OSINT New Technologies Education
OSINT New Technologies Education
Volume 6
Number 5 Volume 6, No. 3, Fall 2013
Supplement: Ninth Annual IAFIE Conference: Article 5
Expanding the Frontiers of Intelligence
Education
Recommended Citation
Benes, Libor. "OSINT, New Technologies, Education: Expanding Opportunities and Threats.
A New Paradigm." Journal of Strategic Security 6, no. 3 Suppl. (2013): 22-37.
This Papers is brought to you for free and open access by the Journals at Scholar Commons. It has been accepted for inclusion in Journal of
Strategic Security by an authorized editor of Scholar Commons. For more information, please contact scholarcommons@usf.edu.
Benes: OSINT, New Technologies, Education
Introduction
The successful concept of General W. Donovan's Office of Strategic Services (OSS), assembling
a unique diversity of America's finest talent, has proven any education can serve intelligence.1 A
large portion of intelligence expertize comes from non-intelligence education and professions.
But the more these are intelligence-centered, the better tools the analyst gets. Beside growing
knowledge and skills, the galloping world, also result of new technologies, pressures intelligence
professionals to keep refining their competencies.
George Washington said that "[t]he necessity of procuring good intelligence is apparent and need
not be further urged."2 Intelligence aims to gain superiority over an adversary. America's
Leadership in the free world requires that leaders have the best intelligence to decide, shape
events, and know others. President George H.W. Bush defines intelligence as "our basic national
instrument for anticipating danger," "our first line of defense," and a means of anticipating
opportunities."3
The quality and use of intelligence depends on information quality, intelligence, and the policy
maker. Also new technologies bring opportunities and threats. They change the information
paradigm in the society through empowering people to acquire and create more and better
information and influence events. They both support and press intelligence and education and
increase the importance of open source intelligence (OSINT).
Top technology and top education fuel America's unrivaled political-economic system.
Education has a special role in the fine fabric of the society. It builds a basis for America's
Leadership. Sherman Kent "took account of the coming computer age as well as human and
technical collectors in proclaiming the centrality of the analyst," the “thoughtful man ... the
intelligence device supreme."4 It stays valid. Education must innovate to boost intelligence and
to show how to approach the consequences.
Methodology
Thesis
"While the human factor will remain central in the intelligence process, the paradigm-changing
impact of new technologies on the society and OSINT is among the biggest opportunities for
strengthening America's Leadership in the world and requires more education innovation."
22
education is a living process and can only result from an integrated collaborative approach. This
paper uses OSINT strictly in the legal sense, excluding information published illegally.
National Defense Authorization Act for Fiscal Year 2006 defines in Sec. 931 of Public Law 109
- 163:
“Open Source Information: Publicly available information that anyone can lawfully
obtain by request, purchase, or observation.5
New Technologies
New technologies are an expanding mix of tools substantially changing the nature of the society
and information environment, such as gadgets, laptops, cell phones, search engines, software,
information-sharing and communication platforms, high-speed data transmission networks,
satellites, cyberspace, social media, traditional media (TV/radio) plus their innovations.7
Cyberwar, Our Vulnerabilities, and the Defense of the U.S. National Interest
The fast expanding cyberspace taking over increasing portions of our activities requires the right
technology, competencies, and mental attitude. In my book, We Are at Cyberwar: Everywhere,
Forever. The Reliable Theory for the U.S. National Security, I advocate a paradigm that the
society will be safer when we accept and tackle, theoretically and practically, the incessant
attacks in cyberspace as a war, beyond cybercrime.8 Our growing dependence on cyberspace, the
availability of new technologies and information, cyberwar traits, and the attacks on all aspects
of the society create vulnerability and require defense.9 George Washington's spoke about a
“need for armaments, suitable frontiers, and appropriate alliances.”10 It is relevant in cyber
threats that attack even such basic parameters as frontiers. In 1943, Lippmann said the end of
foreign policy is “not peace but security in peace and war.”11 Hans Morgenthau defined the first
5
Intelligence Community Directive Number 301, National Open Source Enterprise, Effective: July 11, 2006, 8, F.
Definitions, available at: http://www.fas.org/irp/dni/icd/icd-301.pdf.
6
Ibid.
