OSINT Academy

A new form of intelligence work in the era of big data - Internet Open Source Intelligence

1. What is intelligence?

Early intelligence mostly refers to secret intelligence, serving military activities, in order to win wars and maintain national security. With the development of science and technology and the deepening of social practice, the concept of intelligence is constantly evolving and enriching, the connotation is gradually clear, and the extension is gradually expanding. For example, many modern interpretations of intelligence are made from the aspects of philology, archives, library science, etc., which are extended and expanded concepts. In fact, the most intuitive and simple explanation of the word "intelligence" is: intelligence is the key information needed to solve a specific problem.

big data

2. What is open source intelligence?

United Stated Congress, NATO, Open Source Solutions Academy, U.S. Department of Defense, U.S. Director of National Intelligence and other institutions and individuals have clearly described open source intelligence. In a nutshell, open source intelligence refers to intelligence obtained from public sources and obtained legally.

With the development of science and the popularization of Internet technology, the methods of open source intelligence collection have been expanded in electronic media, and Internet Open Source Intelligence has also begun to take shape. Internet Open Source Intelligence (INOSINT) is based on clear and specific needs, based on public data resources, through legal and compliance means, comprehensive various types of massive data, using advanced processing technology, conducting professional intelligence research and judgment, and mining and refining useful information. The intuitive explanation is: Gain intelligence from publicly available data in cyberspace.

Throughout the world, open source intelligence has been widely used in maintaining national security, supporting military operations, ensuring law enforcement operations, serving teaching and scientific research, supporting business competition, supporting disaster relief, and participating in social governance. Developed countries represented by the United States attach great importance to the research and application of open source intelligence. The relevant theories have become more complete, and the actual intelligence work has turned to open source intelligence. Sherman Kent, the "father of intelligence analysis" in the United States, once said that about 80% of the intelligence used by the intelligence community every day comes from open sources, and Allen W. Dulles, the longest-serving director of the CIA, also publicly recognized this view. According to CIA statistics in 2007, open source intelligence accounted for more than 80% of the total intelligence collection.

In the Internet age, open-source intelligence has a large quantity, rapid generation, wide access channels, and strong timeliness, which are completely incomparable to traditional intelligence. This has also greatly improved the value and status of open source intelligence, and at the same time, the research on open source intelligence has also introduced a new direction - Internet Open Source Intelligence.

The US CIA has established the Center For Cyber Intelligence (CCI) and the Center for Cyber Intelligence Research (CCIR). The British Broadcasting Corporation also has a department called BBC Monitoring, which is responsible for monitoring foreign media around the world, and also uses open source intelligence, especially open source network intelligence, as the main monitoring method. All these show that the Internet has become the world's largest source of open source intelligence data, and the acquisition of intelligence has entered the era of open source network intelligence.

3. What are the characteristics of open source cyber intelligence?

First, the data sources of open source cyber intelligence are relatively wide. It not only covers traditional public media, such as public speeches, public broadcasts, etc., but also includes Internet-specific media, such as social media platforms, emails, online media, major websites, surveillance cameras, communities and other domestic and foreign data sources. It covers almost all fields and industries, and can be used as the "starting point" and "entrance" of another intelligence topic at any time to guide intelligence personnel to discover clues and conduct "full information source" collection and analysis. At the same time, the characteristics of comprehensiveness and stability of open source intelligence are convenient for tracking the changes of the target for long-term monitoring. Comparing the intelligence services of many companies and research institutions in recent years, it is found that using open source network intelligence as the main data source can meet most of the needs of users. Such as research on competitors' technical conditions, business dynamic tracking, management, organization, research and development, and application status research of related equipment and technologies, industry operating cost composition and low-cost strategy analysis, new technology research and development and application status and trends, etc. .

Secondly, the input cost is relatively small. Experts believe that compared with other intelligence, the economic cost of open source network intelligence is lower, with less investment and greater returns. Therefore, for those countries with insufficient intelligence work budgets, open source network intelligence can be used to replace traditional secret intelligence to a certain extent. In addition, traditional intelligence work requires professionals to collect intelligence, and the cost is relatively high. Using Wikipedia and other mechanisms such as Web2.0 can mobilize all personnel in the organization and those interested in the topic in the society to collect intelligence together, greatly reducing costs.

Furthermore, the security risk of open source cyber intelligence is low. For enterprises and social organizations, open source network intelligence can avoid the risks of illegal or moral violations that may exist in other intelligence work. For nations, open source cyber intelligence can avoid the diplomatic wrangling that other types of intelligence work often spark. Since the information comes from the open Internet, there are not too many restrictions and obstacles in the process of collection, analysis, and transmission. Open source intelligence does not involve confidential information, and all work is carried out through legal and compliant means. From information acquisition to intelligence use, the security risks at all stages are relatively low.

