D Hartley</name>
</author>
<author>
<name sortKey="Nelson, N" uniqKey="Nelson N">N Nelson</name>
</author>
<author>
<name sortKey="Madudeku, A" uniqKey="Madudeku A">A Madudeku</name>
</author>
<author>
<name sortKey="Madoff, L" uniqKey="Madoff L">L Madoff</name>
</author>
<author>
<name sortKey="Linge, J" uniqKey="Linge J">J Linge</name>
</author>
<author>
<name sortKey="Collier, N" uniqKey="Collier N">N Collier</name>
</author>
<author>
<name sortKey="Brownstein, J" uniqKey="Brownstein J">J Brownstein</name>
</author>
<author>
<name sortKey="Astagneau, P" uniqKey="Astagneau P">P Astagneau</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Birnbaum, J" uniqKey="Birnbaum J">J Birnbaum</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Bowsher, G" uniqKey="Bowsher G">G Bowsher</name>
</author>
<author>
<name sortKey="Milner, C" uniqKey="Milner C">C Milner</name>
</author>
<author>
<name sortKey="Sullivan, R" uniqKey="Sullivan R">R Sullivan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Bradwell, P" uniqKey="Bradwell P">P Bradwell</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Brownstein, Js" uniqKey="Brownstein J">JS Brownstein</name>
</author>
<author>
<name sortKey="Freifeld, Cc" uniqKey="Freifeld C">CC Freifeld</name>
</author>
<author>
<name sortKey="Reis, Bt" uniqKey="Reis B">BT Reis</name>
</author>
<author>
<name sortKey="Mandl, Kd" uniqKey="Mandl K">KD Mandl</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Clunan, C" uniqKey="Clunan C">C Clunan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cook, S" uniqKey="Cook S">S Cook</name>
</author>
<author>
<name sortKey="Conrad, C" uniqKey="Conrad C">C Conrad</name>
</author>
<author>
<name sortKey="Fowlkes, A" uniqKey="Fowlkes A">A Fowlkes</name>
</author>
<author>
<name sortKey="Mohebbi, M" uniqKey="Mohebbi M">M Mohebbi</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Eysenbach, G" uniqKey="Eysenbach G">G Eysenbach</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Freifeld, C" uniqKey="Freifeld C">C Freifeld</name>
</author>
<author>
<name sortKey="Chunara, R" uniqKey="Chunara R">R Chunara</name>
</author>
<author>
<name sortKey="Mekaru, S" uniqKey="Mekaru S">S Mekaru</name>
</author>
<author>
<name sortKey="Chan, E" uniqKey="Chan E">E Chan</name>
</author>
<author>
<name sortKey="Kass Hout, T" uniqKey="Kass Hout T">T Kass-Hout</name>
</author>
<author>
<name sortKey="Ayala Iacucci, A" uniqKey="Ayala Iacucci A">A Ayala Iacucci</name>
</author>
<author>
<name sortKey="Brownstein, J" uniqKey="Brownstein J">J Brownstein</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gao, H" uniqKey="Gao H">H Gao</name>
</author>
<author>
<name sortKey="Barbier, G" uniqKey="Barbier G">G Barbier</name>
</author>
<author>
<name sortKey="Goolsby, R" uniqKey="Goolsby R">R Goolsby</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Greenwald, G" uniqKey="Greenwald G">G Greenwald</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Grein, T" uniqKey="Grein T">T Grein</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Hulnick, A" uniqKey="Hulnick A">A Hulnick</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kickbusch, I" uniqKey="Kickbusch I">I Kickbusch</name>
</author>
<author>
<name sortKey="Orbinski, J" uniqKey="Orbinski J">J Orbinski</name>
</author>
<author>
<name sortKey="Winkler, T" uniqKey="Winkler T">T Winkler</name>
</author>
<author>
<name sortKey="Schnabel, A" uniqKey="Schnabel A">A Schnabel</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Koplan, J" uniqKey="Koplan J">J Koplan</name>
</author>
<author>
<name sortKey="Bond, T" uniqKey="Bond T">T Bond</name>
</author>
<author>
<name sortKey="Merson, M" uniqKey="Merson M">M Merson</name>
</author>
<author>
<name sortKey="Reddy, K" uniqKey="Reddy K">K Reddy</name>
</author>
<author>
<name sortKey="Rodriguez, M" uniqKey="Rodriguez M">M Rodriguez</name>
</author>
<author>
<name sortKey="Sewankambo, N" uniqKey="Sewankambo N">N Sewankambo</name>
</author>
<author>
<name sortKey="Wasserheit, J" uniqKey="Wasserheit J">J Wasserheit</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lazer, D" uniqKey="Lazer D">D Lazer</name>
</author>
<author>
<name sortKey="Kennedy, R" uniqKey="Kennedy R">R Kennedy</name>
</author>
<author>
<name sortKey="King, G" uniqKey="King G">G King</name>
</author>
<author>
<name sortKey="Vespigiani, A" uniqKey="Vespigiani A">A Vespigiani</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lerbinger, O" uniqKey="Lerbinger O">O Lerbinger</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Mawadeku, A" uniqKey="Mawadeku A">A Mawadeku</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Milinovich, G" uniqKey="Milinovich G">G Milinovich</name>
</author>
<author>
<name sortKey="Magalhaes, R" uniqKey="Magalhaes R">R Magalhães</name>
</author>
<author>
<name sortKey="Hu, W" uniqKey="Hu W">W Hu</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Omand, D" uniqKey="Omand D">D Omand</name>
</author>
<author>
<name sortKey="Barlett, J" uniqKey="Barlett J">J Barlett</name>
</author>
<author>
<name sortKey="Miller, C" uniqKey="Miller C">C Miller</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Salathe, M" uniqKey="Salathe M">M Salathé</name>
</author>
<author>
<name sortKey="Freifeld, C" uniqKey="Freifeld C">C Freifeld</name>
</author>
<author>
<name sortKey="Mekaru, S" uniqKey="Mekaru S">S Mekaru</name>
</author>
<author>
<name sortKey="Tomasulo, A" uniqKey="Tomasulo A">A Tomasulo</name>
</author>
<author>
<name sortKey="Brownstein, J" uniqKey="Brownstein J">J Brownstein</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Smith, M" uniqKey="Smith M">M Smith</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wenham, C" uniqKey="Wenham C">C Wenham</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Zook, M" uniqKey="Zook M">M Zook</name>
</author>
<author>
<name sortKey="Graham, M" uniqKey="Graham M">M Graham</name>
</author>
<author>
<name sortKey="Shelton, T" uniqKey="Shelton T">T Shelton</name>
</author>
<author>
<name sortKey="Gorman, S" uniqKey="Gorman S">S Gorman</name>
</author>
</analytic>
</biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">Z Gesundh Wiss</journal-id>
<journal-id journal-id-type="iso-abbrev">Z Gesundh Wiss</journal-id>
<journal-title-group>
<journal-title>Zeitschrift Fur Gesundheitswissenschaften</journal-title>
</journal-title-group>
<issn pub-type="ppub">2198-1833</issn>
<issn pub-type="epub">1613-2238</issn>
<publisher>
<publisher-name>Springer Berlin Heidelberg</publisher-name>
<publisher-loc>Berlin/Heidelberg</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">30294522</article-id>