7
This definition is larger and it shows that open sources are more than the Internet. Lowenthal mentions a
misconception that intelligence analysts rely on the Internet or most open source information. Best and Cummings
quote Lowenthal that the intelligence community derives only 3 – 5 percent of open source information from the
Internet; Lowenthal, Mark M. Intelligence, From Secrets to Policy. 2nd Edition (Washington, D.C.: CQ Press
College, 2003), 80; Best and Cummings say that reason may be the lack of open source expertize, ineffective
analytic tools, lack of subject matter expertize, deadline pressure, the Internet may not give the best sources, or a
combination of these factors; Richard A. Best, Jr., Alfred Cumming, “Open Source Intelligence (OSINT): Issues for
Congress,” December 5, 2007: 7.
8
Benes, Libor, We Are at Cyberwar. Everywhere, Forever. The Reliable Theory for the U.S. National Security
(Self-e-published on Amazon Kindle, October 2012), 47.
9
Ibid, 19 - 22.
10
Lippmann, Walter, U.S. Foreign Policy: Shield of the Republic (New York: Little Brown, 1943), 51.
11
Lippmann, U.S. Foreign Policy: Shield of the Republic, 50 - 51.
23
http://scholarcommons.usf.edu/jss/vol6/iss5/5
DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.3
Benes: OSINT, New Technologies, Education
principle of American foreign policy, “one primary national interest: the security of its territory
and institutions.”12
“OSINT was seen as unnecessary to national intelligence due to...the low reliability of
sources arising from the misinformation, secret messages, disinformation, and nonsense
content of OSINT sources, the OSINT when properly used is believed to be as crucial as
the most secretive and expensive aspects of intelligence collection…In the end…most
significant is the system's ability to give sound judgments to decision makers.”13
Regardless past and still present bias against OSINT, it constitutes a large portion of intelligence.
The OSS "also gathered public and secret information."15 Sherman Kent "estimated that in
peacetime 80 percent of the information policymakers needed to make a decision was available
publicly."16 By Chris Pallaris OSINT provides 80 to 95 percent "of the information used by the
intelligence community."17 Lt. Gen. Samuel V. Wilson spoke about 90 percent.18 Nonetheless,
some people question OSINT is intelligence. Thomas Carroll quoted "a retired DO officer"
saying, "[b]y definition, intelligence is clandestinely acquired information - stolen, to put it
bluntly."19 The spectrum of intelligence is broader though. Sherman Kent "argued that
12
Morgenthau, Hans J., A New Foreign Policy for the United States (New York: Praeger Publishers, 1969), 241.
13
Arthur S. Hulnick, “The Dilemma of Open Sources Intelligence: Is OSINT Really Intelligence?,” The Oxford
Handbook of National Security Intelligence (U.S.A.: Oxford University Press, March 2010), 229-241, available at:
http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780195375886.001.0001/oxfordhb-9780195375886-e-
0014.
14
Mark M. Lowenthal, “Open Source Intelligence: New Myths, New Realities, Defense Daily Network Special
Reports, 4,” available at: http://www.defensedaily.com/reports/osintmyths.htm.
15
Bean, Hamilton, No More Secrets. Open Source Information and the Reshaping of U.S. Intelligence (Santa
Barbara: Praeger Security International, 2011) 26.
16
Memorandum Respecting Section 202 (Central Intelligence Agency) of the Bill to Provide for a National Defense
Establishment, Submitted by Allen W. Dulles, April 25, 1947, reprinted in U.S. Congress, 80th Congress, 1st Session,
Senate, Committee on Armed Services, National Defense Establishment (Unification of the Armed Services),
Hearings, Part 1, 525. By: Richard A. Best, Jr., Alfred Cumming, “Open Source Intelligence (OSINT): Issues for
Congress.” December 5, 2007, 28.
17
Chris Pallaris, “Open Source Intelligence: A Strategic Enabler of National Security.” Issue 32, Center for Security
Studies, Zurich, 2008, available at: http://www.isn.ethz.ch/isn/Digital-
Library/Publications/Detail/?lng=en&id=50169.
18
Donna O'Harren, “Opportunity Knocking: Open Source Intelligence For the War on Terrorism.” Thesis, Naval
Postgraduate School, December 2006, 9. By: Richard A. Best, Jr., Alfred Cumming, “Open Source Intelligence
(OSINT): Issues for Congress.” December 5, 2007.
