An Army Introduction to Open Source Intelligence
A new U.S. Army publication provides an introduction to open source intelligence, as understood and practiced by the Army.
“Open-source intelligence is the intelligence discipline that pertains to intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence and information requirement,” the document says.
“The world is being reinvented by open sources. Publicly available information can be used by a variety of individuals to [achieve] a broad spectrum of objectives. The significance and relevance of open-source intelligence (OSINT) serve as an economy of force, provide an additional leverage capability, and cue technical or classified assets to refine and validate both information and intelligence.”
See “Open-Source Intelligence,” Army Techniques Publication (ATP) 2-22.9, July 2012.
The new manual is evidently intended for soldiers in the field rather than professional analysts, and it takes nothing for granted. At some points, the guidance that it offers is remedial rather than state of the art.
For example, “if looking for information about Russian and Chinese tank sales to Iraq, do not use ‘tank’ as the only keyword in the search. Instead, use additional defining words such as ‘Russian Chinese tank sales Iraq’.”
But the manual reflects the ongoing maturation of open source intelligence (OSINT), and it contains several observations of interest.
“The reliance on classified databases has often left Soldiers uninformed and ill-prepared to capitalize on the huge reservoir of unclassified information from publicly available information and open sources,” the manual states.
Classification can also be a problem in open source intelligence, however, and “concern for OPSEC [operations security] can undermine the ability to disseminate inherently unclassified information.”
“Examples of unclassified information being over-classified [include] reported information found in a foreign newspaper [and a] message from a foreign official attending an international conference.”
Therefore, pursuant to Army regulations, “Army personnel will not apply classification or other security markings to an article or portion of an article that has appeared in a newspaper, magazine, or other public medium,” although the resulting OSINT analysis might be deemed “controlled unclassified information.”
Curiously, the new manual itself is blocked from access by the general public on Army websites (such as this one). But an unrestricted copy was released by the Army on request.
Somewhat relatedly, the Department of Defense this week published a new Instruction on DoD Internet Services and Internet-Based Capabilities, DODI 8550.01, September 11, 2012.
It is in the interests of the United States to appropriately protect information that needs to be protected while maintaining our participation in new discoveries to maintain our competitive advantage.
The question is not whether the capital exists (it does!), nor whether energy solutions are available (they are!), but whether we can align energy finance quickly enough to channel the right types of capital where and when it’s needed most.
Our analysis of federal AI governance across administrations shows that divergent compliance procedures and uneven institutional capacity challenge the government’s ability to deploy AI in ways that uphold public trust.
From California to New Jersey, wildfires are taking a toll—costing the United States up to $424 billion annually and displacing tens of thousands of people. Congress needs solutions.