This article has multiple issues. Please help improve it or discuss these issues on the talk page . (Learn how and when to remove these messages)
|
Open source intelligence (OSINT) is the collection and analysis of data gathered from open sources (overt sources and publicly available information) to produce actionable intelligence. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines. [1]
OSINT sources can be divided up into six different categories of information flow: [2]
OSINT is distinguished from research in that it applies the process of intelligence to create tailored knowledge supportive of a specific decision by a specific individual or group. [3]
Collecting open-source intelligence is achieved in a variety of different ways, [4] such as:
OSINT is defined in the United States of America by Public Law 109-163 as cited by both the U.S. Director of National Intelligence and the U.S. Department of Defense (DoD), as intelligence "produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement." [5] As defined by NATO, OSINT is intelligence "derived from publicly available information, as well as other unclassified information that has limited public distribution or access." [6]
According to political scientist Jeffrey T. Richelson, “open source acquisition involves procuring verbal, written, or electronically transmitted material that can be obtained legally. In addition to documents and videos available via the Internet or provided by a human source, others are obtained after U.S. or allied forces have taken control of a facility or site formerly operated by a foreign government or terrorist group.” [7]
Former Assistant Director of Central Intelligence for Analysis Mark M. Lowenthal defines OSINT as “any and all information that can be derived from overt collection: all types of media, government reports and other documents, scientific research and reports, commercial vendors of information, the Internet, and so on. The main qualifiers to open-source information are that it does not require any type of clandestine collection techniques to obtain it and that it must be obtained through means that entirely meet the copyright and commercial requirements of the vendors where applicable." [8]
OSINT practices have been documented as early as the mid-19th century in the United States and early 20th century in the United Kingdom. [9]
OSINT in the United States traces its origins to the 1941 creation of the Foreign Broadcast Monitoring Service (FBMS), an agency responsible for the monitoring of foreign broadcasts. An example of their work was the correlation of changes in the price of oranges in Paris with successful bombings of railway bridges during World War II. [10]
The Aspin-Brown Commission stated in 1996 that US access to open sources was "severely deficient" and that this should be a "top priority" for both funding and DCI attention. [11]
In July 2004, following the September 11 attacks, the 9/11 Commission recommended the creation of an open-source intelligence agency. [12] In March 2005, the Iraq Intelligence Commission recommended [13] the creation of an open-source directorate at the CIA.
Following these recommendations, in November 2005 the Director of National Intelligence announced the creation of the DNI Open Source Center. The Center was established to collect information available from "the Internet, databases, press, radio, television, video, geospatial data, photos and commercial imagery." [14] In addition to collecting openly available information, it would train analysts to make better use of this information. The center absorbed the CIA's previously existing Foreign Broadcast Information Service (FBIS), originally established in 1941, with FBIS head Douglas Naquin named as director of the center. [15] Then, following the events of 9/11 the Intelligence Reform and Terrorism Prevention Act merged FBIS and other research elements into the Office of the Director of National Intelligence creating the Open Source Enterprise.
Furthermore, the private sector has invested in tools which aid in OSINT collection and analysis. Specifically, In-Q-Tel, a Central Intelligence Agency supported venture capital firm in Arlington, VA assisted companies develop web-monitoring and predictive analysis tools.
