Revision as of 05:12, 25 February 2004 editRj (talk | contribs)Pending changes reviewers3,145 edits moved to 'Intelligence Gathering Disciplines' page← Previous edit | Revision as of 03:22, 8 March 2004 edit undoPascal666 (talk | contribs)Extended confirmed users17,486 editsNo edit summaryNext edit → | ||
Line 1: | Line 1: | ||
'''Open source intelligence''' or "OSINT" refers to the ] based on information collected from open sources, i.e. information available to the general public. This includes ]s, the ], ]s, ], ]s, ] broadcasts, ], and others. The term is unrelated to ] in the computer software community, which refers to programs whose source code is publicly available. | '''Open source intelligence''' or "OSINT" refers to the ] based on information collected from open sources, i.e. information available to the general public. This includes ]s, the ], ]s, ]s, ]s, ] broadcasts, ], and others. The term is unrelated to ] in the computer software community, which refers to programs whose source code is publicly available. | ||
Collection of information in OSINT is a very different problem from collection in other intelligence disciplines because, by definition, the information sources are publicly available. In other intelligence disciplines, a major difficultly is extracting information from non-cooperative targets. In OSINT, the chief difficulty is identifying relevant, reliable sources from the vast abundance of publicly available information. Obtaining the needed information once a source is identified is a comparatively minor problem. | Collection of information in OSINT is a very different problem from collection in other intelligence disciplines because, by definition, the information sources are publicly available. In other intelligence disciplines, a major difficultly is extracting information from non-cooperative targets. In OSINT, the chief difficulty is identifying relevant, reliable sources from the vast abundance of publicly available information. Obtaining the needed information once a source is identified is a comparatively minor problem. | ||
Line 5: | Line 5: | ||
Sometimes '''overt ]''' is considered part of open source intelligence. This is the use of non-clandestine human information sources; examples include interrogation of ]s, debriefing of legal travellers, and reports from overt agents such as attachés and ]s. | Sometimes '''overt ]''' is considered part of open source intelligence. This is the use of non-clandestine human information sources; examples include interrogation of ]s, debriefing of legal travellers, and reports from overt agents such as attachés and ]s. | ||
The current definitive guides to OSINT are the ], the ], and the (NATO) Intelligence Exploitation of the Internet. The definitive historical history of OSINT in recent times is contained in the 30 volumes of Proceedings from the annual OSINT conference sponsored by . | The current definitive guides to OSINT are the ], the ], and the (]) Intelligence Exploitation of the Internet. The definitive historical history of OSINT in recent times is contained in the 30 volumes of Proceedings from the annual OSINT conference sponsored by . | ||
A number of nations, notably ], ], ], and ], have created specialist units to focus on OSINT. Within the ] government, the major provider of OSINT is the ]'s ], which also makes some of its information available to the public through the ]. | A number of nations, notably ], ], ], and ], have created specialist units to focus on OSINT. Within the ] government, the major provider of OSINT is the ]'s ], which also makes some of its information available to the public through the ]. |
Revision as of 03:22, 8 March 2004
Open source intelligence or "OSINT" refers to the Intelligence Gathering Discipline based on information collected from open sources, i.e. information available to the general public. This includes newspapers, the internet, books, phone books, scientific journals, radio broadcasts, television, and others. The term is unrelated to open source in the computer software community, which refers to programs whose source code is publicly available.
Collection of information in OSINT is a very different problem from collection in other intelligence disciplines because, by definition, the information sources are publicly available. In other intelligence disciplines, a major difficultly is extracting information from non-cooperative targets. In OSINT, the chief difficulty is identifying relevant, reliable sources from the vast abundance of publicly available information. Obtaining the needed information once a source is identified is a comparatively minor problem.
Sometimes overt HUMINT is considered part of open source intelligence. This is the use of non-clandestine human information sources; examples include interrogation of refugees, debriefing of legal travellers, and reports from overt agents such as attachés and ambassadors.
The current definitive guides to OSINT are the NATO Open Source Intelligence Handbook, the NATO Open Source Intelligence Reader, and the (NATO) Intelligence Exploitation of the Internet. The definitive historical history of OSINT in recent times is contained in the 30 volumes of Proceedings from the annual OSINT conference sponsored by OSS.Net.
A number of nations, notably Australia, Norway, South Africa, and Sweden, have created specialist units to focus on OSINT. Within the US government, the major provider of OSINT is the CIA's Foreign Broadcast Information Service, which also makes some of its information available to the public through the World News Connection.
Links
- World News Connection - global news from FBIS
- www.oss.net - open source intelligence website run by former intelligence officer and current OSINT activist Robert David Steele.