Revision as of 23:18, 1 August 2008 editCalton (talk | contribs)Extended confirmed users78,494 edits Remove overlinking← Previous edit | Revision as of 01:06, 2 August 2008 edit undoRobertDavidSteeleVivas (talk | contribs)109 edits start overNext edit → | ||
Line 1: | Line 1: | ||
could somebody please stop the CIA assholes from deleting serious links to the ONLY web site on the planet that has been focused on OSINT since 1988 and offers the public FREE access to 30,000 pages from 750 international practioners? | |||
{{Globalize/USA}} | |||
It pisses me off to have sniveling little turds constantly deleting the handful of links I provide. | |||
::''This article is a subset article in a series under ]. For a hierarchical list of articles, see the intelligence cycle management ].'' | |||
'''Open Source Intelligence''' ('''OSINT''') is an information processing discipline that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable ]. In the Intelligence Community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or classified sources); it is not related to ]. | |||
===Open sources for intelligence=== | |||
OSINT includes a wide variety of information and sources: | |||
:* Media - newspapers, magazines, radio, television, and computer-based information. | |||
:* Public data - government reports, official data such as budgets and demographics, hearings, legislative debates, press conferences, speeches, marine and aeronautical safety warnings, environmental impact statements, contract awards. | |||
:* Observation and reporting - Amateur airplane spotters, radio monitors and ]s among many others have provided significant information not otherwise available. The availability of worldwide satellite photography, often of high resolution, on the Web (e.g., Google Earth) has expanded open source capabilities into areas formerly available only to major intelligence services. | |||
:* Professional and academic - conferences, symposia, professional associations, academic papers, and subject matter experts.<ref>Lowenthal, Mark M. "Intelligence: From Secrets to Policy," 2nd Ed. (Washington D.C.: CQ Press, 2003) p. 79.</ref> | |||
:*Most information has geospatial dimensions, but many often overlook the geospatial side of OSINT: not all open source data is unstructured text. Examples of geospatial open source include hard and softcopy maps, atlases, gazetteers, port plans, gravity data, aeronautical data, navigation data, geodetic data, human terrain data (cultural and economic), environmental data, commercial imagery, ], hyper and multi-spectral data, airborne imagery, geo-names, geo-features, urban terrain, vertical obstruction data, boundary marker data, geospatial ], ]s, and ]. Most of the geospatial data mentioned above is integrated, analyzed, and syndicated using geospatial software like a ] (GIS) not a browser ''per se''. | |||
OSINT is distinguished from research in that it applies the ] to create tailored knowledge supportive of a specific decision by a specific individual or group. | |||
===Definers for OSINT=== | |||
OSINT is defined by both the ] and the ] (DoD), as "produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement."<ref></ref> | |||
OSINT is, as of 2005, defined by the U.S. ] under the category of "Forces And Direct Support" and specifically for the DoD under Commercial Code M320 as <ref></ref> | |||
:''Open Source Intelligence (OSINT) Collection/Processing'' | |||
A wide variety of vendors sell information products specifically within this category. | |||
Open Source Intelligence under one name or another has been around for hundreds of years. The significance today of OSINT in the USA is the conflict between military, government and the private sector as to how the bulk of intelligence should be obtained. With the Internet, instant communications, and advanced media search the bulk of actionable and predictive intelligence can be obtained from public, unclassified sources. Government Agencies have been slow to embrace OSINT, or believe they already have suitable information feeds from the media, academia and public records. | |||
===Competitive intelligence=== | |||
In the private sector Competitive Intelligence, focused and directed to specific industries still has opportunities for small and medium businesses to compete in niche markets, but that too is being consolidated by the major information providers. In the media OSINT is considered as nothing new, the everyday operation of a traditional newsroom. Investigative Journalists use searches, databases, primary interviews, sources, and leaks to write every feature. | |||
===Risks for practictioners=== | |||
Accredited journalists have some protection in asking questions, and researching for recognized media outlets. Even so they are imprisoned, even executed for searching out what we know as OSINT. Private individuals illegally collecting data for a foreign military or intelligence agency is considered espionage in most countries. Of course, espionage that is not treason (i.e. betraying one's country of citizenship) has been a tool of statecraft since ancient times, is widely engaged in by nearly all countries, and is considered an honorable trade. Most countries recognize this, and if their counterintelligence agencies capture a foreign spy, that spy is usually unceremoniously deported or traded back to their homeland (for other spies) after a hostile debriefing; actual execution or refusal to trade back foreign spies with non-official cover would result in consequences in bilateral relations of the gravest possible magnitude, being an extraordinarily hostile act, even if those consequences were unofficially and extrajudicially imposed. | |||
