The author argues that OSINT is distinct from other INT sources (SIGINT, HUMINT, IMINT etc) because it is defined by how accessible it is ("publicly available",) rather than the nature of the source (signals, human, images etc).
2/n
The impact of this confusing taxonomy is that OSINT becomes a "junk drawer" of ill-defined types of information.
Unlike other INTs, the source type is vague and unclear.
3/n
The author also questions just how truly "publicly available" OS is if one does not have the expertise to access it e.g. data in foreign languages, or on the dark web, or behind a paywall.
(I find this a bizarre take - requiring skill to access != unavailable)
4/n
Since in the author's view OSINT is far too broadly defined, it is impossible really hire or train someone to work in OSINT effectively because the array of skills required is too vast.
5/n
The author is critical of his peers in the CIA and DHS for hiring people who specialise in OSINT for this reason, yet acknowledges that their work is made possible by making their tasks remits more specific
(well, of course... 🤷♂️)
6/n
TLDR: "OSINT" makes homogenous what should be highly specialised.
(This feels like a straw man, since most OSINT roles are usually within a sub specialism in any case, as are the DHS/CIA roles he cites.)
7/n
The author attributes (blames?) the rise of OSINT to the increase in the data generated by the web in the 1990s, but he notes the term as been in use since at least the 1960s and the concept is older than that - it was just never a separate "INT".
8/n
Despite these early references, the use of the term "OSINT" generally tracks the rise of the web.
He notes that orgs like @Bellingcat and @RUSI_org have shown OS capabilities that previously only existed in government.
9/n
The author argues that the reliance on OSINT causes reliability issues, since analysts may not thoroughly evaluate their sources in the way they might in traditional forms of INT.
10/n
(This is also a bizarre argument against OSINT as a discipline. Poor verification and vetting of sources depends on the skill (or lack of) of the analyst and the processes they apply, it is not inherent to OSINT itself.)
11/n
As an example of the "confusion" caused by OSINT he cites footage of a sunk Russian ship shared on social media after a Ukr missile strike. Is this OSINT, IMINT, or SOCMINT?
12/n
(This is a weak argument for strict taxonomy. It's hard to see how the INT labelling applied to this footage would determine its overall utility in the intelligence process.)
13/n
To answer the final question "What Is To Be Done With OSINT?" (!) the author suggests reverting to traditional intel labels. If it's a picture, it's IMINT, if it's a human source, it's HUMINT, and so on.
14/n
The author seems to believe that since analysts are trained to weigh and evaluate these traditional INT forms, putting "OSINT" back into these boxes will alleviate issues around verification quality.
15/n
And there are most definitely verification and labelling issues with OSINT. I have moaned before about the pernicious rise of BULLSHINT:
But the root cause is not open source intelligence, it is the lack of any kind of verification or analytical process. Dilettantism can be a problem in public OSINT at least.
17/n
So what are the actionable takeaways of the journal article?
Well, there aren't really too many.
Unless you do OSINT in an environment where source corroboration and verification are not routine, in which case the fault is with you and not OSINT 😀
18/n
The conclusion is here but I find it unsatisfactory. If open source info is not analysed and evaluated on the way to becoming intelligence, these are failings of the org and individuals. It does not preclude open source from the intel process.
19/n
Fortunately the US intel community takes a more progressive view of OSINT. In Dec 2022 the CIA appointed Randy Nixon as the new head of the OSE (Open Source Enterprise) in order to improve the agency's capabilities in this field.
Another very different true story from intelligence history.
It's certainly the most disgusting act of intel gathering I've ever heard of.
Here's how poor opsec and the careless toilet habits of Soviet soldiers became a reliable source of intel for NATO in the Cold War... 1/
After WW2 Germany was divided into Allied and Russian occupation zones.
Mistrust and paranoia between the two sides was rife and each was afraid of the other side launching a surprise attack on the other... 2/
To counter this, each side agreed to allowing a military mission from the opposing side to be stationed on their territory and observe military exercises.
That way it would be impossible for NATO/Soviet forces to prepare for an attack without being observed by the other. 3/
I've been reading up on the history of OSINT recently (although it wasn't always called "OSINT" of course...).
I found an interesting early example of image-based intelligence going back to WW2.
These days we'd call it "crowdsourced"... 1/
In 1942 the allies were struggling for reliable images of locations in Nazi-occupied Europe. These were needed to plan bombing raids and operations like D-Day.
The allies had reconnaissance planes, but they were limited by range and weather, and were often shot down. 2/
So in 1942 the head of British intelligence, Admiral Godfrey, put out an appeal on BBC radio for listeners to send in photographs and postcards they had from mainland Europe, especially if the area was of military interest. 3/