19
Thomas Patrick Carroll, “The Case Against Intelligence Openness,” International Journal of Intelligence and
Counterintelligence, (Winter 2001 - 2002): 561. In: Stephen C. Mercado, “Sailing the Sea of OSINT in the
Information Age. A Venerable Source in a New Era,” 6, available at: https://www.cia.gov/library/center-for-the-
study-of-intelligence/csi-publications/csi-studies/studies/vol48no3/article05.html, April 14, 2007.
24
Produced by The Berkeley Electronic Press, 2013
Journal of Strategic Security, Vol. 6, No. 5
intelligence is knowledge" but "some still confuse the method with the product. Sadly, such
confusion is widespread."20 How to clarify it?
OSINT uses information "openly available to all."21 As a subgroup of intelligence, OSINT serves
the same goal - identify and ward off threats and find and promote opportunities. Let's not
underestimate it, let's not mistake "secrecy22 for knowledge,"23 let's stay aware of also secrets'
weaknesses. OSINT has its place in intelligence. It helps handle cognitive challenges, e.g., lower
uncertainty, improve accuracy, predictability, completeness, structure, judgment, estimates,
creativity, decisions, detect disconfirming information, or explore alternative interpretations
(develop hypotheses). Karl Haigler says OSINT "supplements and supports other intelligence
gathering activities by providing background cultural or biographical information."24 On
terrorism, the Robb/Silberman Report says, "open source information can fill gaps and create
links that allow analysts to better understand fragmented intelligence, rumored terrorist plans,
possible means of attack, and potential targets"25 and even "may provide the critical and perhaps
only window into activities that threaten the United States."26
Information and Communication Technologies (ICT)28 have changed nothing in OSINT's basic
goal, roles, functions, factors, and mechanisms of the intelligence process as defined by Sherman
20
Mercado, “Sailing the Sea of OSINT in the Information Age,” 6.
21
R. A. Norton, “Guide to Open Source Intelligence. A Growing Window into the World,” The Intelligencer,
Journal of U.S. Intelligence Studies, Association of Former Intelligence Officers 18:2 (Winter/Spring 2011): 65.
22
I analyze secrecy and threats in light of the changing environment in the Global War on Terror and national
security documents. Libor Benes, “The Global War on Terror and National Security: Crossroads - External Threat-
Definitions,” The Institute of World Politics, Washington, D.C., November 2007.
23
Florian Schaurer and Jan Störger, “Guide to the Study of Intelligence. The Evolution of the Open Source
Intelligence (OSINT).” The Intelligencer, Association of Former Intelligence Officers (2011): 2.
24
Karl Haigler, “Guide to Intelligence Support for Military Operations,” In: The Intelligencer Association of former
Intelligence Officers 19:I (Winter/Spring 2012) 53.
25
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction,
Report to the President of the United States (Washington, D.C.: GPO, 2005, pp. 378 - 379). By: Borchgrave, Arnaud
de, Thomas Sanderson, John MacGaffin, Open Source Information. The Missing Dimension of Intelligence. A
Report of the CSIS Transnational Threats Project. CSIS Report, March 2006, 13.
26
Ibid.
27
Richard, Jennifer, In: Competitive Intelligence: A Framework for Web-Based Analysis and Decision Making,
(Mason, Ohio: Thomson, South-Western, 2004) p. 57.
28
Stephen H. Campbell, “Guide to Intelligence in the Post-Cold War Period: Part II - The Impact of Technology,”
The Intelligencer, Association of Former Intelligence Officers (2012): 5.
25
http://scholarcommons.usf.edu/jss/vol6/iss5/5
DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.3
Benes: OSINT, New Technologies, Education
Kent29 or Richards J. Heuer, Jr.,30 or in acquiring and exploiting open sources "as part of the all-
source intelligence process," as analyzed the Joint Military Intelligence Training Center 1996
OSINT Handbook.31 But the ICT did change the society and quality of intelligence process
elements.
• Developed cyberspace: more and more aspects of the society take place through them.
• Reshape the society and actors and the ways future societies will operate. They impact
individuals, industry, consumers, market, power, influence of the U.S. and others locally
and globally.
• Reshape the infosphere. By Bill Gates, they make available the best and personalized
knowledge.32
New technologies are revolutionary. Their impact would meet Thomas Kuhn's criteria for
scientific revolutions.33 Through cyberspace and their high formative capability, new
technologies empower people to find, create, and make publicly available exponentially
increasing massive quantity and quality of open source information and to shape reality. Most of
that information may have no intelligence value but much of it can, duly handled, become
OSINT. Through the combination of passive (consumption) and active (influence) work with
information and intelligence, new technologies create a new paradigm, a change qualitatively
bigger than any former, e.g., "revolutionary innovations in intelligence-related technologies"34
that mentions Douglas Wheeler. We need an overhaul in OSINT interpretation. What features
relevant for OSINT do new technologies have?
