Professional Documents
Culture Documents
net/publication/318848899
CITATIONS READS
0 66
1 author:
Mohamed Motawei
Carleton University
7 PUBLICATIONS 0 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Mohamed Motawei on 02 August 2017.
Mohamed Motawei
used in the intelligence process, their value was seen as secondary, 4 despite
the fact that it is estimated that OSINT provides between 80 and 95 percent
1
of the information used by the intelligence community. 5 Several terms could
OSINT Definition
What does constitute OSINT and how is it distinguished from other types of
2
OSINT achieves the status of an intelligence discipline. However, the North
disciplines, not an intelligence discipline in its own right. 8 OSINT is the object
(i.e. the raw intelligence-value data) and the process through which the
OSINT Significance
Benavides notes that the NATO OSINT handbook says that OSINT is vital to
The September 11, 2001 terrorist attacks on the United States prompted the
Congress to pass the Patriot Act. The vital part of the Patriot Act with regards
3
interception of communications if they are related to terrorist activities and
Theoretical Debate
fact that the literature pertaining to OSINT is limited, 13 some scholars have
4
Lowenthal who notes that analysts prefer classified sources; 15 Pringle who
were exerted by scholars with the objective of examining OSINT within the
context of federal policy initiatives, including the War on Drugs. 18 For her
part, Sands calls for devoting more human and technical resources for
this research concludes that such a viewpoint turned the CIA-affiliated Open
OSINT Drivers
16 Robert W. Pringle, “The Limits of OSINT: Diagnosing the Soviet Media, 1985–
1989,” International Journal of Intelligence and Counter-Intelligence, Vol. 16, No. 4,
Summer 2003, pp. 280–289.
17 Stephen C. Mercado, “A Venerable Source in a New Era: Sailing the Sea of OSINT
in the Information Age,” Studies in Intelligence, Vol. 48, No. 3, 2004, pp. 45–55.
18 Hamilton Bean, No More Secrets: Open Source Information and the Reshaping of
US Intelligence, (Santa Barbara, CA: ABC CLIO, 2011), p. 13; J. F. Holden-Rhodes,
Sharing the Secrets: Open Source Intelligence and the War on Drugs, (Westport, CT:
Praeger Security International, 1997), pp. 45-47.
5
is publically available and not classified at its origin. 20 In other words, open
universities.21 Since the end of the Cold War, threats have multiplied and
became more diverse in terms of their agents and nature, 22 including, inter
another driver for OSINT, since the evolution of the Internet has alerted
security actors to the potential of new tools and technologies for collecting,
21 Pallaris, p. 1.
23 Asle Toje, America, the EU, and Strategic Culture: Renegotiating the Transatlantic
Bargain, (Oxon: Routledge, 2008), p. 128; Liana Sun Wyler, “Weak and Failing
States: Evolving Security Threats and US Policy,” CRS Report for Congress, August
28, 2008, pp. 5-8.
24 Jonathan Zittrain, The Future of the Internet and How to Stop It, (New Haven, CT:
Yale University Press, 2008), 203-205; Julian Richards, A Guide to National Security:
Threats, Responses, and Strategies, (Oxford: Oxford University Press, 2012), pp. 41-
42.
6
governments two decades ago.25 Noteworthy, the information pertaining to
the 9/11 terrorist attacks were derived mainly from foreign sources.
precaution when dealing with the foreign press, since it bears signs of
terrorist threats. Moshirnia concludes that “US security often derives from
Benefits
OSINT advocates are keen to highlight its benefits. First, OSINT depends on
telephone calls. OSINT offers advantages for its users, since it is cost-
fact that OSINT can be shared makes it a high value commodity. Other media
sources such as the radio, television, and newspaper are widely accessible
26 Andrew Moshirnia, “Valuing Speech and OSINT in the Face of Judicial Deference,”
Harvard National Security Journal, vol. 4, no. 2, 2013, pp. 385-454, pp. 386-387.
27 Richard A. Best and Alfred Cumming, “Open Source Intelligence (OSINT): Issues
for Congress,” CRS Report for Congress, December 5, 2007, p. 2,
https://www.fas.org/sgp/crs/intel/RL34270.pdf.
