Open-source intelligence
Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an
intelligence context.[1] In the intelligence community, the term "open" refers to overt, publicly available
sources (as opposed to covert or clandestine sources). It is not related to open-source software or
collective intelligence.
OSINT under one name or another has been around for hundreds of years. With the advent of instant
communications and rapid information transfer, a great deal of actionable and predictive intelligence can
now be obtained from public, unclassified sources.
Contents
Principles
Definition
History
Risks for practitioners
Value
Process
OSINT Community Disciplines
United States
Government
Intelligence
Armed Forces
Homeland Security
Law enforcement
Business
Private Specialized Business (assisting the Criminal Justice field)
Ukraine
OSINT projects in Ukraine
Open Source Intelligence analysis software
See also
References
Literature
External links
Principles
Open Source Intelligence (OSINT) is the collection and analysis of information that is gathered from
public, or open, sources.[2] OSINT is primarily used in national security, law enforcement, and business
intelligence functions and is of value to analysts who use non-sensitive intelligence in answering
classified, unclassified, or proprietary intelligence requirements across the previous intelligence
disciplines.
OSINT sources can be divided up into six different categories of information flow:[3]
Media, print newspapers, magazines, radio, and television from across and between
countries.
Internet, online publications, blogs, discussion groups, citizen media (i.e. – cell phone
videos, and user created content), YouTube, and other social media websites (i.e. –
Facebook, Twitter, Instagram, etc.). This source also outpaces a variety of other sources
due to its timeliness and ease of access.
Public Government Data, public government reports, budgets, hearings, telephone
directories, press conferences, websites, and speeches. Although this source comes from
an official source they are publicly accessible and may be used openly and freely.
Professional and Academic Publications, information acquired from journals,
conferences, symposia, academic papers, dissertations, and theses.
Commercial Data, commercial imagery, financial and industrial assessments, and
databases.
Grey literature, technical reports, preprints, patents, working papers, business documents,
unpublished works, and newsletters.
OSINT is distinguished from research in that it applies the process of intelligence to create tailored
knowledge supportive of a specific decision by a specific individual or group.[4]
Definition
OSINT is defined by both the U.S. Director of National Intelligence and the U.S. Department of Defense
(DoD), as "produced from publicly available information that is collected, exploited, and disseminated in
a timely manner to an appropriate audience for the purpose of addressing a specific intelligence
requirement."[5]
According to political scientist Jeffrey T. Richelson, “open source acquisition involves procuring, verbal,
written, or electronically transmitted material that can be obtained legally. In addition to documents and
videos available via the Internet or provided by a human source, others are obtained after U.S. or allied
forced have taken control of a facility or site formerly operated by a foreign government or terrorist
group.”[6]
Security researcher Mark M. Lowenthal defines OSINT as “any and all information that can be derived
from overt collection: all types of media, government reports and other documents, scientific research
and reports, commercial vendors of information, the Internet, and so on. The main qualifiers to open-
source information are that it does not require any type of clandestine collection techniques to obtain it
and that it must be obtained through means that entirely meet the copyright and commercial requirements
of the vendors were applicable."[7]
History
OSINT in the United States traces its origins to the creation of the
Foreign Broadcast Monitoring Service (FBMS), an agency
responsible for the monitoring of foreign broadcasts. An example of
their work is reflected in the application of the correlation of
changes in the price of oranges in Paris with that of railway bridges
being bombed successfully.[8]
The Aspin-Brown Commission stated in 1996 that US access to
open sources was "severely deficient" and that this should be a "top
priority" for both funding and DCI attention.[9]
Seal of the 9/11 Commission
In July 2004, following the September 11 attacks, the 9/11
Commission recommended the creation of an open-source
intelligence agency.[10] In March 2005, the Iraq Intelligence Commission recommended the creation of
an open-source directorate at the CIA.
Following these recommendations, in November 2005 the Director of National Intelligence announced
the creation of the DNI Open Source Center. The Center was established to collect information available
from "the Internet, databases, press, radio, television, video, geospatial data, photos and commercial
imagery."[11] In addition to collecting openly available information, it would train analysts to make better
use of this information. The Center absorbed the CIA's previously existing Foreign Broadcast
Information Service (FBIS), originally established in 1941, with FBIS head Douglas Naquin named as
director of the Center.[12] Then, following the events of 9/11 the Intelligence Reform and Terrorism
Prevention Act merged FBIS and other research elements into the Office of the Director of National
Intelligence creating the Open Source Enterprise.