New technologies are democratic, giving equal access to the use or creation of open sources (bar
censored or restricted by anti-democratic regimes) regardless personal status or hierarchy. They
express and support free market, help law enforcement to fight crime and espionage. The passive
and active impact affects state power. Mark Lowenthal quoted Deputy Director of Central
29
Kent, Sherman, Strategic Intelligence for American World Policy. (Princeton: Princeton University Press, 1951).
30
Heuer, Richards J., Jr., “Psychology of Intelligence Analysis,” Center for the Study of Intelligence, Central
Intelligence Agency (1999).
31
“Open Source Intelligence: Professional Handbook.” Joint Military Intelligence Training Center (October 1996):
1.
32
Bill Gates, Bloomberg TV, January 31, 2013.
33
As “scientific revolutions,” Kuhn calls the extraordinary events where a shift of expert attitude takes place; Kuhn,
Thomas S., The Structure of Scientific Revolutions (Chicago: University of Chicago Press, 1962): 19; Quoted from
the Czech translation: Struktura vedeckych revoluci, I. Uvod (Introduction), Role dejin (The Role of History), Praha
1997, 19.
34
Douglas Wheeler, “Intelligence between the World Wars, 1919 - 1939.' A World Made Safe for Deaths of
Democracy.'“ The Intelligencer, Journal of U.S. Intelligence Studies (2012): 1.
26
Produced by The Berkeley Electronic Press, 2013
Journal of Strategic Security, Vol. 6, No. 5
Intelligence Richar Kerr that "[t]he IC has to learn that it no longer controls most of its own
sources."35
New technologies serve, spread, and express freedom. They decentralize the monopoly on
agenda setting, shaping of reality, and power. They allow people exercise freedom and influence
(initiate, shape) events, even absent some pre-requisites. They drive events, facilitate
mobilization of the society, watch, protect, and even can bring freedom. By Shimon Peres, mass
media are a threat "to dictatorial regimes."36 New technologies magnify this. It brings
opportunity to those able to manage decentralization. New technologies help, change, pressure,
sometimes trump the traditional media in reporting and influencing events. We have seen citizen
journalists with iPhones in Middle East revolutions. "The role of mass media will be modified in
a revolutionary way as a result of new technologies."37 By Graeme Burton, "[n]ew technology
has made the media - audience relationship more complex."38
• Add new dimensions to the traditional notion of OSINT (books, journals, magazines,
public reports).
• Redefine and increase mobility, availability, and ways to access, collect, process, store,
and use sources and develop new interpretations.
35
Lowenthal, “Open Source Intelligence,” 2.
36
Peres, Shimon, quoted from (Czech book) Pet rozhovoru. Nakladatelstvi Lidove noviny, 1998, 175.
37
Libor Benes, “Science and Its Implications.” (original in Czech as “Veda a jeji dusledky”), Essay, Philosophy
and Methodology of Science, Ph.D. course, Department of International Relations, University of Economics,
Prague, June 25, 2001. 37.
38
Burton, Graeme, Media & Society. Critical Perspectives 2nd Edition (Maidenhead, UK: Open University Press,
2010) (2nd edition), 75.
39
University of Michigan discussion, televized by Bloomberg TV, January 14, 2013.
27
http://scholarcommons.usf.edu/jss/vol6/iss5/5
DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.3
Benes: OSINT, New Technologies, Education
• Expand OSINT and narrow space for classified intelligence as OSINT includes "open
versions of the covert arts of human intelligence (HUMINT), overhead imagery (IMINT),
and signals intelligence (SIGINT)"40 and "is expanding into" these areas,41 increasingly
driving agenda.
• Reveal, identify, and help analyze (in context with all-source) public perceptions of
events and trends, relationships between players (organizations, groups, countries), and
patterns in behavior, including discrepancies (the public image presented vs. secret
intentions and steps, as either can be skewed).
• Help optimize processes and define research and analytical needs, customers, intelligence
product.