7
source information is less credible has been discredited by recent literature
OSINT equals Google; it is free; and it is easy.29 Finally, OSINT enables the
security agenda.30
OSINT does not provide the complete solution for the intelligence
8
community.32 Third, Oliver-Jonson says that, apart from the failure to invest in
United States has created three consistent errors since the evolution of
dimensions that support their claims. For example, Zegart admits that the
objective of informing and contributing to the theory. Bean notes that the
9
and a limited number of trained professionals. Sixth, Zegart, on the contrary
post–Cold War world.36 Finally, OSINT poses challenges for privacy protection
Analysis of OSC
(OSC) was established in November 2005. 37 It seems that the current debate
competing positions concerning the definition and role of OSINT, the role of
37 National Commission on Terrorist Attacks Upon the United States, The 9/11
Commission Report, (Washington, DC: US Government Printing Office, 2011), p. 413;
Jan Goldman (ed.), The Central Intelligence Agency: An Encyclopedia of Covert Ops,
Intelligence Gathering, and Spies, (Santa Barbara, CA: ABC-CLIO), vol. ii, p. 280.
38 https://www.opensource.gov/public/content/login/login.fcc.
10
The OSC builds on the work of the Foreign Broadcast Information Service
media. Before its metamorphosis into the OSC, FBIS provided translation,
monitoring, and analysis of foreign Internet, print, radio, television, and other
sources.39
Beyond that, what you get out of the [OSC] is this enabling
grab it.40
General Hayden, who became director of the CIA which runs the OSC, took
11
status within the intelligence community; that is, continuing the FBIS process
anything.” In other words, the structural change from FBIS to OSC was not
much of the need for secret intelligence, the OSC failed to substitute for the
41 For those who rely heavily on covert intelligence at the expense of overt
intelligence, Mercado says, “Those who swear that secrets are the only true
intelligence, in contrast to mere ‘information’ found through open means, would do
well to consider the indistinct character of the categories of overt and covert in
intelligence. . . . Overt and covert streams of intelligence are by no means
completely parallel and distinct; they often mingle and meander over one another’s
territory” (Stephen C. Mercado, “Reexamining the Distinction between Open
Information and Secret,” Central Intelligence Agency, April 15, 2007,
https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-
studies/studies/Vol49no2/reexamining_the_distinction_3.htm). The fact is that where
the demarcation line between “information” and “intelligence” is drawn has much to
do with stakeholders’ persuasive appeals, and less to do with any intrinsic quality of
the information itself.
12
retribution,”43 not to mention the uncovered cases of sexual harassment and
complaints against unequal payments for the same positions on the basis of
slipped away to its old ways despite the much publicized WMD Commission
recommendations.
The Defense Authorization Act says, “With the Information Revolution, the
exploded, but the Intelligence Community has not expanded its exploitation
this challenge, the US government created the OSC in 2005, but it seems
13
The OSC officials focused on collecting, not acquiring, information. Indeed,
the massive quantity of items on the OSC website shows that its officials
sought raw material, not processed information. 46 With the exception of the
the OSC collected items on a routine basis, knowing that it rarely received a
feedback. In other words, no one bothered to read the OSC items in Reston,
The fact that the OSC is dependent on linguists—not analysts— who are
based outside the US territories led to another issue; that is, dependence on
linguists from the target region in order to avoid any biases or preferences.
misconduct,47 or due to the fact that were fired or left the OSC after their
46 See the attached file, knowing that the fully translated items were not produced
by the OSC-Doha bureau, which tended to focus on transcribed items despite the
fact that it was instructed to follow up on the 2011 uprising against President Hosni
Mubarak.
47 A Palestinian linguist, Sameh Arafat, was dismissed from the OSC due to his low
translation skills and the alleged organization of orgies and procurement of women
for Qatari citizens. In 2008, at least two OSC employees (i.e. Jordanian linguist
Majed al-Masri and OSC Site Manager Eliana Karam) were dismissed after they had
been caught watching porn videos at their stations.
