


As you zoom in, each level should reveal more and more imagery.īlue circles show user-created photospheres in Aleppo city, Syria.

Make sure to zoom in to view all available images, as Google Maps condenses them into single overlapped points if they’re too close to each other. If you’d like to view all street views and photospheres in a given area, click on the yellow street view icon and view every available image.īlue lines and circles highlight where street view and photospheres are available.
#Upload google photosphere on facebook android#
This ubiquity of the Android platform means Google Maps displays consistent results across much of the world, but will show much larger amounts of information in countries with higher smartphone access. Due to Google Maps’ monopolization of online GIS mapping platforms and GPS providers, the service is available nearly everywhere in the world where Android is the primary platform of use – which is to say, nearly everywhere in the world. Much of the content will center around Syria, where the majority of my work and research has been directed. In the below guide, I will explore the practical application of user-created photosopheres, platform-generated street views, and organizational content management policies towards both OSINT research work and individual security measures. There are relatively simple steps behind securing most content on Google Maps, but certain security settings must be engaged by the user directly. This comparatively open flow of information on Google Maps is both a great benefit for researchers, who can access geotagged, geolocated, and roughly dated information uploaded by individuals, but also a risk to users and organizations who don’t take proper precautions when uploading content. Like other platforms, Google Maps provide users with the ability not only to upload media and other content directly to a location-based GIS map, but also to place text reviews at various businesses and geo-locations around the world. One of the biggest potential security vulnerabilities to an individual user, and thus one of the most useful tools for an OSINT researcher to verify information with, is Google Maps. In many cases, these users are enabled by app and device features which encourage participation and the submission of content. Google’s expansive location tracking via Android has been widely criticized, and although the company has taken steps in recent weeks to secure the privacy of its users on the Google platform, a major threat to Google’s user security still exists: the users themselves. In June of 2019, Facebook deactivated most of their graph search functionality, in a move which was intended to increase the privacy of users but which also left many investigators without the essential tools needed to perform their research. Companies have taken various steps to address this, with some notable examples. OSINT researchers can easily utilize Google Maps tools to verify information and establish suspect timelines.įor years, social media companies like Facebook have come under increased pressure for the amount of publicly shared and openly accessible user data available for search on their platforms.