Can OSINT find a smoking gun? Increasingly yes, but secrets have primacy. Intelligence broader
activities, the need to understand political-economic and socio-cultural factors in foreign
societies, increase OSINT importance, competencies, and responsibility. The analyst must
possess top-notch OSINT know-how to be able to spot an important, often decisive bit of
information, an aspect indicating an event, a pattern, or a trend, a kind of a smoking gun, or even
40
Stephen C. Mercado, “Sailing the Sea of OSINT in the Information Age. A Venerable Source in a New Era,”
(April 14, 2007): 3, available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-
publications/csi-studies/studies/vol48no3/article05.html.
41
Ibid, 4.
42
Fuld, Leonard M., The New Competitor Intelligence. The Complete Resource for Finding, Analyzing, and Using
Information about Your Competitor, (New Jersey: Wiley, 1994) 204.
28
Produced by The Berkeley Electronic Press, 2013
Journal of Strategic Security, Vol. 6, No. 5
the smoking gun within the growing, widening, and deepening mass of diluted, chaotic, low
quality, or deliberately false open source information.
New technologies change the ways people think, work, live, learn, communicate, behave, get,
process, and use information. Increasing portions of lives of new generations spent on new
technologies will impact the intelligence process and the work and thinking of the analyst,
although with the structure of basic competencies unchanged. With all weaknesses, the human
brain, is unrivaled and irreplaceable as the central asset to develop the decisive technical and
creative aspects of intelligence (sort, analyze, and compare evidence, generate a more alternative
hypotheses, assumptions, judgments, detect and minimize sources of vulnerability to networks,
institutions, businesses, society) or to handle new technologies' technical and political
challenges.
43
Treverton, Gregory F., Reshaping National Intelligence for an Age of Information (Cambridge: Cambridge
University Press, RAND, 2003) 104.
44
Einstein, Albert, Out of My Later Years (New Jersey: Littlefield, Adams, & Co., 1967), The Hebrew University of
Jerusalem, 1995; Quoted from the Czech translation by Martin Cernohorsky, Marie Fojtikova a kol., Z mych
pozdejsich let. Jak vidim svet II. Nakladatelstvi Lidove noviny, 1995, 25 - 26.
45
John Lenczowski, Founder and President, Lecture, The Institute of World Politics, Washington, D.C., 2010.
29
http://scholarcommons.usf.edu/jss/vol6/iss5/5
DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.3
Benes: OSINT, New Technologies, Education
on-line education programs, and communication platforms offer life-long education, self-
education, and building expertise, and lower the education costs. The lead position in these
trends increases the U.S. quality of knowledge, educational level, competitive advantage, and
leadership in the world.
Threats from New Technologies for the Society: Nature of New Technologies and Human
Nature
It is increasingly difficult to understand the complexity of new technologies. Most people
embrace some aspects or tools but selectively resign on participation in the society through them.
Glassman and Kang mention confusion and fear created by the internet.46 Practitioners can be
"subject to coercive power of technology" whereas technology developers struggle "to
understand practitioner’s needs and to assess the transformative power of technology."47 Trends
research and cooperation with the private sector and the public is necessary. New technologies
46
Michael Glassman, Min Ju Kang, “Intelligence in the internet age: The emergence and evolution of Open Source
Intelligence (OSINT).” In: Computers in Human Behavior 28:2 (March 2012): 673 – 682, available at:
http://www.sciencedirect.com/science/article/pii/S0747563211002585.
47
Lucy Resnyansky, “The role of technology in intelligence practice: linking the developer and the user
perspectives.” Prometheus: Critical Studies in Innovation 28:4 (2010), available at:
http://www.tandfonline.com/doi/abs/10.1080/08109028.2010.544076.
30
Produced by The Berkeley Electronic Press, 2013
Journal of Strategic Security, Vol. 6, No. 5
may entrap also analysts, even those with potential and interest to understand, in modified or
new flaws in the intellectual process.
• The asymmetry in their availability creates inequalities within the society and between
societies.
• They change the nature of information production, exchange, use, and advantage. How to
achieve information and power superiority when everybody will have access to
everything? What does selective withdrawal from participating in the new information
sphere indicate about performance, how does it affect results at the individual level
compared to the institutional level?
• A new dimension to the traditional threats through higher efficiency of enemy weapons.
• New types of threats by building cyberspace that empowers collective and individual
hostile actors and increases individualization of threats through tech-savvy rogue actors.
• Magnify other threats through cyberspace that changes geography (threats may easier get
through the nation's defenses).