<article-id pub-id-type="pmc">6153980</article-id>
<article-id pub-id-type="publisher-id">899</article-id>
<article-id pub-id-type="doi">10.1007/s10389-018-0899-3</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Intelligence and global health: assessing the role of open source and social media intelligence analysis in infectious disease outbreaks</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">http://orcid.org/0000-0003-2395-5371</contrib-id>
<name>
<surname>Bernard</surname>
<given-names>Rose</given-names>
</name>
<address>
<email>Rose.Bernard@kcl.ac.uk</email>
</address>
<xref ref-type="aff" rid="Aff1">1</xref>
<xref ref-type="aff" rid="Aff2">2</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Bowsher</surname>
<given-names>G.</given-names>
</name>
<xref ref-type="aff" rid="Aff1">1</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Milner</surname>
<given-names>C.</given-names>
</name>
<xref ref-type="aff" rid="Aff1">1</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Boyle</surname>
<given-names>P.</given-names>
</name>
<xref ref-type="aff" rid="Aff3">3</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Patel</surname>
<given-names>P.</given-names>
</name>
<xref ref-type="aff" rid="Aff4">4</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Sullivan</surname>
<given-names>R.</given-names>
</name>
<xref ref-type="aff" rid="Aff1">1</xref>
</contrib>
<aff id="Aff1">
<label>1</label>
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Conflict and Health Research Group,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</aff>
<aff id="Aff2">
<label>2</label>
King’s Centre for Global Health, Suite 2.13 Weston Education Centre, Cutcombe Road, London, SE5 9RJ UK</aff>
<aff id="Aff3">
<label>3</label>
<institution-wrap>
<institution-id institution-id-type="GRID">grid.419381.6</institution-id>
<institution>International Prevention Research Institute,</institution>
</institution-wrap>
Lyon, France</aff>
<aff id="Aff4">
<label>4</label>
<institution-wrap>
<institution-id institution-id-type="ISNI">0000 0001 2322 6764</institution-id>
<institution-id institution-id-type="GRID">grid.13097.3c</institution-id>
<institution>Department of War Studies,</institution>
<institution>King’s College London,</institution>
</institution-wrap>
London, UK</aff>
</contrib-group>
<pub-date pub-type="epub">
<day>10</day>
<month>2</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="pmc-release">
<day>10</day>
<month>2</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="ppub">
<year>2018</year>
</pub-date>
<volume>26</volume>
<issue>5</issue>
<fpage>509</fpage>
<lpage>514</lpage>
<history>
<date date-type="received">
<day>31</day>
<month>10</month>
<year>2017</year>
</date>
<date date-type="accepted">
<day>18</day>
<month>1</month>
<year>2018</year>
</date>
</history>
<permissions>
<copyright-statement>© The Author(s) 2018</copyright-statement>
<license license-type="OpenAccess">
<license-p>
<bold>Open Access</bold>
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.</license-p>
</license>
</permissions>
<abstract id="Abs1">
<sec>
<title>Purpose</title>
<p id="Par1">Open Source Intelligence (OSINT) and Signals Intelligence (SIGINT) from the clandestine intelligence sector are being increasingly employed in infectious disease outbreaks. The purpose of this article is to explore how such tools might be employed in the detection, reporting, and control of outbreaks designated as a ‘threat’ by the global community. It is also intended to analyse previous use of such tools during the Ebola and SARS epidemics and to discuss key questions regarding the ethics and legality of initiatives that further blur the military and humanitarian spaces.</p>
</sec>
<sec>
<title>Methods</title>
<p id="Par2">We undertake qualitative analysis of current discussions on OSINT and SIGINT and their intersection with global health. We also review current literature and describe the debates. We built on quantitative and qualitative research done into current health collection capabilities.</p>
</sec>
<sec>
<title>Results</title>
<p id="Par3">This article presents an argument for the use of OSINT in the detection of infectious disease outbreaks and how this might occur.</p>
</sec>
<sec>
<title>Conclusion</title>
<p id="Par4">We conclude that there is a place for OSINT and SIGINT in the detection and reporting of outbreaks. However, such tools are not sufficient on their own and must be corroborated for the intelligence to be relevant and actionable. Finally, we conclude that further discussion on key ethical issues needs to take place before such research can continue. In particular, this involves questions of jurisdiction, data ownership, and ethical considerations.</p>
</sec>
</abstract>
<kwd-group xml:lang="en">
<title>Keywords</title>
<kwd>Epidemics</kwd>
<kwd>Intelligence</kwd>
<kwd>Global health</kwd>
<kwd>OSINT</kwd>
<kwd>SIGINT</kwd>
</kwd-group>
<funding-group>
<award-group>
<funding-source>
<institution>King's College London</institution>
</funding-source>
</award-group>
</funding-group>
<custom-meta-group>
<custom-meta>
<meta-name>issue-copyright-statement</meta-name>
<meta-value>© Springer-Verlag GmbH Germany, part of Springer Nature 2018</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec id="Sec1">
<title>Introduction</title>
<p id="Par5">Infectious disease outbreaks—SARS, MERS, Ebola—have increasingly come to be designated as potent threats to the international community under the escalating global health security agenda (Smith
<xref ref-type="bibr" rid="CR26">2017</xref>
). Interconnected trade, low-cost air travel and increasing population mobility continue to make infectious disease outbreaks an issue of significant concern to the global community (Wenham
<xref ref-type="bibr" rid="CR28">2016</xref>
).</p>
<p id="Par6">Here we explore the extent to which tools and concepts of national intelligence services might aid the detection and control of infectious disease outbreaks. We explore the potential overlap between techniques used by national intelligence services and those used for infectious disease detection, particularly with regard to analysis of Open Source Intelligence, and we consider the ethical implications in blending civilian and military methodology in the context of global health.</p>
</sec>
<sec id="Sec2">
<title>Open source intelligence (OSINT)</title>
<p id="Par7">Open Source Intelligence is defined by the US Department of Defence (DoD) as ‘produced from publicly available information…’ (National Defence Authorisation Act for Fiscal Year