14
complaints had not been properly addressed.48 Third, the Arab-majority work
OSC bureaus overseas, but these bureaus lost any reason for existence,
by the Internet, using programs such as DAVE. Therefore, the need to have
Arab linguists at bureaus in the target region is pointless, since they could be
easily replaced by American linguists, who are computer literate and have
linguistic skills. As for the OSC bureaus overseas, it is an open secret that
15
OSC bureaus abroad, including Doha, while they hired linguists for relatively
Americans, and, even, on the basis of personal issues). 52 Finally, the OSC-
Doha is based on picking up Arab linguists from Lebanon, Jordan, and Egypt.
In order to have a security clearance, the linguist should not have worked for
Mixed Results
Empirical evidence shows that the OSC bureaus were highly inefficient in the
Arab region. For example, Western journalists and reporters who visited the
Middle East predicted the Arab Spring, while the OSC Arab-speaking staff
(and, consequently, US analysts) failed to do so, despite the fact that the
52 One of the clearest examples was a Lebanese linguist who went by the name
Aline Assaf. This person was hired with an extra 4,000 Qatari riyals, and she did not
any extra work and, even, all she had to do was to transcribe three or four items
from English newspapers per day. This is to say that she did not translate any items
or make newscast summaries as any other linguist. The frustrated linguists who
complained against Assaf’s privileges were called to a meeting with Sean Myatt, a
US contractor, who told them bluntly that his company deals with linguists on a
case-by-case basis. After a few months, Aline Assaf was promoted to the position of
FOSO. It was said that this promotion was due to a sexual service done to Deputy
Manager Mike Johnson.
16
several bureaus (e.g. Amman, Doha, London, Tel Aviv) with the single
objective of keeping a close eye on the Arab countries. In addition, there are
information difficult and quite unreliable, so the majority of the OSC items
intelligence and ignored open source information from social media and
blogs posts by Libyan nationals, that could have warned the potential
In order to find tasks for the underemployed linguists, the OSC devised a
unique technique; that is, covering reactions to official events (e.g. a high-
53 Andy Kroll, “Meet the Author Who Predicted the Arab Spring and Occupy Wall
Street,” Mother Jones, March 1, 2012,
http://www.motherjones.com/politics/2012/03/jonathan-schell-interview-role-
nonviolent-action-occupy-arab-spring.
54 http://fas.org/irp/congress/2014_rpt/benghazi.pdf.
17
Recommendations
Doha bureau proved to be a waste of money and efforts, and the only ones
who made use of it were a handful of US and local contractors as well as low-
Making no analysis of the raw information is equal to, if not worse than, not
having it at all. In a stark contradiction to the failing OSC bureaus, the work
inconsistent, low-skilled work of the Doha bureau linguists, despite the fact
that the basic salaries of the Doha-based linguists are higher. Cairo’s
analysis of critical items. Nicosia’s linguists used to edit the work of the
Doha-based OSC linguists, since the Doha bureau lacked US analysts and
high-skilled editors.
18
Interpersonal relations, communication skills, and organizational culture
elements for leading positions—a thing that affected the quality of the OSC
OSC, since it is not merely an extension of FBIS, but an intelligence unit that
References
Books
Bean, Hamilton; No More Secrets: Open Source Information and the Reshaping of
US Intelligence, (Santa Barbara, CA: ABC CLIO, 2011).
Beare, Margaret E. (ed.); Encyclopedia of Transnational Crime and Justice, (Los
Angeles, CA: Sage, 2012).
Goldman, Jan (ed.); The Central Intelligence Agency: An Encyclopedia of Covert Ops,
Intelligence Gathering, and Spies, (Santa Barbara, CA: ABC-CLIO), vol. ii.
Holden-Rhodes, J. F.; Sharing the Secrets: Open Source Intelligence and the War on
Drugs, (Westport, CT: Praeger Security International, 1997).
Johnson, Loch K.; Handbook of Intelligence Studies, (Oxon: Routledge, 2007).
Johnson, Lock K. (ed.); Strategic Intelligence: Understanding the Hidden Side of
Government, (Westport, CT: Praeger Security International, 2007).