Finally, the concealment of open source network intelligence is relatively high. Open source cyber intelligence can protect one's own strategic intent. Traditional intelligence work often requires the use of various manual or technical means to spy on the other party's system. Once the other party finds the trace, the other party can infer its own intentions based on the intelligence search content. However, open source network intelligence work can be carried out under private conditions, making it impossible for the other party to detect and infer their intentions.

big data

4. Importance of Intelligence Analysts

Jack Davis, a senior intelligence analysis expert of the Central Intelligence Agency, once clearly affirmed the importance of intelligence analysts, and proposed that 90% of US national security analysis is done by intelligence analysts. Steele, an American open source intelligence expert, has also put forward his own views on the process and working mode of open source intelligence. He believes that the most important skill of analysts in this mode is to "know who has the situation", and to be able to provide timely professional information to intelligence users who ask important questions.

Sources of intelligence from which qualified new knowledge is produced and quality-controlled by analysts. Passing ordinary information materials to ordinary users does not have much value. Only by analyzing and adding value on the basis of sufficient information materials, facing the problems that need to be solved, obtaining clear judgments, and forming reports that can be used for decision-making actions is Intelligence work was formed.

On the one hand, information retrieval cannot represent intelligence production in the current environment. "Intelligence" is not the information material itself, "intelligence" products are formed by analyzing and adding value on the basis of information materials, and highly rely on the personal intelligence of intelligence workers. Intelligence is not "found" directly, but "discovered" through analysis. Intelligent technologies such as big data crawlers, statistical analysis, and visualization can only play an auxiliary role in intelligence work, but cannot completely replace intelligence personnel. If the general information retrieval method fails to obtain intelligence from public information sources, and doubt the value of open source intelligence, it is a misunderstanding in understanding.

On the other hand, unlike traditional intelligence personnel, open source network intelligence analysts must be compound talents that adapt to the development of the new era. They must not only master the intelligence collection and analysis capabilities required by traditional intelligence work, but also need to master certain new technologies. With multiple languages and skills, it can work across regions and with multiple people.

5. Limitations of Open Source Cyber Intelligence Efforts

In the development of actual work, open source network intelligence work also has certain limitations and faces some difficult problems.

a. There is a lot of false information on the Internet.

Almost any information can be released through news, blogs, and social media sites, and many people regard news as a reliable source of information and believe that the veracity of news information can not be questioned. But "fake news" incidents emerge in endlessly, such as fake news about German refugees, fake news about ethnic conflicts in France, and fake news about South Korean politicians. According to research conducted by economics professors from Stanford University and New York University cited by the American Observer website, among the more than 700 news websites surveyed, fake news websites accounted for 64. Various sources of intelligence are numerous and complex, and additions, deletions, and modifications may occur in the links of provision, processing, release, and transmission, making it deviate from the original appearance. Especially in the era of mobile Internet, it is even more difficult to distinguish true and false information. At the same time, people may be affected by prejudice when distinguishing the authenticity of information. Therefore, in the face of massive amounts of information on the Internet, open source network intelligence analysts must be skeptical, objective, and fair to verify the information, analyze the authenticity of the information from different standpoints, and verify and restore the truth of the information from multiple data sources.

b. It is the problem of information overload.

According to statistics, in the global information system, the proportion of information waste is no less than 50%, and some disciplines even account for 80%. People have to spend a lot of time and energy to find the right information from massive amounts of information, so the cost of obtaining information is getting higher and higher. In addition, people are easily attracted by different texts, sounds or images, and other social media, and turn their attention to other things, get lost in the massive amount of information, and their focus and persistence on work have dropped significantly. Faced with the problem of information overload, analysts should follow the open source intelligence workflow in actual work. Analysts should follow the working cycle of clarifying mission requirements, doing mission planning and deployment, collecting data according to mission planning, using open source tools to process and analyze data, and reporting and summarizing, so as to avoid getting lost in massive data.

In general, open source network intelligence is widely applicable in various fields such as security and business. Countries around the world have begun to attach importance to the research and application of open source network intelligence. Establishing a stable, independent national open source intelligence agency is critical to open source intelligence work and research. A stable institution is conducive to absorbing open source intelligence practitioners and researchers from all sides, and an independent institution is conducive to avoiding the influence of the secrecy system of covert source intelligence agencies.



Classification of open source intelligence in military operations
Benefits of open source intelligence for due diligence
10 core professional competencies for intelligence analysts
Classification and Content Types of Social Media
Critical Thinking in Intelligence Analysis Work