{"id":690,"date":"2025-03-11T15:14:00","date_gmt":"2025-03-11T14:14:00","guid":{"rendered":"https:\/\/eosgmbh.com\/?p=690"},"modified":"2025-03-25T08:35:12","modified_gmt":"2025-03-25T07:35:12","slug":"admiralty-code-for-the-verification-of-information","status":"publish","type":"post","link":"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/","title":{"rendered":"Admiralty code for the verification of information"},"content":{"rendered":"<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column blogcontent is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:710px\">\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Management_Summary\"><\/span>Management Summary<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The <em>Admiralty Code<\/em> is a proven system for evaluating information sources that was originally developed for military intelligence and is now used in areas such as journalism, science and cyber security. It consists of two dimensions: the credibility of the source (A-F) and the reliability of the information (1-6). Despite its advantages, the code has some challenges, including subjectivity and limited adaptation to modern digital media. Further development could be achieved through AI-supported verification systems. | <em>Reading time: approx. 12 minutes | Authors: Carsten Reffgen &amp; Niclas Felber<\/em><\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Management_Summary\">Management Summary<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Einleitung\">Introduction<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Historischer_Hintergrund_des_Admiralty_Code\">Historical background of the Admiralty Code<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Struktur_und_Methodik_des_Admiralty_Code\">Structure and methodology of the Admiralty Code<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Bewertung_der_Quelle_A%E2%80%93F\">Evaluation of the source (A-F)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Bewertung_der_Information_1%E2%80%936\">Evaluation of the information (1-6)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Anwendungsbereiche_und_praktische_Nutzung\">Areas of application and practical use<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Nachrichtendienste_und_Geheimdienstanalysen\">Intelligence services and intelligence analysis<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Journalismus_und_Medienkompetenz\">Journalism and media competence<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Wissenschaftliche_Forschung_und_akademische_Zitationen\">Scientific research and academic citations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Cybersicherheit_und_Open-Source_Intelligence_OSINT\">Cybersecurity and Open Source Intelligence (OSINT)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Vergleich_mit_anderen_Verifikationsmodellen\">Comparison with other verification models<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Herausforderungen_und_Kritik\">Challenges and criticism<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Fazit_und_Zukunftsperspektiven\">Conclusion and future prospects<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/eosgmbh.com\/en\/admiralty-code-for-the-verification-of-information\/#Quellen\">Sources<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Einleitung\"><\/span>Introduction<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In a world where information is disseminated in a matter of seconds, the verification of sources and data is more important than ever. False reports, disinformation and unverified claims make it difficult to make informed decisions - whether in politics, journalism, science or cyber security. A proven model for assessing the credibility of information is the&nbsp;<em>Admiralty Code<\/em>which was originally developed in military intelligence. Today, it is used in various areas to systematically classify information and assess its reliability (NATO Intelligence Doctrine, 2020).<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Historischer_Hintergrund_des_Admiralty_Code\"><\/span>Historical background of the Admiralty Code<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The <em>Admiralty Code<\/em> was developed by the British Admiralty during the Second World War to evaluate intelligence information in a standardized manner. The aim was to avoid misjudgements and improve decision-making. This system was later adopted by NATO and integrated into various intelligence structures. Today, it is not only used in the military sector, but also in journalism, scientific research and open source intelligence (OSINT) (OSINT Framework, 2021).<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Struktur_und_Methodik_des_Admiralty_Code\"><\/span>Structure and methodology of the Admiralty Code<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The <em>Admiralty Code <\/em>is based on two central criteria: the evaluation of the source and the evaluation of the information itself.