• Develop newer types of threats to launch cyber attacks, threaten others, conduct
cyberwar, criminal activities and espionage, steal U.S. government and business secrets.
• Conduct new ways of traditional information warfare like spreading mis- and
disinformation and propaganda (it is different from the mass of low quality random, non-
warfare misleading information).
31
http://scholarcommons.usf.edu/jss/vol6/iss5/5
DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.3
Benes: OSINT, New Technologies, Education
New technologies, OSINT, and the fast and hardly predictable future can press the analyst in all
phases of the intelligence process through these effects:
The nature of open source information: high quantity, diverse quality, growing importance. The
analyst must be able to gather, judge, and sort information, know and handle limitations,
understand different users, needs, tasks, information mix, organization, institutions, law. Open
source cannot eliminate its deficiencies against secrets but can increase its value by better
information structuring.
• The nature and impact of new technologies: complex, fast, unpredictable. Even
technology experts cannot predict where applications go. Paul Hodkinson mentions one
interpretation that "[u]se depends on the context and motivation of users."51 The founder
of Skype explained how different its use is from the initial intention to facilitate
payments.52 Giddings and Lister mention radio "was first conceived, within already
effective social systems, as an advanced form of telegraphy."53
• Technology barriers: the analyst must continuously learn but can face technical obstacles,
e.g., availability or quality of technology, cannot predict developments or understand
some aspects, e.g., sophisticated, even random algorithms to organize and filter
information through research tools (Google results, Facebook, deep web). They give you
the information they decide to share. It is logical because they seek ways to sell their
product but the analyst must find ways how to cope with this.
48
Foreword to the first German edition, Vienna, Fall 1934, XV., Popper, Karl R., Logic of Scientific Research.
Quotation taken from the Czech translation Logika vedeckeho badani. Praha 1997.
49
Edward J. Glantz, “Guide to Civil War Intelligence,” The Intelligencer, Journal of U.S. Intelligence Studies,
Association of Former Intelligence Officers 18:2 (Winter/Spring 2011) 58.
50
Foreword to the first German edition, Vienna, Fall 1934, XV., Popper, Karl R., Logic of Scientific Research.
Quoted from the Czech translation Logika vedeckeho badani. Oikumene, Praha 1997.
51
Hodkinson, Paul, Media, Culture, and Society (London: SAGE, 2011): 29.
52
Bloomberg TV, January 2013.
53
Giddings, Seth with Martin Lister (Editor), The New Media and Technocultures Reader (New York: Routledge,
Taylor & Francis Group, 2011): 97.
32
Produced by The Berkeley Electronic Press, 2013
Journal of Strategic Security, Vol. 6, No. 5
• Cyberspace and cyberwar: the analyst must become cyberwarrior, understand cyberspace
and increasingly be able to predict, prevent, detect, expose, evade, and fight hostile steps
by many actors.
• The analyst's know-how and competencies: versatility, flexibility, rapidity, higher and
increasing inter-disciplinary subject matter expertise and understanding socio-cultural,
political, economic factors. Getting expert advice needs to be faster and more organized,
integrating the variety of open sources.
• Education about OSINT and new technologies: real life, practically oriented, higher level,
more practice, trends, examples, and the ability and certain way of technological
thinking. The analyst has less and less time to provide a more and more complex yet
concise analysis and, alongside substance, must understand new technologies. It is
incomparable with the past when technology advances were slow and the analyst could
do with the basic skillset changed little. The future analyst must do more than "passively
waiting" for information, as Thomas Fingar put it.54 The analyst, whose work
increasingly centers on new technologies, needs to more often integrate collection,
sorting, and analysis. Without technological competence and learning, the analyst would
lag behind which would damage the intelligence process.
• New technologies, society, intelligence, education, and U.S. primacy: the high and fast
know-how and technology level throughout the world and decreasing amount of
resources will require high, fast, and life-long education. Historically, in a village only a
priest, a teacher, and say a mayor were more educated. Today, everybody's knowledge is
higher. Similarly, new technologies will press the whole society to a higher level of
knowledge, with the most educated with the highest responsibility.
Education is central but is increasingly driven by new technologies and by businesses. Societies
and individuals lagging behind in know-how will become stoppers, create problems, and get into
insurmountable opportunity barriers. Players with their own agenda trying to trade "secrets"
54
Thomas Fingar, “A Guide to All-Source Analysis,” The Intelligencer. Journal of U.S. Intelligence Studies.