<xref ref-type="bibr" rid="CR15">2006</xref>
). It is a wide definition that encompasses any source openly available and includes media sources that can be accessed instantly, with potential use in outbreak alerts. OSINT is currently in use globally in certain surveillance systems and forms the foundation of many public intelligence capabilities. The public health community has begun to recognise the scope of these services, and many projects currently exist that explore how OSINT might help identify and monitor diseases that constitute a Public Health Emergency of International Concern (PHEIC) (World Health Organisation
<xref ref-type="bibr" rid="CR29">2008</xref>
).</p>
<p id="Par8">The World Health Organisation (WHO) operates a programme to assist in the collection and assessment of OSINT in disease intelligence. The Global Public Health Intelligence Network (GPHIN) is a crucial part of a larger platform developed by the WHO named the Hazard Detection and Risk Assessment System (HDRAS), which uses web-based epidemic intelligence tools and collects information from Medisys, GPHIN, Healthmap, and Promed-mail, amongst others. GPHIN is a semi-automated early warning system that continuously scans global media sources in nine languages, searching for key words, phrases, and any potential signs of disease outbreaks (Mawadeku
<xref ref-type="bibr" rid="CR21">2007</xref>
). It has the capacity to generate between 2000 and 4000 daily reports and produce alerts automatically.</p>
<p id="Par9">OSINT tools applied to health surveillance, such as GPHIN, are able to automatically collect and collate data, thereby referencing much larger quantities of information. Algorithms are used to filter relevant reports. GPHIN, ProMED, and HealthMap have been able to provide alerts on some of the most serious outbreaks since the turn of the century. By evaluating content from Chinese media and low-level chatter, (Lerbinger
<xref ref-type="bibr" rid="CR19">2012</xref>
), ProMED provided the first English language alert of SARS and even ‘prompted’ subsequent confirmation by the Chinese Government (Milinovich et al.
<xref ref-type="bibr" rid="CR22">2015</xref>
). Some signs for the recent Ebola outbreak were detected by HealthMap before any official announcement because of its ability to scan news stories in the local language (Milinovich et al.
<xref ref-type="bibr" rid="CR22">2015</xref>
).</p>
<p id="Par10">Public health surveillance is also exploring the exploitation of Social Media Intelligence (SOCMINT). SOCMINT uses the growing proliferation of social media and web forums globally to provide contemporaneous information on a specified topic or theme. The geographic availability of SOCMINT is less limited than that of OSINT: while traditional internet coverage rates in many areas of the world are low, mobile data coverage in these regions is growing. The most popular services accessed through mobile data are often social media sites. In these instances, Facebook is often used for news and has potential to deliver more raw information than traditional publishing sources.</p>
<p id="Par11">Digital Disease Detection (DDD, also known as digital disease surveillance) has already been used in many ways in the field of epidemiology—in the creation of the public health systems mentioned above, but also in time series analysis for investigation of the period preceding the outbreak, and for assessing public sentiment regarding the perceived impact of a disease and the proportionality of government or health service response (Salathé et al.
<xref ref-type="bibr" rid="CR25">2013</xref>
). Many initiatives have attempted to demonstrate the potential of search-term surveillance. This technique exploits data on searches made by members of the public to compile trend data based on keywords. Most significantly, in 2008 Google launched Google Flu Trends (GFT), an attempt to aggregate data based on the volume of public searches for keywords related to influenza and to use this to predict when an outbreak might occur (Cook et al.
<xref ref-type="bibr" rid="CR8">2011</xref>
). The principle behind this was that when people are ill with an influenza-like illness (ILI), they search for keywords relating to an influenza-like illness. However, in a review in 2014, researchers identified that GFT had a trend of results corresponding with ILINet—the US surveillance programme for ILI—for 2 to 3 years before deviating in a spectacular way, for example missing the flu season in 2013 by 140% (Lazer et al.
<xref ref-type="bibr" rid="CR18">2013</xref>
).</p>
<p id="Par12">The failure of GFT highlights one of the greatest limitations in the use of OSINT—that any information must be assessed before it can be turned into intelligence. Although we are now able to exploit algorithms to extract statistically important information from unstructured data sets, such information must still be assessed by analysts and researchers. A large data set is no use unless we are querying it properly, and this holds true for any repository of information regarding public health. For example, in a crisis situation Non-Governmental Organisations (NGOs) do not necessarily need full satellite images of a disaster zone, and to provide them with such would create more work going through them. What they do need is the specific information that these images can show, such as damage to infrastructure and population movements (Clunan
<xref ref-type="bibr" rid="CR7">2006</xref>
). OSINT used on its own is therefore not sufficient; it must be corroborated from other sources and agents (Hulnick
<xref ref-type="bibr" rid="CR14">2002</xref>
). GPHIN and similar systems will suffer from the distortion created by the heuristic availability. Additionally, just because multiple news sources publish or report on an event does not verify either its accuracy or its authenticity—OSINT must be verified against other information (Pallaris
<xref ref-type="bibr" rid="CR24">2008</xref>
). This is especially true for infectious diseases that require laboratory verification (World Health Organisation
<xref ref-type="bibr" rid="CR30">2014</xref>
). As the ‘quality of information is [not] controlled… rumours [may] prove to be unsubstantiated’ (Grein
<xref ref-type="bibr" rid="CR13">2000</xref>
). GFT’s initial algorithm had a high rate of failure due to overfitting of unrelated search terms. A review of biosurveillance systems found that GPHIN combined with human moderation improves detection rates by 53%, reinforcing the importance of human factors despite technological advances (Barboza et al.