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d02b89a6d8f&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d02b89a6d8f\" class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" width=\"4325\" height=\"2286\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"http:\/\/eosgmbh.com\/wp-content\/uploads\/admirality-code-graphic.jpg\" alt=\"Illustration of the Admiralty Code, a grid system for evaluating information reliability. The vertical axis rates source reliability (A-F) and the horizontal axis rates information credibility (1-6). The ratings are color-coded from green (highest reliability) to red (lowest reliability).\" class=\"wp-image-937\" srcset=\"https:\/\/eosgmbh.com\/wp-content\/uploads\/admirality-code-graphic.jpg 1500w, https:\/\/eosgmbh.com\/wp-content\/uploads\/admirality-code-graphic-300x169.jpg 300w, https:\/\/eosgmbh.com\/wp-content\/uploads\/admirality-code-graphic-1024x576.jpg 1024w, https:\/\/eosgmbh.com\/wp-content\/uploads\/admirality-code-graphic-768x432.jpg 768w, https:\/\/eosgmbh.com\/wp-content\/uploads\/admirality-code-graphic-18x10.jpg 18w\" sizes=\"(max-width: 4325px) 100vw, 4325px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewbox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bewertung_der_Quelle_A%E2%80%93F\"><\/span>Evaluation of the source (A-F)<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>This scale describes how credible a source is:<\/p>\n\n\n\n<ul start=\"1\" class=\"wp-block-list\">\n<li><strong>A<\/strong>Very trustworthy, as it has proven to be reliable in the past.<\/li>\n\n\n\n<li><strong>B<\/strong>Normally trustworthy.<\/li>\n\n\n\n<li><strong>C<\/strong>Occasionally reliable, but not always consistent.<\/li>\n\n\n\n<li><strong>D<\/strong>: Unreliable source.<\/li>\n\n\n\n<li><strong>E<\/strong>Unknown source whose credibility cannot be assessed.<\/li>\n\n\n\n<li><strong>F<\/strong>Proven false or misleading source.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bewertung_der_Information_1%E2%80%936\"><\/span>Evaluation of the information (1-6)<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>This scale indicates how reliable a particular piece of information is:<\/p>\n\n\n\n<ul start=\"1\" class=\"wp-block-list\">\n<li><strong>1<\/strong>: Confirmed by independent sources.<\/li>\n\n\n\n<li><strong>2<\/strong>: Very probably correct.<\/li>\n\n\n\n<li><strong>3<\/strong>: Possibly correct.<\/li>\n\n\n\n<li><strong>4<\/strong>: Rather unlikely.<\/li>\n\n\n\n<li><strong>5<\/strong>: Doubtful.<\/li>\n\n\n\n<li><strong>6<\/strong>: Not assessable.<\/li>\n<\/ul>\n\n\n\n<p>A typical assessment could be, for example <strong>B2 <\/strong>which means that a usually reliable source provides highly probable information. This system helps to weigh information objectively (NATO Intelligence Doctrine, 2020).<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Anwendungsbereiche_und_praktische_Nutzung\"><\/span>Areas of application and practical use<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Nachrichtendienste_und_Geheimdienstanalysen\"><\/span>Intelligence services and intelligence analysis<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>In intelligence analyses, the <em>Admiralty Code<\/em> used to quickly and effectively assess the quality of information. An example: A source from an established news service with a <strong>A1<\/strong>-rating provides information confirmed by independent sources. An anonymous online source with a <strong>C4<\/strong>-rating, on the other hand, is less trustworthy (ITU Cybersecurity Guide, 2021).<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Journalismus_und_Medienkompetenz\"><\/span>Journalism and media competence<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>The <em>Admiralty Code <\/em>can also serve as a tool for evaluating sources in journalism. Journalists and fact-checkers can use it to systematically classify news reports and counteract fake news. Established media companies with good journalistic practice could thus <strong>A2<\/strong>-rating, while an unknown blog with speculative content is more likely to be rated as <strong>D5 <\/strong>would have to be classified (Kovach &amp; Rosenstiel, 2014).<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Wissenschaftliche_Forschung_und_akademische_Zitationen\"><\/span>Scientific research and academic citations<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>In science, too, the&nbsp;<em>Admiralty Code<\/em>&nbsp;help to assess the quality of sources. For example, a peer-reviewed study in a renowned specialist journal could be used as a&nbsp;<strong>A1<\/strong>&nbsp;be categorized, while an unverified online publication is more likely to be&nbsp;<strong>C3<\/strong>&nbsp;would be. This could contribute to strengthening scientific integrity (Kovach &amp; Rosenstiel, 2014).<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cybersicherheit_und_Open-Source_Intelligence_OSINT\"><\/span>Cybersecurity and Open Source Intelligence (OSINT)<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>In cyber security, threat information is often collected from a variety of sources. This is where the <em>Admiralty Code <\/em>help to distinguish between reliable threat warnings and unfounded panic reports. For example, a report from an established security company could be considered <strong>A2 <\/strong>be classified, while an unverified social media rumor can be classified as a <strong>C5<\/strong>-rating (OSINT Framework, 2021).