Richards, Julian; A Guide to National Security: Threats, Responses, and Strategies,
(Oxford: Oxford University Press, 2012).
Shorrock, Tim; Spies for Hire: The Secret World of Intelligence Outsourcing, (New
York: Simon and Schuster, 2008).
Toje, Asle; America, the EU, and Strategic Culture: Renegotiating the Transatlantic
Bargain, (Oxon: Routledge, 2008).
Zittrain, Jonathan; The Future of the Internet and How to Stop It, (New Haven, CT:
Yale University Press, 2008).
Academic Articles
Davies, Philip; “Ideas of Intelligence: Divergent National Concepts and Institutions,”
in Christopher Andrew, Richard J. Alderich, and Wesley K. Wark (ed.), Secret
Intelligence: A Reader, (Oxon: Routledge, 2009), pp. 12-25.
Sands, Amy; “Integrating Open Sources into Transnational Threat Assessments,” in
Jennifer E. Sims and Burton Gerber (eds.), Transforming US Intelligence,
19
(Washington, DC: Georgetown University Press, 2005), pp. 63–78.
Official Documents
Committee on the Future US Workforce for Geospatial Intelligence, “Future US
Workforce for Geospatial Intelligence,” (Washington, DC: National Academies Press,
2013).
Liana Sun Wyler, “Weak and Failing States: Evolving Security Threats and US Policy,”
CRS Report for Congress, August 28, 2008.
National Commission on Terrorist Attacks Upon the United States, The 9/11
Commission Report, (Washington, DC: US Government Printing Office, 2011).
United States Congress, House of Representatives, National Defense, Authorization Act for
Fiscal Year 2006, 109th Cong., 1st sess., H.R.1815.
Periodicals
Benes, Libor; “OSINT, New Technologies, Education: Expanding Opportunities and
Threats—A New Paradigm,” Journal of Strategic Security, vol. 6, no. 3, Fall 2013, pp.
22-37.
Bonfanti, Matteo E.; and Andrew P. Rebera, “Internet-Based Intelligence: Prediction
or Foreknowledge?” in Emilio Mordini and Manfred Green (ed.), Internet-Based
Intelligence in Public Health Emergencies: Early Detection and Response in Disease
Outbreak Crises, (Amsterdam: IOS Press, 2013), pp. 11-24.
Borene, Andrew M.; “Unclassified Information,” Journal of Counterterrorism and Homeland
Security International, vol. 17, no. 4, Winter 2011, pp. 10-12.
Draeger, Walter R.; “Take advantage of OSINT,” Military Intelligence Professional
Bulletin, July-September 2009, vol. 35, no. 3, pp. 39-44.
Garicano, Luis; and Richard A. Posner, “Intelligence Reform since 9/11: An Organizational
Economics Perspective,” Journal of Economic Perspectives, Vol. 19, No. 4, Fall 2005, pp. 151–
170.
Hulnick, Arthur S.; “The Downside of Open Source Intelligence,” International
Journal of Intelligence and Counter-Intelligence, Vol. 15, No. 4, Winter 2002–2003.
Lowenthal, Mark; “Open Source Intelligence: New Myths, New Realities,”
Intelligencer, Vol. 10, No. 1, February 1999.
Mercado, Stephen C.; “A Venerable Source in a New Era: Sailing the Sea of OSINT in
the Information Age,” Studies in Intelligence, Vol. 48, No. 3, 2004, pp. 45–55.
Moshirnia, Andrew; “Valuing Speech and OSINT in the Face of Judicial Deference,”
Harvard National Security Journal, vol. 4, no. 2, 2013, pp. 385-454.
Pallaris, Chris; “Open Source Intelligence: A Strategic Enabler of National Security,” CSS
Analysis in Security Policy, vol. 3, no. 32, April 2008, pp. 1-3.
Politi, Alessandro; “The Citizen as ‘Intelligence Minuteman,’” International Journal of
Intelligence and Counter-Intelligence, Vol. 16, No. 1, Spring 2003, pp. 34–38.
Pringle, Robert W.; “The Limits of OSINT: Diagnosing the Soviet Media, 1985–1989,”
International Journal of Intelligence and Counter-Intelligence, Vol. 16, No. 4, Summer
2003, pp. 280–289.