Association of Former Intelligence Officers 19:I (Winter/Spring 2012): 66.
55
Best and Cumming analyze the analyst's obstacles in use of open sources: lack of subject matter expertise, bias
against open source information, lack of training, no access to the internet, volume of information, analytic tools,
echo effect, security practices; Richard A. Best, Jr. and Alfred Cumming, “Open Source Intelligence (OSINT):
Issues for Congress,” December 5, 2007, 9.
56
Edward F. Mickolus, “A Guide to Popular Student Books on Intelligence. What do students think they know
about intelligence before they walk into the classroom?” The Intelligencer, Journal of U.S. Intelligence Studies,
Association of Former Intelligence Officers 19:I (Winter/Spring 2012): 67.
33
http://scholarcommons.usf.edu/jss/vol6/iss5/5
DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.3
Benes: OSINT, New Technologies, Education
publicly available in open sources will cause their societies to lag behind. It is most visible in
revolutions, wars, and top business but, due to new technologies, increasingly in peacetime and
everyday lives. "[T]here often comes a time when public political activity proceeds at such a
rapid and fulminating pace that secret intelligence, the work of agents, is overtaken by events
publicly recorded."57 The higher the know-how, skills, and tech savviness of open source
analysts, leaders, and the population, the better pre-requisites for advancing America's
leadership.
New technologies' impact on OSINT does not solve all intelligence needs and must not harm
secrets or intelligence but increases OSINT's role, relative to both its past and secrets, and
requires continuing analysis, not for prestige or contest but to use OSINT and secrets in their best
ways to the benefit of the United States. New technologies' complex impact is the biggest change
of information paradigm since the printing press.
Influencing the world requires understanding it and the competency Albert Einstein defined as
science - "making the every-day thinking more accurate."58 The criteria for judging the value of
OSINT will be its ability to contribute to:
• Explaining and estimating other's intentions, attitudes, actions, and trends to avoid lack of
understanding or knowledge, including strategic surprise.
• Defending U.S. National Security and Interest against other's actions through developing
capabilities to detect, identify, analyze, prevent and defeat hostile intentions, threats, and
action. John Collins says "[t]hree basic considerations dominate the threat-evaluation
process:" capabilities (What can the enemy do?), intentions (What will the enemy do?),
and vulnerabilities (enemy's weaknesses).59
57
The words of one veteran of the CIA's Directorate of Operations referring to the Soviet suppression of the
Hungarian uprising; de Silva, Peer, Sub Rosa: The CIA and the Uses of Intelligence (New York: Times Books,
1978), 120; Stephen C. Mercado, “Sailing the Sea of OSINT in the Information Age. A Venerable Source in a New
Era,” 3, available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-
studies/studies/vol48no3/article05.html, April 14, 2007.
58
Einstein, Out of My Later Years, 39.
59
Collins, John M., Grand Strategy. Principles and Practices (Annapolis: Naval Institute Press, 1973): 9.
34
Produced by The Berkeley Electronic Press, 2013
Journal of Strategic Security, Vol. 6, No. 5
Who to teach?
Intelligence core will remain the human mind. The complexity of new technologies' impact
requires involving the best talent and building institutional and individual know-how to which
central is complex, inter-disciplinary, high, increasing, and continuing education. "Analysis is
the most important aspect of intelligence."60
What to teach?
To develop the best analysts, education must equally:
• Give them competency in best method and subject through theoretical and practical
training, and
• Develop their mindset: open ways to life-long education,61 promote, teach, and show the
right way to think about the rapidly changing world, events, trends, technologies,
opportunities, threats, and limitations; help develop an approach to risk taking, curiosity,
inventiveness, innovation spirit, creativity, entrepreneurship, hard work; motivate them,
teach, and show them how to use new technologies; incorporate new developments and
trends, including the ability to anticipate those from far future.
What are opportunities and obstacles to education overhaul to analyze and handle new
technologies' consequences? New technologies create a new phase, following the 1957
Washington Platt's recommendation, as Stephen Marrin mentions, "that intelligence
organizations adapt 'formal education followed by practical experience.'"62 Post-Cold War and
post-9/11 changes followed, leading to, by Jon Wiant, growth of academic interest in intelligence
and "significant expansion of intelligence courses and seminars."63 The importance of new
technologies is expressed also by growing attention to cyberspace. Can we find resources to
systematically develop more educational programs about new technologies and analysis?
How to teach?