<xref ref-type="bibr" rid="CR2">2014</xref>
). Such systems must still be used in conjunction with physical verification teams to add real value, since limitations remain in the rapid reporting of outbreaks as they unfold.</p>
<p id="Par13">Such are the limitations of big data. Similarly, OSINT utilised in this manner has a number of limitations. First, pertinent pieces of information can often be lost amongst the background noise of the internet because of the sheer quantity of data available. Indeed, one of the greatest issues with OSINT is that there can be so much data that deriving analytics becomes difficult (Hulnick
<xref ref-type="bibr" rid="CR14">2002</xref>
). Indeed, GPHIN was unable to verify over 30% of its total reports in 2002, despite generating the highest number of potential alerts that year in comparison to other reporting methods (Birnbaum
<xref ref-type="bibr" rid="CR3">2013</xref>
).</p>
<p id="Par14">While the exploitation of new sources of intelligence is critical in the adaptation of public health surveillance, we must consider the techniques that intelligence services use to make information relevant and actionable. The most significant change is the move from static to active data and mapping. Such techniques have been used by the military since generals could push representative carved pieces across maps, but active open source intelligence allows for a near contemporary representation that can be used in operational planning. Both the advantages and disadvantages of such techniques were demonstrated in the use of crisis mapping during the earthquake in Haiti in 2010 (Zook et al.
<xref ref-type="bibr" rid="CR31">2010</xref>
). While the map acted as a way of mapping incidents and needs, including medical needs, and translating these to aid workers in a way that allowed them to specifically address the crisis, the variety of sources, the incompatibility of data platforms, and the sheer amount of information overwhelmed aid workers, hindering relief organisation efforts as well as helping (Gao et al.
<xref ref-type="bibr" rid="CR11">2011</xref>
). More recent iterations of crisis mappings have improved upon this: by the time the Standby Volunteer Task Force (SBTF) were deployed to provide crisis mapping assistance in the Libyan Conflict in February 2011, clearer intelligence pathways had been created in advance and included open and closed versions of the map to protect sources (United Nations Office for the Coordination of Humanitarian Affairs
<xref ref-type="bibr" rid="CR27">2011</xref>
).</p>
<p id="Par15">Such techniques have not yet been replicated in the case of pandemics or PHEICs. HealthMap comes the closest, but what differentiates HealthMap from current crisis mapping is that crisis mapping is activated once a crisis has been declared, and volunteers have a defined set of criteria to monitor. This makes it much easier to cut through the noise of information. HealthMap captures information globally, meaning that it remains difficult to separate events that have the potential to become critical from more endemic cases. Sharper data collection, an intelligence cycle, and established intelligence pathways are all tools that must be explored with regard to the use of contemporaneous crisis mapping in infectious disease. Given that health and humanitarian crises are increasingly overlapping, the use of the framework created by the SBTF for crisis mapping during humanitarian events is something that merits further exploration.</p>
<p id="Par16">However, in creating such maps, and particularly in the exploitation of search engine data, we must consider that it is difficult to implement OSINT in low-middle income countries [LMICs]. These resource-poor settings, particularly fragile and post-conflict settings, are often geographically the most likely sources of outbreaks designated as health security threats; yet, their communications infrastructure and digital presence are often limited (Eysenbach
<xref ref-type="bibr" rid="CR9">2003</xref>
). OSINT tools like GPHIN and HealthMap have a ‘clear bias towards countries with higher numbers of media outlets…and greater availability of electronic communication infrastructure’ (Brownstein et al.
<xref ref-type="bibr" rid="CR6">2008</xref>
). A technical officer at the WHO confirmed this as the biggest limitation to using OSINT in disease surveillance.
<xref ref-type="fn" rid="Fn1">1</xref>
</p>
<p id="Par18">Finally, the ethics around using social media intelligence remain contested. Particularly in the case of infectious disease outbreaks that have previously been used as proxy methods to victimise or discriminate against a portion of a population, there is a high risk of contributing to such discrimination if the sources are made public. This was demonstrated when internet users identified the wrong suspects after the Boston Marathon bombings in 2013, which led to an innocent student being identified and victimised. Furthermore, social media is continually redefining our concepts of personal and private. Although information shared on social networking sites such as FaceBook may be public, we still expect a contextual degree of privacy and it is as yet unclear under which circumstances such expectations may be set aside in the name of public health (Bradwell
<xref ref-type="bibr" rid="CR5">2010</xref>
). Such concerns could be alleviated by asking for consent, but again we risk an availability bias in that those with a digital presence are most likely to come from the countries with lower likelihoods of infectious disease outbreaks designated as health security threats. Prior to any systematic exploitation of such data we therefore need to consider carefully a framework under which we can do so (Omand et al.