==Value== | |||
According to the ] report submitted in March 2005, OSINT must be included in the all-source intelligence process for the following reasons (as stated in the report): | |||
#The ever-shifting nature of our intelligence needs compels the IC to quickly and easily understand a wide range of foreign countries and cultures. - … today’s threats are rapidly changing and geographically diffuse; it is a fact of life that an intelligence analyst may be forced to shift rapidly from one topic to the next. Increasingly, IC professionals need to quickly assimilate social, economic, and cultural information about a country—information often detailed in open sources. | |||
#Open source information provides a base for understanding classified materials. Despite large quantities of classified material produced by the IC, the amount of classified information produced on any one topic can be quite limited, and may be taken out of context if viewed only from a classified-source perspective. Perhaps the most important example today relates to terrorism, where open source information can fill gaps and create links that allow analysts to better understand fragmented intelligence, rumored terrorist plans, possible means of attack, and potential targets. | |||
#Open source materials can protect sources and methods. Sometimes an intelligence judgment that is actually informed with sensitive, classified information can be defended on the basis of open source reporting. This can prove useful when policymakers need to explain policy decisions or communicate with foreign officials without compromising classified sources. | |||
#Only open source can ''store history.'' A robust open source program can, in effect, gather data to monitor the world’s cultures and how they change with time. This is difficult, if not impossible, using the ''snapshots'' provided by classified collection methods.<ref> (The Commission on the Intelligence Capabilities, 378-379). ]</ref> | |||
==Process== | |||
Information collection in OSINT is generally a different problem from collection in other intelligence disciplines where obtaining the raw information to be analyzed may be the major difficulty, particularly if it is to be obtained from non-cooperative targets. In OSINT, the chief difficulty is in identifying relevant, reliable sources from the vast amount of publicly available information. However, this is not as great a challenge for those who know how to access local knowledge and how to leverage human experts who can create new tailored knowledge on the fly. | |||
==History== | |||
In the fall of 1992, Senator ], then Chairman of the ], sponsored the National Security Act of 1992, attempting to achieve modest reform in the U.S. Intelligence Community. His counterpart on the ] was Congressman ]. The House version of the legislation included a separate Open Source Office, at the suggestion of Larry Prior, a Marine Reservist familiar with the ] experience and then serving on the House Permanent Select Committee on Intelligence staff. | |||
The Aspin-Brown Commission stated in 1996 that US access to open sources was "severely deficient" and that this should be a "top priority" for both funding and DCI attention. | |||
In issuing its July 2004 report, the ] recommended the creation of an open-source intelligence agency, but without further detail or comment.<ref>See page 413 of the .</ref> Subsequently, the ] (also known as the Robb-Silberman Commission) report in March 2005 recommended the creation of an Open Source Directorate at the CIA. | |||
Following these recommendations, in November 2005 the ] announced the creation of the DNI ]. The Center was established to collect information available from "the Internet, databases, press, radio, television, video, geospatial data, photos and commercial imagery."<ref>Office of the Director of National Intelligence. "". Press release, ] ].</ref> In addition to collecting openly available information, it would train analysts to make better use of this information. The Center absorbed the ]'s previously existing ] (FBIS), originally established in 1941, with FBIS head ] named as director of the Center.<ref>Ensor, David. "". ''CNN'', ] ].</ref> | |||
In December 2005, the Director of National Intelligence appointed ] as the ] to serve as the Intelligence Community's senior intelligence officer for open source and to provide strategy, guidance and oversight for the ]. <ref>Office of the Director of National Intelligence "". Press release, ] ].</ref> Mr. Jardines has established the National Open Source Enterprise <ref> May 2006</ref> and authored Intelligence Community Directive 301. | |||
==OSINT communities== | |||
===Government=== | |||