<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Vergleich_mit_anderen_Verifikationsmodellen\"><\/span>Comparison with other verification models<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>There are several alternative methods for verifying information:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CRAAP test <\/strong>(Currency, Relevance, Authority, Accuracy, Purpose) - A method for evaluating sources in the academic field.<\/li>\n\n\n\n<li><strong>SIFT method <\/strong>(Stop, Investigate, Find better coverage, Trace claims) - Often used in journalism to debunk fake news.<\/li>\n\n\n\n<li><strong>Bayesian analysis <\/strong>- A mathematical approach to evaluating the probability of information.<\/li>\n<\/ul>\n\n\n\n<p>During the <em>Admiralty Code <\/em>enables a quick, standardized assessment, other methods offer a more detailed analysis, especially when more context is required (NATO Intelligence Doctrine, 2020).<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Herausforderungen_und_Kritik\"><\/span>Challenges and criticism<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Although the <em>Admiralty Code <\/em>is a proven system, there are some challenges:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Subjectivity<\/strong>The classification of sources and information may vary depending on the analyst.<\/li>\n\n\n\n<li><strong>Static scale<\/strong>The system leaves little room for finer gradations.<\/li>\n\n\n\n<li><strong>Need for adaptation for digital media<\/strong>Today's information landscape with social media and AI-generated content may require extensions to the model.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Fazit_und_Zukunftsperspektiven\"><\/span>Conclusion and future prospects<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The <em>Admiralty Code <\/em>has proven to be a useful tool for verifying information. Whether in intelligence analysis, journalism or cyber security, the system helps to systematically evaluate information sources and make informed decisions. Nevertheless, further development is necessary in order to meet the challenges of the modern information society. One possible future perspective could be the integration of AI-supported analyses that combine the code with big data technologies (ITU Cybersecurity Guide, 2021).<\/p>\n\n\n\n<div style=\"height:79px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Quellen\"><\/span>Sources<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The following sources were used in the preparation of this article: &nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>NATO Intelligence Doctrine (2020). Accessed at: <a href=\"https:\/\/jadl.act.nato.int\/ILIAS\/data\/testclient\/lm_data\/lm_152845\/Linear\/JISR04222102\/sharedFiles\/AJP27.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/jadl.act.nato.int\/ILIAS\/data\/testclient\/lm_data\/lm_152845\/Linear\/JISR04222102\/sharedFiles\/AJP27.pdf<\/a><\/li>\n\n\n\n<li>Kovach, B. &amp; Rosenstiel, T. \"The Elements of Journalism\" (2014)<\/li>\n\n\n\n<li>OSINT Framework (2021). Accessed at: https:\/\/osintframework.com\/<\/li>\n\n\n\n<li>ITU Cybersecurity Guide (2021). Accessed at: <a href=\"https:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Documents\/GCIv5\/2401416_1b_Global-Cybersecurity-Index-E.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Documents\/GCIv5\/2401416_1b_Global-Cybersecurity-Index-E.pdf<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n<\/ul>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Management Summary Der Admiralty Code ist ein bew\u00e4hrtes System zur Bewertung von Informationsquellen, das urspr\u00fcnglich f\u00fcr den milit\u00e4rischen Nachrichtendienst entwickelt wurde und heute in Bereichen wie Journalismus, Wissenschaft und Cybersicherheit Anwendung findet. Er besteht aus zwei Dimensionen: der Glaubw\u00fcrdigkeit der Quelle (A\u2013F) und der Zuverl\u00e4ssigkeit der Information (1\u20136). Trotz seiner Vorteile weist der Code einige [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":695,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eos-gmbh"],"acf":[],"_links":{"self":[{"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/posts\/690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/comments?post=690"}],"version-history":[{"count":8,"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/posts\/690\/revisions"}],"predecessor-version":[{"id":938,"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/posts\/690\/revisions\/938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/media\/695"}],"wp:attachment":[{"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/media?parent=690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/categories?post=690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eosgmbh.com\/en\/wp-json\/wp\/v2\/tags?post=690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}