<xref ref-type="bibr" rid="CR23">2012</xref>
).</p>
</sec>
<sec id="Sec3">
<title>Signals intelligence (SIGINT)</title>
<p id="Par19">The intelligence technique that is least commonly used in infectious disease surveillance is Signals Intelligence (SIGINT). Signals Intelligence is the collection of communication data, often through telephone and email interception. It can also encompass internet metadata and location data. Due to the sensitive nature of SIGINT, legal collection is most often undertaken by national intelligence agencies and law enforcement, who may either target specific individuals or collect data in bulk, where it is appropriate to do so. Programmes such as the US National Security Agency’s PRISM and X-Keyscore, or the British Government Communications Headquarters GCHQ’s Tempora, are now known to be able to collect communications data on a mass scale through the interception of internet servers, satellites, fibre-optic cables, telephone systems and personal computers (Greenwald
<xref ref-type="bibr" rid="CR12">2015</xref>
).</p>
<p id="Par20">Various proposals have been made for the employment of SIGINT as a tool in outbreak surveillance, including the collection of mass communication data. Algorithms could be used to identify alerts of potential disease outbreaks by applying search conditions to pre-existing data sets or data collection parameters. Expanding extant collection programmes to include targeted global health priorities would then provide alerts for human operators to analyse and validate—adding to Early Warning and Response and detecting diseases early. Other proposals suggest that SIGINT may be of use in contact tracing—identification and diagnosis of people who may have come into contact with an infected person.</p>
<p id="Par21">However, there are many problems relating to the use of SIGINT in infectious disease surveillance. First and foremost are the ethical and legal issues, particularly in a post-Snowden era where bulk data collection is a politically sensitive topic. Greenwald believes privacy is the biggest issue with SIGINT, as millions of ordinary people are subjected to severe breaches of privacy through their communications being intercepted with little accountability (Greenwald
<xref ref-type="bibr" rid="CR12">2015</xref>
). Other such studies have raised similar concerns (Freifeld et al.
<xref ref-type="bibr" rid="CR10">2010</xref>
). Using national intelligence capabilities in this context would be unpalatable for many, and it is unlikely that surveillance would meet the thresholds for necessity and proportionality that would balance out a high risk of collateral intrusion. In the contexts that SIGINT could be practically deployed, the value added to disease surveillance would be minimal since high-income countries already maintain strong disease surveillance systems within their national boundaries. Further, privacy breaches of this kind have unknown effects as they play out in health and human domains in complex geo-political settings. There are also further questions about what would happen to the data after it has been collected and whether it could be used by host governments to discriminate against groups within a population.</p>
<p id="Par22">The use of SIGINT is governed by national legislation, and any additional collection would be constrained by this legal framework. These surveillance programmes are highly contentious: GCHQ has been challenged in the European Court of Human Rights (ECHR) over its collection under the Data Retention and Investigatory Powers Act 2014, and the NSA has faced significant criticisms in the aftermath of Snowden. Widespread deployment of SIGINT therefore necessitates the implementation of a legal process allowing for oversight by a relevant authority. Governance of this kind within the field of global health might be expected to take place within the WHO or other organisations of the UN system, however given the highly sensitive nature of the associated technologies, sources, and strategies, it seems unlikely that nation states will divest in these sensitive operational programmes as part of an initiative for international collaboration.</p>
<p id="Par23">Furthermore there is no precedent, either practical or legal, as to how modern SIGINT technology could be used to target health risks in other countries. Detailed information on SIGINT is problematic to access, and it is therefore difficult to quantify the thresholds of defined threat that an infectious disease or PHEIC would have to meet to legally and ethically legitimate its use. The practical outputs and uses of SIGINT are therefore unclear as there is an inherent Catch 22 in its deployment. To anticipate an outbreak of an infectious disease, such monitoring would have to be done continuously to gather the data in a timely fashion; however, without the justification of an extant pandemic it is unlikely that an infectious disease will meet legal thresholds. In the case that a pandemic has already been declared, just cause is more likely, but comes too late. Furthermore, both public health surveillance and nation state surveillance should be focused on outcomes or objectives: without a clear goal there is no justification for mass data collection.</p>
<p id="Par24">Finally, SIGINT is extremely costly in terms of resources, and it is questionable whether the value added to disease surveillance would indeed render it cost-effective. Due to the volume of information encompassed within SIGINT, significant human resources are required to assist in making SIGINT data into actionable intelligence (Aid
<xref ref-type="bibr" rid="CR1">2003</xref>
). GCHQ’s current programme requires over 300 analysts to filter through the data, and this cost can only increase, as the volume of electronic communications continues to expand (MacAskill et al.
<xref ref-type="bibr" rid="CR20">2013</xref>
). With competing nation-state priorities requiring the use of SIGINT, its application within global health may not be considered enough of a significant ‘threat’. As with OSINT, it may also bias a global north that is more technically capable.</p>
<p id="Par25">There exists here a tension between the domains of intelligence and global health since both fields are governed by alternative paradigms that weigh human and security priorities by differing scales. The field of global health, motivated by equity, transparency, and collaboration, may find the employment of mass covert surveillance and dissemination between competing nation states an unacceptable tradeoff in the search for productive disease data (Koplan et al.
<xref ref-type="bibr" rid="CR17">2009</xref>
). It is clear that the dominating concept of ‘threats’ as they relate to disease entities is an unresolved debate within the field of global health and certainly between intelligence services and global health professionals (Bowsher et al.
<xref ref-type="bibr" rid="CR4">2016</xref>
). The global health security agenda has gained traction over recent years in the unfolding of SARS, Ebola, and Zika, yet this trend has received criticism also for signalling a departure from human-centred ethics towards a potentially discriminatory system prioritising the strategic priorities of the richest nations within the global health arena (Kickbusch et al. 