There are a large number of open source activities taking place throughout the US Government. Frequently, these open source activities are described as "media monitoring", "media analysis", "internet research" and "public surveys" but are open source nonetheless. | |||
The ] sponsors the ] (FRD) which conducts a great deal of tailored open source research on a fee-for-service basis for the executive branch. | |||
===Intelligence=== | |||
The US Intelligence Community's open source activities (known as the National Open Source Enterprise) are dictated by Intelligence Community Directive 301 promulgated by the Director of National Intelligence.<ref>DNI Intelligence Community Directive 301 - ] ].</ref> The Directive establishes the authorities and responsibilities of the Assistant Deputy Director of National Intelligence for Open Source (ADDNI/OS), the DNI's Open Source Center and the National Open Source Committee. | |||
Prior to the establishment of the National Open Source Enterprise, the ] (FBIS), established in 1941, was the government's primary open source unit, transcribing and translating foreign broadcasts. It absorbed the Defense Department's Joint Publications Research Service, which did a similar function with foreign printed materials, including newspapers, magazines, and technical journals. | |||
===Military=== | |||
The former ], Dr. ] encouraged in part by the ] reports on ] and ], he created the Defense Open Source Program (DOSP). As of 5 July 2006 executive agency for this program has not been assigned. | |||
U.S. military offices that engage in OSINT activities include: | |||
*US Army Foreign Military Studies Office | |||
*US Army Asia Studies Detachment | |||
*Open Source Branch, Joint Intelligence Center, ] | |||
*Foreign Media Monitoring in Support of Information Operations, ] | |||
===Homeland Security=== | |||
The Department of Homeland Security has an active open source intelligence unit. In congressional testimony before the House Homeland Security Committee's Intelligence, Information Sharing and Terrorism Risk Assessment Subcommittee the Undersecretary of Homeland Security Charles Allen indicated on February 14, 2007, that he had established the "Domestic Open Source Enterprise" to support the Department's OSINT needs and that of State, Local and Tribal partners. | |||
===Law enforcement=== | |||
The law enforcement OSINT community applies Open source intelligence (OSINT) to the prediction, prevention, investigation, and prosecution of criminals including terrorists. | |||
Examples of successful law enforcement OSINT include ]; ] (RCMP) OSINT. | |||
] and ] experimented with OSINT units for a time, but they appear to have atrophied with the departure of their individual champions. | |||
New York Police Department (NYPD) is known to have an OSINT unit. | |||
===Academia=== | |||
The at ], OSINT centers at ], ], and ] are notable examples of the academic OSINT community. | |||
Increasingly, universities are finding that, in addition to traditional research into the frontiers of science and social science, they can compete for contracts and grants to produce Open source intelligence. An example of one successful academic OSINT enterprise focused on agricultural insurance fraud and other detectable patterns of abuse is the ] at ] in ]. | |||
===Business=== | |||
Business OSINT encompasses ], ], and ]. | |||
Businesses may use ]s and ]s to collect and analyze relevant information for business purposes. | |||
==See also== | |||
*] | |||
*] | |||
*] | |||
*] | |||
*] | |||
*] | |||
*] | |||
*] | |||
==References== | |||
<references/> | |||
==Further reading== | |||
{{external links}} | |||
;General | |||
* | |||
* | |||
* | |||
* | |||
* | |||
* at ] | |||
* - U.S. government arm focusing on open source intelligence under the DNI | |||
* | |||
* | |||
* | |||
* Tools, Tips & News For Early Warning, Crisis Management & OSINT Practitioners | |||
* not-for-profit association aiming to promote OSINT in EU institutions and Member States | |||
*, Congressional Research Service, December 5, 2007 | |||
* Cody Burke, Bond University, May 2007 | |||
;Advocacy and analysis of OSINT | |||
* | |||
* - - | |||
* Military Intelligence Professional Bulletin, Oct-Dec, 2005 by Jacob W. Kipp | |||
* European Open Source Forum - not-for-profit association aiming to promote the use of OSINT in Europe | |||
;News and commentary | |||
* 19 April 2006 | |||
* 20 March 2006 | |||
* March 2006 | |||
* Oct-Dec, 2005 by Barbara G. Fast | |||
* 21 June 2005 | |||
* by Stalder and Hirsh, 15 May 2002 | |||
* article ''Why Spy? '' by ] (cofounder of the ]) on why the government needs more OSINT. | |||
* | |||
* | |||
* | |||
* article from the New York times , about open sources and wikis | |||
{{Intelligence cycle management}} | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] |
Revision as of 01:06, 2 August 2008
could somebody please stop the CIA assholes from deleting serious links to the ONLY web site on the planet that has been focused on OSINT since 1988 and offers the public FREE access to 30,000 pages from 750 international practioners?
It pisses me off to have sniveling little turds constantly deleting the handful of links I provide.