In December 2005, the Director of National Intelligence appointed Eliot A. Jardines as the Assistant Deputy Director of National Intelligence for Open Source to serve as the Intelligence Community's senior intelligence officer for open source and to provide strategy, guidance and oversight for the National Open Source Enterprise. [16] Mr. Jardines has established the National Open Source Enterprise [17] and authored intelligence community directive 301. In 2008, Mr. Jardines returned to the private sector and was succeeded by Dan Butler who is ADDNI/OS [18] and previously Mr. Jardines' Senior Advisor for Policy. [19]
The web browser is a powerful OSINT tool that provides access to numerous websites and both open source and proprietary software tools that are either purpose-built for open source information collection or which can be exploited for the purposes of either gathering of open source information or to facilitate analysis and validation to provide intelligence. A cottage industry of both for-profit and not-for-profit investigative and educational groups such as Bellingcat, IntelTechniques SANS and others offer indices, books, podcasts and video training materials on OSINT tools and techniques. Books such as Michael Bazzell's Open Source Intelligence Techniques serve as indices to resources across multiple domains but according the author, due to the rapidly changing information landscape, some tools and techniques change or become obsolete frequently, hence it is imperative for OSINT researchers to study, train and survey the landscape of source material regularly. [20] A guide by Ryan Fedasiuk, an analyst at the Center for Security and Emerging Technology, lists six tools open-source analysts can use to stay safe and utilize operational security (OPSEC) when conducting online investigations. These include VPNs, cached webpages, digital archive services, URL and file scanners, browser sandbox applications, and antivirus software. [21]
Numerous lists of aggregated OSINT content are available on the web. The OSINT Framework contains over 30 primary categories of tools and is maintained as an open source project on GitHub. [22]
A main hindrance to practical OSINT is the volume of information it has to deal with ("information explosion"). The amount of data being distributed increases at a rate that it becomes difficult to evaluate sources in intelligence analysis. To a small degree the work has sometimes been done by amateur crowd-sourcing. [23]
Private individuals illegally collecting data for a foreign military or intelligence agency is considered espionage in most countries. Of course, espionage that is not treason (e.g. betraying one's country of citizenship) has been a tool of statecraft since ancient times. [24]
The OSINT Foundation is a professional association for OSINT practitioners in the United States Intelligence Community. [25] It is open to U.S. Citizens and seeks to raise the prominence of the open-source intelligence discipline. [26]
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.
The National Reconnaissance Office (NRO) is a member of the United States Intelligence Community and an agency of the United States Department of Defense which designs, builds, launches, and operates the reconnaissance satellites of the U.S. federal government. It provides satellite intelligence to several government agencies, particularly signals intelligence (SIGINT) to the National Security Agency (NSA), imagery intelligence (IMINT) to the National Geospatial-Intelligence Agency (NGA), and measurement and signature intelligence (MASINT) to the Defense Intelligence Agency (DIA). The NRO announced in 2023 that it plans within the following decade to quadruple the number of satellites it operates and increase the number of signals and images it delivers by a factor of ten.
The United States Intelligence Community (IC) is a group of separate U.S. federal government intelligence agencies and subordinate organizations that work both separately and collectively to conduct intelligence activities which support the foreign policy and national security interests of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments.
The Foreign Broadcast Information Service (FBIS) was an open source intelligence component of the Central Intelligence Agency's Directorate of Science and Technology. It monitored, translated, and disseminated within the U.S. government openly available news and information from media sources outside the United States. Its headquarters was in Rosslyn, later Reston, Virginia, and it maintained approximately 20 monitoring stations worldwide. In November 2005, it was announced that FBIS would become the newly formed Open Source Center, tasked with the collection and analysis of publicly available intelligence.
The National Center for Medical Intelligence (NCMI), formerly known as the Armed Forces Medical Intelligence Center, is a component of the United States Defense Intelligence Agency (DIA) responsible for the production of medical intelligence and all-source intelligence on foreign health threats and other medical issues to protect U.S. interests worldwide. Headquartered at Fort Detrick, Maryland, the center provides finished intelligence products to the Department of Defense, U.S. Intelligence Community, Five Eyes, NATO, allies and partners, as well as international health organizations and NGO's.
A private intelligence agency (PIA) is a private sector (non-governmental) or quasi-non-government organization devoted to the collection, analysis, and exploitation of information, through the evaluation of public sources and cooperation with other institutions. Some private intelligence agencies obtain information deceptively or through on-the-ground activities for clients.
Eliot A. Jardines was the first Assistant Deputy Director of National Intelligence for Open Source (ADDNI/OS) in the United States.
The Open Source Enterprise (OSE) is a United States Government organization dedicated to open-source intelligence. Initially part of the Office of the Director of National Intelligence, it is now part of the Directorate of Digital Innovation at the Central Intelligence Agency (CIA). Former iterations of the organization were the Open Source Center (OSC) and the Foreign Broadcast Information Service (FBIS).
Intellipedia is an online system for collaborative data sharing used by the United States Intelligence Community (IC). It was established as a pilot project in late 2005 and formally announced in April 2006. Intellipedia consists of three wikis running on the separate JWICS (Intellipedia-TS), SIPRNet (Intellipedia-S), and DNI-U (Intellipedia-U) networks. The levels of classification allowed for information on the three wikis are Top Secret Sensitive Compartmented Information, Secret (S), and Sensitive But Unclassified information, respectively. Each of the wikis is used by individuals with appropriate clearances from the 18 agencies of the US intelligence community and other national-security related organizations, including Combatant Commands and other federal departments. The wikis are not open to the public.