<xref ref-type="bibr" rid="CR16">2015</xref>
). At the very least it is evident that ‘security’ is not a synonymous term within these communities, nor that it is clearly in either domain’s best operational interests to more closely align their respective meanings.</p>
</sec>
<sec id="Sec4">
<title>Conclusion</title>
<p id="Par26">It is clear that intelligence tools certainly could play a significant role in infectious disease outbreaks that are thought to threaten national and international security, through both public reporting and organisational analysis. The complex issue of when and how to utilise ‘clandestine’ national intelligence capabilities for global public good must now be a serious question given that these technologies exist and are already being put to use. The WHO has already deployed OSINT successfully and it seems likely that these tools will only expand in usage and sensitivity. Intelligence tools are not, however, sufficient on their own and can be used only to detect the presence of disease “chatter” and surrounding dynamics, while laboratory verification is needed to diagnose disease as it occurs in situ and health professionals to tackle the human and population components of care as outbreaks unfold.</p>
<p id="Par27">Many questions are suggested from our analysis. First, the questions surrounding Civil-Military (CIMIC) cooperation cannot be avoided. Much of the technological and analytical expertise and equipment needed are those only used by the military and national intelligence services, while clinical expertise is almost exclusively cemented in international and national health systems. CIMIC is currently hotly debated, and such issues are certain to resurface here. For example, should epidemiologists become part of intelligence services? Do intelligence services outsource some of their technologies to medical specialists? These are crucial questions that must be addressed in future research. Furthermore, how would this work both structurally and legally? To what extent do infectious diseases meet the threshold of national security needed for them to sequester military and intelligence service resources and techniques and to what extent would this put the global health community at odds with advocates of human rights? It may be that intelligence tools offer only a substitute for alternative tools of health surveillance that avoid the ethical and practical dilemmas provided by covert bulk data collection. One such option employed in outbreak scenarios has been the use of anthropological methods and professionals within global health organisations based on the ground, mapping outbreaks in real-time (Ebola Response Anthropology Platform). Of course such programmes operate with their own resource constraints and limitations, but they serve to demonstrate that growing intelligence capabilities offer only part of a diversity of disease surveillance options.</p>
<p id="Par28">Finally, since most infectious disease outbreaks are global, or transnational, they are therefore to a certain extent outside of a national jurisdiction. The question of governance remains at the forefront of concerns. Should extant intelligence technologies be divested to WHO? Do such operations fall within the remit of a foreign intelligence service of a high-income country, and if so, what accountability measures would be required? All of these questions are crucial to this discussion. We have provided an exploratory analysis of some intelligence techniques and how they could be applied to disease detection and reporting. It is hoped that this can provide the foundation for further in-depth study and debate into this under-researched, sensitive, yet enormously important field in global health.</p>
</sec>
</body>
<back>
<fn-group>
<fn id="Fn1">
<label>1</label>
<p id="Par17">Anon. Interview with Technical Officer, Department of Global Capacities Alert and Response, World Health Organisation, (28 May 2015)</p>
</fn>
</fn-group>
<notes notes-type="funding-information">
<title>Funding</title>
<p>This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.</p>
</notes>
<notes notes-type="COI-statement">
<sec id="FPar1">
<title>Conflict of interest</title>
<p>The authors declare they have no conflicts of interest.</p>
</sec>
<sec id="FPar2">
<title>Ethical approval</title>
<p>This article does not contain any studies with human participants or animals performed by any of the authors.</p>
</sec>
<sec id="FPar3">
<title>Declaration of competing interests</title>
<p>The authors declare that they have no competing interests.</p>
</sec>
</notes>
<ref-list id="Bib1">
<title>References</title>
<ref id="CR1">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Aid</surname>
<given-names>M</given-names>
</name>
</person-group>
<article-title>All Glory is Fleeting: SIGINT and the Fight Against International Terrorism</article-title>
<source>Intell Natl Secur</source>
<year>2003</year>
<volume>18</volume>
<fpage>72</fpage>
<lpage>120</lpage>
<pub-id pub-id-type="doi">10.1080/02684520310001688880</pub-id>
</element-citation>
</ref>
<ref id="CR2">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Barboza</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Vaillant</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Le Strat</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Hartley</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Nelson</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Madudeku</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Madoff</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Linge</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Collier</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Brownstein</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Astagneau</surname>
<given-names>P</given-names>
</name>
</person-group>
<article-title>Factors influencing performance of internet-based biosurveillance systems used in epidemic intelligence of early detection of infectious diseases outbreaks</article-title>
<source>PLoS One</source>
<year>2014</year>
<volume>9</volume>
<fpage>90536</fpage>
<pub-id pub-id-type="doi">10.1371/journal.pone.0090536</pub-id>
</element-citation>
</ref>
<ref id="CR3">
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Birnbaum</surname>
<given-names>J</given-names>
</name>
</person-group>
<person-group person-group-type="editor">
<name>
<surname>Mordini</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Green</surname>
<given-names>M</given-names>
</name>
</person-group>
<article-title>Public Health, Intelligence and National Security</article-title>
<source>Internet-based Intelligence in Public Health Emergencies: Early Detection and Response in Disease Outbreak Crises</source>
<year>2013</year>
<publisher-loc>Amsterdam</publisher-loc>
<publisher-name>IOS Press</publisher-name>
</element-citation>
</ref>
<ref id="CR4">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bowsher</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Milner</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Sullivan</surname>
<given-names>R</given-names>
</name>
</person-group>
<article-title>Medical intelligence, security and global health: the foundations of a new health agenda</article-title>
<source>J R Soc Med</source>
<year>2016</year>
<volume>109</volume>
<fpage>269</fpage>
<lpage>273</lpage>
<pub-id pub-id-type="doi">10.1177/0141076816656483</pub-id>
