Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Open-source intelligence
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==History== [[File:911 commission seal.svg|200px|thumb|right|Seal of the [[9/11 Commission]]]] OSINT practices have been documented as early as the mid-19th century in the United States and early 20th century in the United Kingdom.<ref>{{Cite journal |last=Block |first=Ludo |date=2023 |title=The long history of OSINT |journal=Journal of Intelligence History |volume=23 |issue=2 |pages=95–109 |language=en |doi=10.1080/16161262.2023.2224091 |issn=1616-1262|doi-access=free |hdl=1887/3731669 |hdl-access=free }}</ref> OSINT in the [[United States]] traces its origins to the 1941 creation of the [[Foreign Broadcast Intelligence Service|Foreign Broadcast Monitoring Service (FBMS)]], an agency responsible for the monitoring of foreign broadcasts. An example of their work was the correlation of changes in the price of oranges in Paris with successful bombings of railway bridges during [[World War II]].<ref name="BornnMil">{{cite web|last1=Bornn|first1=D Marshall|title=Service members, civilians learn to harness power of 'Open Source' information|url=https://www.army.mil/article/94007/Service_members__civilians_learn_to_harness_power_of__Open_Source__information|website=www.army.mil|access-date=14 May 2017|language=en|date=9 Jan 2013|archive-url=https://web.archive.org/web/20171209101817/https://www.army.mil/article/94007/Service_members__civilians_learn_to_harness_power_of__Open_Source__information|archive-date=9 December 2017|url-status=live}}</ref> The [[Aspin-Brown Commission]] stated in 1996 that US access to open sources was "severely deficient" and that this should be a "top priority" for both funding and [[Director of Central Intelligence|DCI]] attention.<ref>{{Cite book|title=The Five Disciplines of Intelligence Collection|last1=Lowenthal|first1=Mark|last2=Clark|first2=Robert|publisher=CQ Press|year=2015|isbn=978-1483381114|page=18}}</ref> In July 2004, following the [[September 11 attacks]], the [[9/11 Commission]] recommended the creation of an open-source intelligence agency.<ref>See page 413 of the [http://www.9-11commission.gov/report/911Report_FM.pdf 9-11 Commission Report (pdf)] {{Webarchive|url=https://web.archive.org/web/20070705012031/http://www.9-11commission.gov/report/911Report_FM.pdf |date=2007-07-05 }}.</ref> In March 2005, the [[Iraq Intelligence Commission]] recommended<ref name=":0">{{Cite news|last=McLaughlin|first=Michael|date=June 2012|title=Using open source intelligence for cybersecurity intelligence|language=en-GB|work=ComputerWeekly.com|url=https://www.computerweekly.com/tip/Using-open-source-intelligence-software-for-cybersecurity-intelligence|url-status=live|access-date=2018-06-29|archive-url=https://web.archive.org/web/20180629155103/https://www.computerweekly.com/tip/Using-open-source-intelligence-software-for-cybersecurity-intelligence|archive-date=2018-06-29}}</ref> the creation of an open-source directorate at the CIA. Following these recommendations, in November 2005 the [[United States Director of National Intelligence|Director of National Intelligence]] announced the creation of the DNI [[Open Source Center]]. The Center was established to collect information available from "the Internet, databases, press, radio, television, video, geospatial data, photos and commercial imagery."<ref>Office of the Director of National Intelligence. "[http://www.dni.gov/press_releases/20051108_release.htm ODNI Announces Establishment of Open Source Center] {{webarchive|url=https://web.archive.org/web/20060623072458/http://dni.gov/press_releases/20051108_release.htm |date=2006-06-23 }}". Press release, 8 November 2005.</ref> In addition to collecting openly available information, it would train analysts to make better use of this information. The center absorbed the [[Central Intelligence Agency|CIA]]'s previously existing [[Foreign Broadcast Information Service]] (FBIS), originally established in 1941, with FBIS head Douglas Naquin named as director of the center.<ref>Ensor, David. "[http://www.cnn.com/2005/POLITICS/11/08/sr.tues/ The Situation Report: Open source intelligence center] {{Webarchive|url=https://web.archive.org/web/20070325142701/http://www.cnn.com/2005/POLITICS/11/08/sr.tues/ |date=2007-03-25 }}". ''CNN'', 8 November 2005.</ref> Then, following the events of [[September 11 attacks|9/11]] the [[Intelligence Reform and Terrorism Prevention Act]] merged FBIS and other research elements into the [[Office of the Director of National Intelligence]] creating the [[Open Source Enterprise]]. Furthermore, the private sector has invested in tools which aid in OSINT collection and analysis. Specifically, [[In-Q-Tel]], a [[Central Intelligence Agency]] supported venture capital firm in Arlington, VA assisted companies develop web-monitoring and predictive analysis tools. In December 2005, the Director of National Intelligence appointed [[Eliot A. Jardines]] as the Assistant Deputy Director of National Intelligence for Open Source to serve as the Intelligence Community's senior intelligence officer for open source and to provide strategy, guidance and oversight for the [[National Open Source Enterprise]].<ref>Office of the Director of National Intelligence "[http://www.dni.gov/press_releases/20051207_release.htm ODNI Senior Leadership Announcement] {{webarchive|url=https://web.archive.org/web/20060623072305/http://dni.gov/press_releases/20051207_release.htm |date=2006-06-23 }}". Press release, 7 December 2005.