Page 55Intelligencer: Journal of U.S. Intelligence StudiesWinter/Spring 2013
majority of intelligence input makes OSINT an essen-
tial part of an all-source intelligence eort. Every
intelligence professional should be knowledgeable
of OSINT sources and methods, especially as analysis
and collection are increasingly merging with each
other. Nevertheless, outreach activities and open
source exploitation have to be supported by special-
ized elements to ensure that analysts keep up with
emerging technologies and the market. Specialized
OSINT experts are most qualied to identify potential
capability gaps and to assess where contractors can be
of use. One good way to integrate the knowledge and
skills of the private sector into the Intelligence Com-
munity is an OSINT certication program, currently
being introduced in the US, for example.
Challenges facing OSINT
Because of its open nature, OSINT can facili-
tate sharing. But the means for sharing need to be
improved for OSINT as well as for more restrictive
categories of intelligence. This need exists not only in
the national security community, but also with those
charged with domestic security and enforcement of
laws. Thus, a vertically and horizontally consistent
sharing and safeguarding system must be established.
Openness is important for governments’ credi-
bility and justifying their decisions to the public and
international allies. However, there is an inherent
vulnerability if an adversary uses open sources to
undermine the state’s national security. OSINT can be
used for vulnerability evaluations of one’s own nation.
Adversarial states will also manipulate open
sources for deceptive purposes. However, in today’s
world, with vast amounts of information openly avail-
able, such deceptive schemes become more dicult.
Although the fast pace of developing information
technology is an important challenge, the human
factor should not be underestimated. Ultimately, it is
always human expertise that makes the dierence in
intelligence tradecraft. Collectors and analysts there-
fore need both legal and practical training, the appro-
priate literacy, and rst-class technical capabilities
(such as data mining, network analysis and translation
solutions) to put disparate pieces of raw OSINT data
into context and make sense of them. With the advent
of new Internet-based media, the variety, volume and
velocity of information multiply. Today’s challenge is
no longer “connecting the dots,” but organizing the
information ow, distinguishing between signals and
noise, and by validating sources in a timely manner
to support both government decision makers and the
war ghter.
READINGS FOR INSTRUCTORS
An excellent overview of the Open Source Center’s policies,
procedures, and products is in Hamilton Bean, “The
DNI’s Open Source Center - An Organizational Commu-
nication Perspective” in International Journal of Intelligence
and Counter-Intelligence, Volume 20, Issue 2 (2007).
Magdalena Adriana Duvenage, a South African scholar,
provides a solid examination of the impact of the infor-
mation revolution on intelligence analysis and knowl-
edge management in Intelligence Analysis in the Knowledge
Age (2010), available at http://scholar.sun.ac.za/bitstream/
handle/10019.1/3087/Duvenage,%20M.A.pdf?sequence=1.
Stevyn Gibson, in his 2004 publication “Open Source Intelli-
gence - An Intelligence Lifeline” gives a brief synopsis of
the emerging role of OSINT, drawing together the con-
textual inuences that are bringing about its potentially
starring role. Available at http://www.rusi.org/downloads/
assets/JA00365.pdf.
Arthur S. Hulnick, a professor at Boston University and
former CIA ocer, has written “The Dilemma of Open
Source Intelligence - Is OSINT really intelligence?” in
Loch K. Johnson, editor, (2010) The Oxford Handbook of
National Security Intelligence. This is a scholarly article
on the role of OSINT in and for the private sector, OSINT
and intelligence reform, and the counter-intelligence
aspects of OSINT.
William J. Lahneman’s 2010 article, “The Need for a New
Intelligence Paradigm,” in the International Journal of
Intelligence and Counter-Intelligence, Volume 23, Issue 2,
is an important text on the IC’s organizational culture
that emphasize secrecy, not knowledge sharing, arguing
that facilitating both kinds of information ows require
a new approach to the intelligence enterprise.
An insightful public discussion about the government’s
practical needs for OSINT is the LexisNexis “Open Source
Intelligence Roundtable: OSINT 2020 - The Future of
Open Source Intelligence,” available at http://www.dni.
gov/speeches/Speech_OSINT_Roundtable_20100617.pdf.
Other reference items related to OSINT include the follow-
ing. Harris Minas: “Can the Open Source Intelligence
Emerge as an Indispensable Discipline for the Intelli-
gence Community in the 21st Century?” (2010), at http://
rieas.gr/images/rieas139.pdf. This is an academic thesis
addressing OSINT as an issue of research for critical
intelligence studies.
NATO (2001), Open Source Intelligence Handbook. Available at
http://blogs.ethz.ch/osint/les/2010/08/nato-osint-handbook-
v12-jan-2002.pdf This is a rather outdated guidance for
NATO sta on open source exploitation with the Internet
being the default C4I architecture, arguing that a robust
OSINT capability enables intelligence stas to address