<pub-id pub-id-type="pmid">27385714</pub-id>
</element-citation>
</ref>
<ref id="CR5">
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Bradwell</surname>
<given-names>P</given-names>
</name>
</person-group>
<source>Private lives: a people’s inquiry into personal information</source>
<year>2010</year>
<publisher-loc>London</publisher-loc>
<publisher-name>Demos</publisher-name>
</element-citation>
</ref>
<ref id="CR6">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Brownstein</surname>
<given-names>JS</given-names>
</name>
<name>
<surname>Freifeld</surname>
<given-names>CC</given-names>
</name>
<name>
<surname>Reis</surname>
<given-names>BT</given-names>
</name>
<name>
<surname>Mandl</surname>
<given-names>KD</given-names>
</name>
</person-group>
<article-title>Surveillance sans Frontieres: internet-based emerging infectious disease intelligence and the HealthMap project</article-title>
<source>PLoS Med</source>
<year>2008</year>
<volume>5</volume>
<fpage>e151</fpage>
<pub-id pub-id-type="doi">10.1371/journal.pmed.0050151</pub-id>
<pub-id pub-id-type="pmid">18613747</pub-id>
</element-citation>
</ref>
<ref id="CR7">
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Clunan</surname>
<given-names>C</given-names>
</name>
</person-group>
<source>Civil-military medicine: on dangerous ground</source>
<year>2006</year>
<publisher-loc>Calhough</publisher-loc>
<publisher-name>The Naval Postgraduate School Institutional Archive, US</publisher-name>
</element-citation>
</ref>
<ref id="CR8">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cook</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Conrad</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Fowlkes</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Mohebbi</surname>
<given-names>M</given-names>
</name>
</person-group>
<article-title>Assessing Google flue trends performance in the United States during the 2009 influenza virus a (H1N1) pandemic</article-title>
<source>PLoS One</source>
<year>2011</year>
<volume>6</volume>
<fpage>e23610</fpage>
<pub-id pub-id-type="doi">10.1371/journal.pone.0023610</pub-id>
<pub-id pub-id-type="pmid">21886802</pub-id>
</element-citation>
</ref>
<ref id="CR9">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Eysenbach</surname>
<given-names>G</given-names>
</name>
</person-group>
<article-title>SARS and population health technology</article-title>
<source>J Med Internet Res</source>
<year>2003</year>
<volume>5</volume>
<fpage>e14</fpage>
<pub-id pub-id-type="doi">10.2196/jmir.5.2.e14</pub-id>
<pub-id pub-id-type="pmid">12857670</pub-id>
</element-citation>
</ref>
<ref id="CR10">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Freifeld</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Chunara</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Mekaru</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Chan</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Kass-Hout</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Ayala Iacucci</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Brownstein</surname>
<given-names>J</given-names>
</name>
</person-group>
<article-title>Participatory epidemiology: use of mobile phones for community-based health reporting</article-title>
<source>PLoS Med</source>
<year>2010</year>
<volume>7</volume>
<fpage>e1000376</fpage>
<pub-id pub-id-type="doi">10.1371/journal.pmed.1000376</pub-id>
<pub-id pub-id-type="pmid">21151888</pub-id>
</element-citation>
</ref>
<ref id="CR11">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gao</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Barbier</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Goolsby</surname>
<given-names>R</given-names>
</name>
</person-group>
<article-title>Harnessing the Crowdsourcing power of social Media for Disaster Relief</article-title>
<source>IEEE Intell Syst</source>
<year>2011</year>
<volume>26</volume>
<fpage>10</fpage>
<lpage>14</lpage>
<pub-id pub-id-type="doi">10.1109/MIS.2011.52</pub-id>
</element-citation>
</ref>
<ref id="CR12">
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Greenwald</surname>
<given-names>G</given-names>
</name>
</person-group>
<source>No place to hide</source>
<year>2015</year>
<publisher-loc>London</publisher-loc>
<publisher-name>Hamish Hamilton</publisher-name>
</element-citation>
</ref>
<ref id="CR13">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Grein</surname>
<given-names>T</given-names>
</name>
</person-group>
<article-title>Rumors of Disease in the Global Village: Outbreak Verification</article-title>
<source>Emerg Infect Dis</source>
<year>2000</year>
<volume>6</volume>
<fpage>97</fpage>
<lpage>102</lpage>
<pub-id pub-id-type="doi">10.3201/eid0602.000201</pub-id>
<pub-id pub-id-type="pmid">10756142</pub-id>
</element-citation>
</ref>
<ref id="CR14">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hulnick</surname>
<given-names>A</given-names>
</name>
</person-group>
<article-title>The downside of open source intelligence</article-title>
<source>Int J Intell Counterintell</source>
<year>2002</year>
<volume>15</volume>
<fpage>565</fpage>
<lpage>579</lpage>
<pub-id pub-id-type="doi">10.1080/08850600290101767</pub-id>
</element-citation>
</ref>
<ref id="CR15">
<mixed-citation publication-type="other">H.R. 1815 (109th): National Defense Authorization Act for Fiscal Year 2006. United States. Available at
<ext-link ext-link-type="uri" xlink:href="https://www.govtrack.us/congress/bills/109/hr1815/text">https://www.govtrack.us/congress/bills/109/hr1815/text</ext-link>
. Last accessed 01 February 2018</mixed-citation>
</ref>
<ref id="CR16">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kickbusch</surname>
<given-names>I</given-names>
</name>
<name>
<surname>Orbinski</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Winkler</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Schnabel</surname>
<given-names>A</given-names>
</name>
</person-group>
<article-title>We need a sustainable development goal 18 on global health security</article-title>
<source>Lancet</source>
<year>2015</year>
<volume>385</volume>
<fpage>1069</fpage>
<pub-id pub-id-type="doi">10.1016/S0140-6736(15)60593-1</pub-id>
<pub-id pub-id-type="pmid">25797551</pub-id>
</element-citation>
</ref>
<ref id="CR17">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Koplan</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Bond</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Merson</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Reddy</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Rodriguez</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Sewankambo</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Wasserheit</surname>
<given-names>J</given-names>
</name>
</person-group>
<article-title>Towards a common definition of global health</article-title>
<source>Lancet</source>
<year>2009</year>
<volume>373</volume>
<fpage>1993</fpage>
<lpage>1995</lpage>
<pub-id pub-id-type="doi">10.1016/S0140-6736(09)60332-9</pub-id>
<pub-id pub-id-type="pmid">19493564</pub-id>
</element-citation>
</ref>
<ref id="CR18">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lazer</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Kennedy</surname>
<given-names>R</given-names>
</name>
<name>
<surname>King</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Vespigiani</surname>
<given-names>A</given-names>
</name>
</person-group>