</ref> Mr. Jardines has established the National Open Source Enterprise<ref>[http://upload.wikimedia.org/wikipedia/en/b/b4/NationalOpenSourceEnterprise.pdf "National Open Source Entreprise Vision Statement"] {{webarchive|url=https://web.archive.org/web/20070928150640/http://upload.wikimedia.org/wikipedia/en/b/b4/NationalOpenSourceEnterprise.pdf |date=2007-09-28 }} May 2006</ref> and authored [[Intelligence Community Directive 301|intelligence community directive 301]]. In 2008, Mr. Jardines returned to the private sector and was succeeded by [[Dan Butler (civil servant)|Dan Butler]] who is ADDNI/OS<ref>[http://www.dniopensource.org/Conference/Agenda.aspx DNI Open Source Conference 2008 "Decision Advantage" agenda, Office of the Director of National Intelligence, July 2008.] {{webarchive|url=https://web.archive.org/web/20100417020406/http://www.dniopensource.org/Conference/Agenda.aspx |date=2010-04-17 }}</ref> and previously Mr. Jardines' Senior Advisor for Policy.<ref>[http://www.dniopensource2007.com/sessions.cfm DNI Open Source Conference 2007 "Expanding the Horizons" agenda, Office of the Director of National Intelligence, July 2007.] {{webarchive|url=https://web.archive.org/web/20080801081412/http://www.dniopensource2007.com/sessions.cfm |date=2008-08-01 }}</ref> === Tools === [[File:Command Post Computing Environment multiple screens Photo US Army released to Public Domain.jpg|alt=<nowiki>Systematic Software Engineering uses open source intelligence, compiled by [[Janes Information Services]], as part of its intelligence platform.</nowiki>|thumb|Open source intelligence may be ingested to battle management systems such as CPCE by [[Systematic Software Engineering|Systematic]], which uses an open source feed from [[Janes Information Services]].]] Open-source intelligence (OSINT) relies on a wide range of tools and platforms to collect, analyze, and validate publicly available information. These tools vary from general-purpose web browsers to specialized software and frameworks designed specifically for open-source investigations. === 1. General Purpose Platforms === The web browser serves as a foundational tool in OSINT workflows, granting access to vast amounts of publicly available data across websites, forums, blogs, and databases. It also enables the use of both open-source and proprietary software tools—either purpose-built for OSINT or adaptable for intelligence-gathering purposes. === 2. Specialized OSINT Tools and Frameworks === A number of dedicated tools and platforms have been developed to streamline the process of gathering and analyzing open-source information. These include: * Maltego : A data visualization tool used for link analysis and reconnaissance. * Shodan : A search engine for internet-connected devices, often used in cybersecurity research. * TheHarvester : A tool used for e-mail harvesting and subdomain enumeration. * FOCA (Fingerprinting Organizations with Collected Archives) : Used to extract metadata and find hidden information in documents. * Recon-ng : A full-featured web reconnaissance framework written in Python. The OSINT Framework , an open-source project maintained on GitHub, provides a categorized directory of over 30 major types of OSINT tools, covering areas such as social media investigation, geolocation, domain analysis, and more.[3] === 3. Training and Educational Resources === Given the evolving nature of digital platforms and online tools, continuous learning is essential for effective OSINT practice. Numerous educational organizations, investigative groups, and training institutions offer resources to support skill development in this field. Notable contributors include: * Bellingcat : An independent collective known for its open-source investigative journalism. * SANS Institute : Offers courses and certifications focused on cybersecurity and digital forensics, including OSINT-related topics. * IntelTechniques : Provides training materials and tools for journalists, law enforcement, and researchers. Books such as ''Open Source Intelligence Techniques'' by Michael Bazzell serve as practical guides to navigating the digital landscape, offering curated lists of tools and techniques across multiple domains. However, due to the rapid pace of change in the online environment, the author emphasizes the importance of ongoing study, training, and adaptation to maintain relevance and effectiveness in OSINT operations.[1] === 4. Operational Security (OPSEC) Tools === As OSINT practitioners often conduct sensitive or public investigations, maintaining personal safety and operational security is critical. Analysts may employ various tools to protect their identity and digital footprint. Ryan Fedasiuk, an analyst at the Center for Security and Emerging Technology, recommends several OPSEC best practices and tools, including: * Virtual Private Networks (VPNs) * Cached webpage services (e.g., Google Cache, Wayback Machine) * Digital archive services * URL and file scanners (e.g., VirusTotal) * Browser sandbox applications * Antivirus software These tools help reduce exposure to potential threats when conducting online investigations, especially when researching adversarial or high-risk subjects.[2] === 5. Integration with Larger Systems === In institutional settings, OSINT is often integrated into broader command and control systems. For example, CPCE (Command Post Communications Environment) by Systematic incorporates open-source feeds such as those provided by Jane’s Information Services , enabling real-time intelligence integration into military and defense operations.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)