Zegart, Amy B.; “September 11 and the Adaptation Failure of US Intelligence
Agencies,” International Security, Vol. 29, No. 4, 2005, pp. 78–111.
Newspapers
Susan B. Glasser, “Probing Galaxies of Data for Nuggets,” Washington Post,
November 25, 2005.
Internet
20
Army, Department of the; “Open Source Intelligence,” December 2006,
https://fas.org/irp/doddir/army/fmi2-22-9.pdf.
Bean, Hamilton; “The DNI’s Open Source Center: An Organizational Communication
Perspective,” International Journal of Intelligence and Counter-Intelligence, Volume
20, Issue 2 June 2007 , pages 240-257, http://newsdetails.blogspot.ca/2007/05/dnis-
open-source-center-organizational.html.
Benavides, E. B.; “Open Source Intelligence (OSINT) Link Directory: Targeting Tomorrow’s
Terrorist Today (T4) through OSINT,” Creative Commons, June 2011,
https://search.wikileaks.org/gifiles/attach/10/10459_Open%20Source%20In.pdf.
Best, Richard A.; and Alfred Cumming, “Open Source Intelligence (OSINT): Issues for
Congress,” CRS Report for Congress, December 5, 2007,
https://www.fas.org/sgp/crs/intel/RL34270.pdf.
Grabanowski, Ed; “How the Patriot Act Works,” HowStuffWorks.com, July 6, 2014,
http://people.howstuffworks.com/patriot-act.htm.
Kempe, Shannon; “Managing Data for a 21st Century Hegemony,” Dataversity,
January 4, 2012, http://www.dataversity.net/managing-data-for-a-21st-century-
hegemony/.
Kroll, Andy; “Meet the Author Who Predicted the Arab Spring and Occupy Wall
Street,” Mother Jones, March 1, 2012,
http://www.motherjones.com/politics/2012/03/jonathan-schell-interview-role-
nonviolent-action-occupy-arab-spring.
Martin, R. M.; “Disaster Relief Intelligence Support,” Marine Corps Gazette, vol. 98,
no. 1, 2014, p. 39-42, http://search.proquest.com/docview/1477207200?
accountid=145-85.
Maxwell, Jordan; “Embedded Commission Guys,” Wealth Professional, March 12,
2015, http://www.wealthprofessional.ca/news/embedded-commission-guys-dont-
rush-trailer-fee-review-189163.aspx.
Mercado, Stephen C.; “Reexamining the Distinction between Open Information and Secret,”
Central Intelligence Agency, April 15, 2007, https://www.cia.gov/library/center-for-the-study-
of-intelligence/csi-publications/csi-
studies/studies/Vol49no2/reexamining_the_distinction_3.htm.
Morrow, Craig D.; “OSINT: Truths and Misconceptions,” Military Intelligence
Professional Bulletin, vol. 39, no. 2, pp. 31-34, https://www.highbeam.com/doc/1P3-
3181745241.html.
NATO, NATO Open Source Intelligence Handbook, November 2001,
http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b
258c/NATO%20OSINT%20Handbook%20v1.2%20-%20Jan%202002.pdf.
Nolte, William; “The Intelligence Community in the DNI Era: A One-year
Assessment,” paper presented as part of the panel “Intelligence Community
Reform, One Year After” at the annual meeting of the International Studies
Association, San Diego, CA, March 2006, http://www.isanet.org/sandiego/.
Oliver-Johnson, Lisa N.; “What are the Weaknesses of Open Source Intelligence
(OSINT)?” Strategic Intelligence, Spring 2013,
http://www.slideshare.net/RDSWEB/osint-oliverjohnsonresearch-intl501/.
Roop, Joseph E.; “Foreign Broadcast Information Service,” Central Intelligence Agency,
August 11, 2009, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-
publications/books-and-monographs/foreign-broadcast-information-service/.
Unattributed report, “DSS Whistleblower Hearing Finally Scheduled,” Whistleblower
Support Blog, January 19, 2015, https://gflorencescott.wordpress.com/.
21