<article-title>The Parable of google flu: traps in big data analysis</article-title>
<source>Science</source>
<year>2014</year>
<volume>343</volume>
<fpage>1203</fpage>
<lpage>1205</lpage>
<pub-id pub-id-type="doi">10.1126/science.1248506</pub-id>
<pub-id pub-id-type="pmid">24626916</pub-id>
</element-citation>
</ref>
<ref id="CR19">
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Lerbinger</surname>
<given-names>O</given-names>
</name>
</person-group>
<source>The crisis manager</source>
<year>2012</year>
<publisher-loc>New York</publisher-loc>
<publisher-name>Routledge</publisher-name>
</element-citation>
</ref>
<ref id="CR20">
<mixed-citation publication-type="other">MacAskill E, Hopkins N, Davies N, Ball J (2013) How does GCHQ’s internet surveillance work. The Guardian. Available at
<ext-link ext-link-type="uri" xlink:href="http://www.theguardian.com/uk/2013/jun/21/how-does-gchq-internet-surveillance-work">http://www.theguardian.com/uk/2013/jun/21/how-does-gchq-internet-surveillance-work</ext-link>
. Accessed 1 Feb 2018</mixed-citation>
</ref>
<ref id="CR21">
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Mawadeku</surname>
<given-names>A</given-names>
</name>
</person-group>
<person-group person-group-type="editor">
<name>
<surname>Lemon</surname>
<given-names>S</given-names>
</name>
</person-group>
<article-title>Global Public Health Surveillance: The Role of Nontraditional Surveillance Tools</article-title>
<source>Global Infectious Disease Surveillance and Detection: Assessing the Challenges - Finding Solutions</source>
<year>2007</year>
<publisher-loc>Washington D.C</publisher-loc>
<publisher-name>National Academies Press</publisher-name>
</element-citation>
</ref>
<ref id="CR22">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Milinovich</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Magalhães</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>W</given-names>
</name>
</person-group>
<article-title>Rolse of big data in the early detection of Ebola and other emerging infectious diseases</article-title>
<source>Lancet Glob Health</source>
<year>2015</year>
<volume>3</volume>
<fpage>e20</fpage>
<lpage>e21</lpage>
<pub-id pub-id-type="doi">10.1016/S2214-109X(14)70356-0</pub-id>
<pub-id pub-id-type="pmid">25539964</pub-id>
</element-citation>
</ref>
<ref id="CR23">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Omand</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Barlett</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Miller</surname>
<given-names>C</given-names>
</name>
</person-group>
<article-title>Introducing social media intelligence (SOCMINT)</article-title>
<source>Intell Natl Secur</source>
<year>2012</year>
<volume>27</volume>
<fpage>801</fpage>
<lpage>823</lpage>
<pub-id pub-id-type="doi">10.1080/02684527.2012.716965</pub-id>
</element-citation>
</ref>
<ref id="CR24">
<mixed-citation publication-type="other">Pallaris C (2008) Open source intelligence: a strategic enabler of nation security. Centre of Security Studies 3. Available at:
<ext-link ext-link-type="uri" xlink:href="http://www.css.ethz.cg/content/dam/ethz/special-interest/gess/cis/center-for-security-studies/pdf/CSS-Analyses-32.pdf">http://www.css.ethz.cg/content/dam/ethz/special-interest/gess/cis/center-for-security-studies/pdf/CSS-Analyses-32.pdf</ext-link>
. Accessed 24 Oct. 2017</mixed-citation>
</ref>
<ref id="CR25">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Salathé</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Freifeld</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Mekaru</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Tomasulo</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Brownstein</surname>
<given-names>J</given-names>
</name>
</person-group>
<article-title>Influenza a (H7N9) and the importance of digital epidemiology</article-title>
<source>N Engl J Med</source>
<year>2013</year>
<volume>369</volume>
<fpage>401</fpage>
<lpage>404</lpage>
<pub-id pub-id-type="doi">10.1056/NEJMp1307752</pub-id>
<pub-id pub-id-type="pmid">23822655</pub-id>
</element-citation>
</ref>
<ref id="CR26">
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Smith</surname>
<given-names>M</given-names>
</name>
</person-group>
<source>International security</source>
<year>2017</year>
<publisher-loc>Basingstoke</publisher-loc>
<publisher-name>Palgrave Macmillan</publisher-name>
</element-citation>
</ref>
<ref id="CR27">
<mixed-citation publication-type="other">United Nations Office for the Coordination of Humanitarian Affairs (2011) Libya Crisis Map Deployment [online]. Available at:
<ext-link ext-link-type="uri" xlink:href="https://docs.google.com/file/d/0By08EjY3-T3RR0FqV11zRldveE0/edit">https://docs.google.com/file/d/0By08EjY3-T3RR0FqV11zRldveE0/edit</ext-link>
. Accessed 24 Oct 2017</mixed-citation>
</ref>
<ref id="CR28">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wenham</surname>
<given-names>C</given-names>
</name>
</person-group>
<article-title>Digitalising disease surveillance: the global safety net</article-title>
<source>Glob Health Gov</source>
<year>2016</year>
<volume>10</volume>
<fpage>124</fpage>
<lpage>137</lpage>
</element-citation>
</ref>
<ref id="CR29">
<element-citation publication-type="book">
<person-group person-group-type="author">
<collab>World Health Organisation</collab>
</person-group>
<source>International health regulations</source>
<year>2008</year>
<publisher-loc>Geneva</publisher-loc>
<publisher-name>WHO</publisher-name>
</element-citation>
</ref>
<ref id="CR30">
<element-citation publication-type="book">
<person-group person-group-type="author">
<collab>World Health Organisation</collab>
</person-group>
<source>Early detection, assessment and response to acute public health events: implementation of early warning and response with a focus on even based surveillance</source>
<year>2014</year>
<publisher-loc>Geneva</publisher-loc>
<publisher-name>WHO</publisher-name>
</element-citation>
</ref>
<ref id="CR31">
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zook</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Graham</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Shelton</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Gorman</surname>
<given-names>S</given-names>
</name>
</person-group>
<article-title>Volunteered geographic information and Crowdsourced disaster relief: a case study of the Haitian earthquake</article-title>
<source>World Med Health Policy</source>
<year>2010</year>
<volume>2</volume>
<fpage>7</fpage>
<lpage>33</lpage>
<pub-id pub-id-type="doi">10.2202/1948-4682.1069</pub-id>
</element-citation>
</ref>
</ref-list>
</back>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Sante/explor/SrasV1/Data/Pmc/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000507 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd -nk 000507 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Sante
   |area=    SrasV1
   |flux=    Pmc
   |étape=   Corpus
   |type=    RBID
   |clé=     PMC:6153980
   |texte=   Intelligence and global health: assessing the role of open source and social media intelligence analysis in infectious disease outbreaks
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/RBID.i   -Sk "pubmed:30294522" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd   \
       | NlmPubMed2Wicri -a SrasV1 

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Apr 28 14:49:16 2020. Site generation: Sat Mar 27 22:06:49 2021