Furthermore, the private sector has invested in tools which aid in OSINT collection and analysis.
Specifically, In-Q-Tel, a Central Intelligence Agency supported venture capital firm in Arlington, VA
assisted companies develop web-monitoring and predictive analysis tools.
In December 2005, the Director of National Intelligence appointed Eliot A. Jardines as the Assistant
Deputy Director of National Intelligence for Open Source to serve as the Intelligence Community's
senior intelligence officer for open source and to provide strategy, guidance and oversight for the
National Open Source Enterprise.[13] Mr. Jardines has established the National Open Source
Enterprise[14] and authored intelligence community directive 301. In 2008, Mr. Jardines returned to the
private sector and was succeeded by Dan Butler who is ADDNI/OS[15] and previously Mr. Jardines'
Senior Advisor for Policy.[16]
Risks for practitioners
A main hindrance to practical OSINT is the volume of information it has to deal with ("information
explosion"). The amount of data being distributed increases at a rate that it becomes difficult to evaluate
sources in intelligence analysis.
Accredited journalists have some protection in asking questions, and researching for recognized media
outlets. Even so, they can be imprisoned, even executed, for seeking out OSINT. Private individuals
illegally collecting data for a foreign military or intelligence agency is considered espionage in most
countries. Of course, espionage that is not treason (i.e. betraying one's country of citizenship) has been a
tool of statecraft since ancient times.[17]
Value
OSINT is valuable because it has less rigorous processing and exploitation processes and timelines than
more technical intelligence disciplines such as HUMINT, SIGINT, MASINT, GEOINT, etc.
Additionally, OSINT collects a valuable variety of opinions because it encompasses a great variety of
sources.
According to the Commission on the Intelligence Capabilities of the United States Regarding Weapons of
Mass Destruction report submitted in March 2005, OSINT must be included in the all-source intelligence
process for the following reasons (as stated in the report):
1. The ever-shifting nature of intelligence needs compels the IC (Intelligence Community) to
quickly and easily understand a wide range of foreign countries and cultures. – … today's
threats are rapidly changing and geographically diffuse; an intelligence analyst may be
forced to shift rapidly from one topic to the next. Increasingly, IC professionals need to
quickly assimilate social, economic, and cultural information about a country—information
often detailed in open sources.
2. Open-source information provides a base for understanding classified materials. Despite
large quantities of classified material produced by the IC, the amount of classified
information produced on any one topic can be quite limited, and may be taken out of context
if viewed only from a classified-source perspective. A notable example relates to terrorism,
where open-source information can fill gaps and create links that allow analysts to better
understand fragmented intelligence, rumored terrorist plans, possible means of attack, and
potential targets.
3. Open-source materials can protect sources and methods. Sometimes an intelligence
judgment that is actually informed with sensitive, classified information can be defended on
the basis of open-source reporting. This can prove useful when policy-makers need to
explain policy decisions or communicate with foreign officials without compromising
classified sources.
4. Only open source can store history. A robust open-source program can, in effect, gather
data to monitor the world's cultures and how they change with time. This is difficult, if not
impossible, using the snapshots provided by classified collection methods.[18]
Process
OSINT is a highly diverse form of intelligence collection and analysis. It does not have its own agency,
however, units are scattered within the Department of Defense and the State Department.[19] Most
OSINT collectors need to take precautions while collecting information from the Internet. This can come
in the form of using a VPN to anonymize their identity and collect information more discreetly. This is
where evaluating sources becomes important to the overall OSINT collection and analysis process. An
OSINT analyst needs intelligence evaluation to determine a true process or expose a false process that
would affect predicting the future. Finally, the analysts need to find use of the evaluated intelligence so
that it can be incorporated into a finished classified, unclassified, or proprietary intelligence product.
Information collection in OSINT is generally a different problem from collection in other intelligence
disciplines where obtaining the raw information to be analyzed may be the major difficulty, particularly if
it is to be obtained from non-cooperative targets. In OSINT, the chief difficulty is in identifying relevant,
reliable sources from the vast amount of publicly available information.[20] However, this is not as great
a challenge for those who know how to access local knowledge and how to leverage human experts who
can create new tailored knowledge on the fly.
