Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise

Heather J. Williams, Ilana Blum

ResearchPublished May 17, 2018

This report presents a framework for understanding the modern practice of open source intelligence. It reviews the literature on open source intelligence and reexamines definitions used in other areas by the U.S. Intelligence Community in the context of modern open source information. The report describes the evolution of open source intelligence over the past 50-plus years, defines open source information and the open source intelligence cycle, and draws parallels between open source as an intelligence discipline and other intelligence disciplines. It also examines the methods used by open source tools and the challenges of using off-the-shelf technology for open source analysis. It concludes by suggesting areas for further study.

Key Findings

Second-Generation Open Source Intelligence (OSINT) and the OSINT Cycle

  • OSINT has been revolutionized over the past two decades.
  • OSINT is often underutilized by the Intelligence Community because of the difficultly in understanding emerging OSINT sources and methods, particularly social media platforms.
  • A more robust definition of OSINT is needed, as open source data can come in many forms.
  • Commercial off-the-shelf tools can serve the interests of the Intelligence Community, but they are rarely a perfect match, and many tools have extremely limited utility for intelligence analysis because they are not designed for its purposes.
  • Rapid advances in machine learning and natural language processing are changing the efficiency of these methods for sorting, translating, and analyzing data for intelligence purposes.
  • There are many opportunities for further research into OSINT methodology, commercial off-the-shelf tools for open source analysis, and open source analytic methods to bring greater intelligence value to the IC and to enable more-efficient operations.

Recommendations

  • A rigorous evaluation of the difficulty of the OSINT methodological cycle for different OSINT subtypes could provide for a better division of resources and effort among various OSINT sources.
  • The Intelligence Community could benefit greatly from additional work on analytic methods and existing analytic tools.
  • A living database of the various platforms could assist the Intelligence Community offices that have an OSINT function, enabling them to spend resources wisely and avoid redundancies.
  • It would be productive to evaluate the allocation of Intelligence Community resources between the types of open source information and to explore areas where data science and analytic tools could enhance the Intelligence Community's use of all types of open source information.

Order a Print Copy

Format
Paperback
Page count
62 pages
List Price
$18.00
Buy link
Add to Cart

Topics

Document Details

  • Availability: Available
  • Year: 2018
  • Print Format: Paperback
  • Paperback Pages: 62
  • Paperback Price: $18.00
  • Paperback ISBN/EAN: 978-0-8330-9883-2
  • DOI: https://doi.org/10.7249/RR1964
  • Document Number: RR-1964-OSD

Citation

RAND Style Manual
Williams, Heather J. and Ilana Blum, Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise, RAND Corporation, RR-1964-OSD, 2018. As of September 11, 2024: https://www.rand.org/pubs/research_reports/RR1964.html
Chicago Manual of Style
Williams, Heather J. and Ilana Blum, Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise. Santa Monica, CA: RAND Corporation, 2018. https://www.rand.org/pubs/research_reports/RR1964.html. Also available in print form.
BibTeX RIS

This research was prepared for the Office of the Secretary of Defense conducted within the Cyber and Intelligence Policy Center of the RAND National Defense Research Institute, a federally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.

This publication is part of the RAND research report series. Research reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND research reports undergo rigorous peer review to ensure high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.