The Intelligence Advanced Research Projects Activity (IARPA) is an organization, within the Office of the Director of National Intelligence (ODNI), that is responsible for leading research to overcome difficult challenges facing the United States Intelligence Community. IARPA characterizes its mission as follows: "To envision and lead high-risk, high-payoff research that delivers innovative technology for future overwhelming intelligence advantage."
Failure in the intelligence cycle or intelligence failure, is the outcome of the inadequacies within the intelligence cycle. The intelligence cycle itself consists of six steps that are constantly in motion: requirements, collection, processing and exploitation, analysis and production, dissemination and consumption, and feedback.
The target-centric approach to intelligence is a method of intelligence analysis that Robert M. Clark introduced in his book "Intelligence Analysis: A Target-Centric Approach" in 2003 to offer an alternative methodology to the traditional intelligence cycle. Its goal is to redefine the intelligence process in such a way that all of the parts of the intelligence cycle come together as a network. It is a collaborative process where collectors, analysts and customers are integral, and information does not always flow linearly.
The Central Intelligence Agency (CIA), a United States intelligence agency that "provides objective intelligence on foreign countries", also informally referred to as the Agency. The CIA is part of the United States Intelligence Community, is organized into numerous divisions. The divisions include directors, deputy directors, and offices. The CIA board is made up of five distinct entitles called Directorates. The CIA is overseen by the Director of Central Intelligence. Under the Director of Central Intelligence is the Deputy Director of Central Intelligence. Under this the CIA is divided into four directorates. These directorates are as follows:
Geographic information systems (GIS) play a constantly evolving role in geospatial intelligence (GEOINT) and United States national security. These technologies allow a user to efficiently manage, analyze, and produce geospatial data, to combine GEOINT with other forms of intelligence collection, and to perform highly developed analysis and visual production of geospatial data. Therefore, GIS produces up-to-date and more reliable GEOINT to reduce uncertainty for a decisionmaker. Since GIS programs are Web-enabled, a user can constantly work with a decision maker to solve their GEOINT and national security related problems from anywhere in the world. There are many types of GIS software used in GEOINT and national security, such as Google Earth, ERDAS IMAGINE, GeoNetwork opensource, and Esri ArcGIS.
Maltego is an all-in-one platform for open-source intelligence (OSINT) and cyber investigations, developed by Maltego Technologies GmbH, a company headquartered in Munich, Germany.
Bellingcat is a Netherlands-based investigative journalism group that specialises in fact-checking and open-source intelligence (OSINT). It was founded by British citizen journalist and former blogger Eliot Higgins in July 2014. Bellingcat publishes the findings of both professional and citizen journalist investigations into war zones, human rights abuses, and the criminal underworld. The site's contributors also publish guides to their techniques, as well as case studies.
Intelligence Community Directive 301 is a rescinded United States Intelligence Community Directive issued in 2006 to push emphasis on making open source intelligence the source of first resort among the intelligence community. The 9/11 terrorist attacks drove this directive forward as there was a call for many intelligence disciplines to work collectively on assessing and predicting threats to the United States. Intelligence Community Directive 301 outlined responsibilities and established policies on the intelligence community regarding open source intelligence activities. It was rescinded in 2012.
All-source intelligence is a term used to describe intelligence organizations, intelligence analysts, or intelligence products that are based on all available sources of intelligence collection information.
The role of open-source intelligence (OSINT) in response to the Russian invasion of Ukraine has attracted significant attention.
The National Open Source-Intelligence Agency (NOSA) is a proposed 19th member of the United States Intelligence Community (IC) to be tasked with the collection and exploitation of open-source intelligence (OSINT). Creation of the agency would consolidate open source efforts from across the US government into a new functional manager for the open-source intelligence discipline, drawing resources from the Open Source Enterprise of the Central Intelligence Agency, the Open Source Integration Center (OSIC) of the Defense Intelligence Agency, the National Geospatial-Intelligence Agency, as well as other open source focused entities across the government.
{{cite web}}
: CS1 maint: unfit URL (link){{cite book}}
: CS1 maint: location missing publisher (link)