OSINT Community Disciplines
United States
Government
There are a large number of open-source activities taking place throughout the US Government.
Frequently, these open-source activities are described as "media monitoring", "media analysis", "internet
research" and "public surveys" but are open source nonetheless.
The Library of Congress sponsors the Federal Research Division (FRD) which conducts a great deal of
tailored open-source research on a fee-for-service basis for the executive branch.
Intelligence
The US Intelligence Community's open-source activities (known as the National Open Source
Enterprise) are dictated by Intelligence Community Directive 301 promulgated by the Director of
National Intelligence.[21] The Directive establishes the authorities and responsibilities of the Assistant
Deputy Director of National Intelligence for Open Source (ADDNI/OS), the DNI's Open Source Center
and the National Open Source Committee.
Prior to the establishment of the National Open Source Enterprise, the Foreign Broadcast Information
Service (FBIS), established in 1941, was the government's primary open-source unit, transcribing and
translating foreign broadcasts. It absorbed the Defense Department's Joint Publications Research Service
(JPRS), which did a similar function with foreign printed materials, including newspapers, magazines,
and technical journals.
Armed Forces
The former Under-Secretary of Defense for Intelligence, Dr. Stephen Cambone encouraged in part by the
Defense Science Board reports on Strategic Communication and Transition to and From Hostilities,
created the Defense Open Source Program (DOSP). The current Under-Secretary of Defense for
Intelligence is assigned executive agency for this program to the Defense Intelligence Agency.
U.S. military offices that engage in OSINT activities include:
Unified Combatant Command
Defense Intelligence Agency
National Geospatial-Intelligence Agency
US Army Foreign Military Studies Office
EUCOM JAC Molesworth (https://fas.org/irp/agency/dod/eucom/jac/)
Foreign Media Monitoring in Support of Information Operations, U.S. Strategic Command
Homeland Security
The Department of Homeland Security has an active open-source intelligence unit. In congressional
testimony before the House Homeland Security Committee's Intelligence, Information Sharing and
Terrorism Risk Assessment Subcommittee the Undersecretary of Homeland Security Charles Allen
indicated on February 14, 2007, that he had established the "Domestic Open Source Enterprise" to
support the Department's OSINT needs and that of state, local and tribal partners.
Law enforcement
The law enforcement OSINT community applies open-source intelligence (OSINT) to the prediction,
prevention, investigation, and prosecution of criminals including terrorists. Additionally, fusion centers
around the US are increasingly utilizing OSINT to support their intelligence generation and
investigations.
Examples of successful law enforcement OSINT include Scotland Yard OSINT; Royal Canadian
Mounted Police (RCMP) OSINT.
INTERPOL and EUROPOL experimented with OSINT units for a time, but they appear to have
atrophied with the departure of their individual champions.
New York Police Department (NYPD) is known to have an OSINT unit, as does the Los Angeles County
Sheriff's Department, housed within the Emergency Operations Bureau and affiliated with the LA Joint
Regional Intelligence Center.
Business
Business OSINT encompasses Commercial Intelligence, Competitor Intelligence, and Business
Intelligence, and is often a chief area of practice of private intelligence agencies.
Businesses may use information brokers and private investigators to collect and analyze relevant
information for business purposes which may include the media, deep web, web 2.0 and commercial
content.
Private Specialized Business (assisting the Criminal Justice field)
Another related business group within the United States that relies upon OSINT is the commercial Bail
Bond industry. This related industry, servicing the court system, is apart from the above Business
Intelligence sector. OSINT is useful to Bail Bond agencies that employ a private Fugitive Recovery
Agency to locate and apprehend their absent client;i.e., a criminal defendant who has failed to appear for
court and subsequently a warrant for arrest was issued. OSINT is the first method of discovery to help
locate the defendant when initial interviewing of the bond co-signers, defendant's relatives and friends is
lacking. OSINT gathering leads the investigator to discover an alternate hypothesis to analyze and then
match relevant data for making a prediction regarding the fugitive's location; e.g., data is scrubbed from
web access on Facebook entries, Twitter messages, and Snapchat.
Should those methods fail, the next step is to seek the specialized Behavioral Intelligence services that
reference OSINT to aid in establishing the veracity of subjects during the forensic interview and is used
to create a behavioral profile. OSINT data is correlated with interview data to include a variety
behavioral patterns; e.g., a list of daily personal contacts, habits of activities, visited places of interest,
vehicles used, favorite group involvements, etc. According to the Director, psychologist and forensic
interviewer at MN-Behavioral Intelligence Agency, (2016) OSINT data base has to be critically filtered
and analyzed before it can be applied within investigative interviewing and interrogation.
Ukraine
OSINT projects in Ukraine
SPECTRUM (https://infozahyst.com/products/spectrum/) is a technology project that delivers various
OSINT solutions for government and business - based on artificial intelligence, machine learning and big
data. In early 2014, various modules were developed and in 2016 the first government tender was won.
At the end of 2016, the Spectrum team created the first sophisticated pipeline to process and analyze
textual information in more than 50 languages.
Open Source Intelligence analysis software
There are several categories of tools intended for OSINT analysis. The first category includes open
source tools to query multiple search engines simultaneously such as IntelTechniques or search engines
that provide results separately such as All in One or DuckDuckGo. This category also includes social
media search engines and search engines of domains and people such as Pipl.com, Whois.net,
Website.informer. The second category is designed for big data analytics platforms such as DataWalk
which combine OSINT insight with local, internal data for further visual analysis and to conduct link
analysis to identify connections across a large volume of records.
See also
Ashley Feinberg
Co-occurrence networks
DARPA TIDES program
Doxing
Fusion Center
ICWATCH
Intellipedia
Investigative Data Warehouse
MiTAP
National Intelligence Open Source Committee
NATO Open Source Intelligence Handbook, NATO Open Source Intelligence Reader
Open data
Open Source Center
Private intelligence agency
ROSIDS
Special Libraries Association
Strategic intelligence
References
1. "Open Source Intelligence" (http://www.oss.net/dynamaster/file_archive/040320/fb893cded5
1d5ff6145f06c39a3d5094/OSS1997-02-33.pdf) (PDF).
2. McLaughlin, Michael (June 2012). "Using open source intelligence software for
cybersecurity intelligence" (https://www.computerweekly.com/tip/Using-open-source-intellige
nce-software-for-cybersecurity-intelligence). ComputerWeekly.com. Retrieved 2018-06-29.
3. The US Intelligence Community. ASIN 0813349184 (https://www.amazon.com/dp/08133491
84).
4. "Spy Agencies Turn to Newspapers, NPR, and Wikipedia for Information: The intelligence
community is learning to value 'open-source' information" (https://www.usnews.com/articles/
news/national/2008/09/12/spy-agencies-turn-to-newspapers-npr-and-wikipedia-for-informati
on.html). Retrieved 2008-09-15.
5. As defined in Sec. 931 of Public Law 109-163, entitled, "National Defense Authorization Act
for Fiscal Year 2006." (http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=109_co
ng_public_laws&docid=f:publ163.109)
6. Richelson, Jeffrey T (2015-07-14). The U.S. Intelligence Community (https://books.google.c
om/books?id=4sxVDgAAQBAJ&pg=PT284&lpg=PT284). Avalon Publishing.
ISBN 9780813349190. Retrieved 15 May 2017.
7. George, edited by Roger Z; Kline, Robert D; Lownethal, Mark M (2005). Intelligence and the
national security strategist : enduring issues and challenges (https://books.google.com/book
s?id=jJxyIb2hN4MC&pg=PA273&lpg=PA273). Lanham: Rowman and Littlefield.
ISBN 9780742540392.
8. Bornn, D Marshall (9 Jan 2013). "Service members, civilians learn to harness power of
'Open Source' information" (https://www.army.mil/article/94007/Service_members__civilians
_learn_to_harness_power_of__Open_Source__information). www.army.mil. Retrieved
14 May 2017.
9. Lowenthal, Mark; Clark, Robert (2015). The Five Disciplines of Intelligence Collection. CQ
Press. p. 18. ISBN 978-1483381114.
10. See page 413 of the 9-11 Commission Report (pdf) (https://www.9-11commission.gov/repor
t/911Report_FM.pdf).
11. Office of the Director of National Intelligence. "ODNI Announces Establishment of Open
Source Center (http://www.dni.gov/press_releases/20051108_release.htm) Archived (http
s://web.archive.org/web/20060623072458/http://dni.gov/press_releases/20051108_release.
htm) 2006-06-23 at the Wayback Machine". Press release, 8 November 2005.
12. Ensor, David. "The Situation Report: Open source intelligence center (http://www.cnn.com/2
005/POLITICS/11/08/sr.tues/)". CNN, 8 November 2005.
13. Office of the Director of National Intelligence "ODNI Senior Leadership Announcement (htt
p://www.dni.gov/press_releases/20051207_release.htm) Archived (https://web.archive.org/
web/20060623072305/http://dni.gov/press_releases/20051207_release.htm) 2006-06-23 at
the Wayback Machine". Press release, 7 December 2005.
14. "National Open Source Entreprise Vision Statement" (https://upload.wikimedia.org/wikipedi
a/en/b/b4/NationalOpenSourceEnterprise.pdf) Archived (https://web.archive.org/web/20070
928150640/http://upload.wikimedia.org/wikipedia/en/b/b4/NationalOpenSourceEnterprise.pd
f) 2007-09-28 at the Wayback Machine May 2006
15. DNI Open Source Conference 2008 "Decision Advantage" agenda, Office of the Director of
National Intelligence, July 2008. (http://www.dniopensource.org/Conference/Agenda.aspx)
Archived (https://web.archive.org/web/20100417020406/http://www.dniopensource.org/Conf
erence/Agenda.aspx) 2010-04-17 at the Wayback Machine
16. DNI Open Source Conference 2007 "Expanding the Horizons" agenda, Office of the
Director of National Intelligence, July 2007. (http://www.dniopensource2007.com/sessions.cf
m) Archived (https://web.archive.org/web/20080801081412/http://www.dniopensource2007.
com/sessions.cfm) 2008-08-01 at the Wayback Machine
17. Sun Tzu (Warring States period), The Art of War, Chapter 13: "Hostile armies may face
each other for years, striving for the victory which is decided in a single day. This being so,
to remain in ignorance of the enemy's condition simply because one grudges the outlay of 2
hundred ounces of silver in honors and emoluments, is the height of inhumanity."
18. (The Commission on the Intelligence Capabilities, 378–379). Commission on the
Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction
19. "Reexamining the Distinction Between Open Information and Secrets — Central Intelligence
Agency" (https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-
studies/studies/Vol49no2/reexamining_the_distinction_3.htm). www.cia.gov. Retrieved
2018-06-29.
20. Hudnall, Ken (2011). "Intelligence Failures" (https://books.google.com/?id=R1YMCAAAQBA
J&pg=PT81&lpg=PT81&dq=In+OSINT,+the+chief+difficulty+is+in+identifying+relevant,+reli
able+sources+from+the+vast+amount+of+publicly+available+information.#v=onepage&q=I
n%20OSINT%2C%20the%20chief%20difficulty%20is%20in%20identifying%20relevant%2
C%20reliable%20sources%20from%20the%20vast%20amount%20of%20publicly%20avail
able%20information.&f=false). No Safe Haven: Homeland Insecurity. Grave Distractions
Publications. ISBN 9781452493923.
21. DNI Intelligence Community Directive 301 – "National Open Source Enterprise" (https://fas.
org/irp/dni/icd/icd-301.pdf) 11 July 2006.
WashTimes.com (http://www.washtimes.com/national/20060418-110124-3694r.htm),
Washington Times – CIA mines 'rich' content from blogs, 19 April 2006
GCN.com (https://web.archive.org/web/20081201184220/http://www.gcn.com/print/25_6/40
152-1.html), Government Computer News – Intelligence units mine the benefits of public
sources 20 March 2006
AFCEA.org (http://www.afcea.org/content/?q=node/1102), SIGNAL Magazine – Intelligence
Center Mines Open Sources March 2006
FindAcricles.com (https://web.archive.org/web/20080310024429/http://findarticles.com/p/arti
cles/mi_m0IBS/is_4_31/ai_n16419797), Military Intelligence Professional Bulletin October–
December, 2005 by Barbara G. Fast
FAS.org (https://fas.org/irp/congress/2005_hr/062105jardines.pdf), Congressional
Testimony on OSINT and Homeland Security 21 June 2005
FirstMonday.org (http://www.firstmonday.org/issues/issue7_6/stalder/), Open Source
Intelligence by Stalder and Hirsh, 15 May 2002
Forbes.com (https://www.forbes.com/2008/11/21/maltego-data-mining-identity08-tech-cz-tb
_1121maltego.html), When Everyone Can Mine Your Data by Taylor Buley, 11.21.08]
Thompson, Clive (2006-12-03). "Open-Source Spying" (https://www.nytimes.com/2006/12/0
3/magazine/03intelligence.html). The New York Times. Retrieved 2018-05-29.
Cnet.com (http://news.cnet.com/8301-13505_3-10107648-16.html), Maltego and the
science of 'open-source' snooping by Matt Asay, November 25, 2008
Literature
Scientific Publications
Arthur S. Hulnick: 'The Dilemma of Open Source Intelligence: Is OSINT Really Intelligence?
(https://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780195375886.001.0001/oxfor
dhb-9780195375886-e-0014)', pages 229–241, The Oxford Handbook of National Security
Intelligence, 2010
Cody Burke: 'Freeing knowledge, telling secrets: Open source intelligence and
development', Bond University, May 2007 (http://epublications.bond.edu.au/cgi/viewcontent.
cgi?article=1010&context=cewces_papers)
Florian Schaurer, Jan Störger: 'The Evolution of Open Source Intelligence', OSINT Report
3/2010, ISN, ETH Zürich, October 2010 (http://www.isn.ethz.ch/isn/Digital-Library/Publicatio
ns/Detail/?id=122008)
Mikel Rufián: "OSINT Training Workshop": OSINT Analyst: Advance Techniques, Tools and
Training', Spain 2010
Abdelrahman Rashdan: 'The Social Media OSINT Challenge to US Intelligence: Culture Not
Gigabytes', in New Media Politics Rethinking Activism and National Security in Cyberspace.
Ed. Banu Baybars-Hawks. Cambridge Scholars Publishing, 2015 (https://www.academia.ed
u/20836279/The_Social_Media_OSINT_Challenge_to_US_Intelligence_Culture_not_Gigab
ytes)
External links
General
CITEREFUsername_Search | access-date=2018-05-29}} An OSINT Deep Web Search for usersnames
and email addresses
An OSINT search of historic domain name whois records (https://whoisology.com)
The Open Source Intelligence Resource Discovery Toolkit (http://rr.reuser.biz)
The New Craft of Intelligence: Making the Most of Open Private Sector Knowledge (http://w
ww.time.com/time/covers/1101020311/viewpoint.html)
Actual Intelligence Case Studies Leveraging Open Source Intelligence (OSINT) (https://we
b.archive.org/web/20080216224135/http://www.cm2limited.com/casestudies/casestudies.ph
p)
Sailing the Sea of OSINT in the Information Age (https://www.cia.gov/library/center-for-the-s
tudy-of-intelligence/csi-publications/csi-studies/studies/vol48no3/article05.html)
"The Intelligence Network : I n t r o d u c t i o n" (https://web.archive.org/web/200805090854
18/http://www.intellnet.org/). intellnet.org. 2008-05-09. Archived from the original on 2008-
05-09. Retrieved 2018-05-29.
"OSINT discussion group" (https://groups.yahoo.com/neo/groups/osint/info). Yahoo!
Groups. Retrieved 2018-05-29.
Open Source Center (https://www.opensource.gov/) – U.S. government arm focusing on
open source intelligence under the DNI
"Open Source Intelligence (OSINT)" (http://arnoreuser.com/). RIS Open Source Intelligence.
2018-05-29. Retrieved 2018-05-29.
Collection and Use of Open-Source Intelligence – A to Z (http://intellit.muskingum.edu/open
source_folder/opensourcetoc.html)
Open Source Intelligence (OSINT): Issues for Congress (https://fas.org/sgp/crs/intel/RL342
70.pdf), Congressional Research Service, December 5, 2007
Open Source Intelligence (OSINT): Issues for Congress (http://www.osint.org/crs-report-osi
nt.pdf), Congressional Research Service, January 28, 2008
The Free Library (https://www.thefreelibrary.com/FMSO-JRIC+and+Open+Source+Intelligen
ce%3A+speaking+prose+in+a+world+of...-a0146354022), FMSO-JRIC and Open Source
Intelligence: speaking prose in a world of verse, Military Intelligence Professional Bulletin,
Oct–Dec, 2005 by Jacob W. Kipp
Retrieved from "https://en.wikipedia.org/w/index.php?title=Open-source_intelligence&oldid=934542485"
This page was last edited on 7 January 2020, at 03:03 (UTC).
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using
this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia
Foundation, Inc., a non-profit organization.