Education must provide:
• Best educators: The highest professional or academic credentials, best if they have both
because their studies, research, and work in the other area greatly enhance their
qualifications, basis, and potential. Many educators, as Peter Oleson says, "may not have
60
Mark Lowenthal, “Intelligence Analysis. Guide to its Study,” The Intelligencer, Journal of U.S. Intelligence
Studies, Association of Former Intelligence Officers 18:3 (Summer/Fall 2011): 61.
61
I found the best educational benefits and experiences in an opportunity to learn in educational settings allowing
intensive discussions and gathering all backgrounds and ages present as both instructors and colleagues. I also
appreciated an opportunity to listen to the most experienced warriors, including those from the OSS and from the
Cold War.
62
Stephen Marrin, “Why Teach About Intelligence,” The Intelligencer, Journal of U.S. Intelligence Studies,
Association of Former Intelligence Officers (2012): 1.
63
Jon A. Wiant, “A Guide to the Teaching About Covert Action,” The Intelligencer, Journal of U.S. Intelligence
Studies, Association of Former Intelligence Officers 19:2 (Summer/Fall 2012): 55.
35
http://scholarcommons.usf.edu/jss/vol6/iss5/5
DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.3
Benes: OSINT, New Technologies, Education
had practical experience or exposure to the field."64 This limitation will increase the need
to combine their courses with intelligence practitioners.
• Best educational institutions: More schools, programs, or courses teaching analysis and
related issues should be available. Successful can only be education fast adaptable
(including curriculum), connecting theory and practice, inter-disciplinary, innovative,
visionary, generating fresh ideas and solutions, with strong self-reflection and
falsification capability, developing critical thinking, reaching out, with technological
dimensions (as both an educational target and tool with on-line classes or dimensions of
courses). Regarding technology, a great example is Professor Eugene Poteat's course
Technology, Intelligence, Sciences, and Security.65 Can we find resources for smaller,
seminar-type courses?
• Public awareness and knowledge: Opportunities and threats in cyber realm are not a
matter for intelligence professionals only but for the general public, too. Educating other
industries and bringing educators to other educational institutions not specialized in new
technologies and OSINT will help.
• English: New technologies launch English into a new era of its central and unrivaled
position. Despite the rise of other languages or translation software, English will
increasingly become a common platform for information exchange in various contexts.
As the level of know-how, the level of competency in English will decide about
opportunities, position, and power.
• Tools: Develop technological solutions for better solving the "volume problem,"67 in
increasing quality able to gather and prepare, or indicate needs of, open sources for the
intelligence process. Preparation means pre-sort (relevant vs. irrelevant) and pre-analyze
(pre-structure, identify patterns, irregularities, gaps, trends) information. Kent's approach
was criticized for being too wartime intelligence centric68 but such criticism is wrong.
General Donovan has proven the value of the precious wartime experience for developing
the firm basis for successful peace-time intelligence. Analyzing and exploiting military
64
Peter C. Oleson, “Getting Started. Initial Readings for Instructors on Intelligence.” The Intelligencer, Journal of
U.S. Intelligence Studies, Association of Former Intelligence Officers 18:2 (Winter/Spring 2011): 47.
65
Taught at the Institute of World Politics.
66
Benes, Libor, Intelligence and Policy: The Kent - Kendall Great Debate - and my take on it for now and future
(Washington, D.C.: The Institute of World Politics, November 2007).
67
Stephen H. Campbell, “Guide to Intelligence in the Post-Cold War Period: Part II - The Impact of Technology,”
The Intelligencer, Journal of U.S. Intelligence Studies, Association of Former Intelligence Officers (2012).
68
Willmoore Kendall, “The Function of Intelligence.” World Politics I:4 (1949): 548.
36
Produced by The Berkeley Electronic Press, 2013
Journal of Strategic Security, Vol. 6, No. 5
and top business (Wall Street, etc.) experience is vital. Find ways to shape and estimate
developments in open sources, keeping in mind William Casey's note about the changing
character of intelligence priorities from OSS, through the first peaceful years
concentrating on weapons estimates, to detection of subversion and economic
aggression.69
The other questions will lead, shape, and influence opportunities and threats linked to new
technologies and OSINT. The right approach, education, and human and material resources will
be increasingly needed to study and steer these factors to protect freedom, prosperity, and
national security and to develop America's role as the leader of the free world.
69
Casey, William and Herbert E. Meyer, Scouting the Future (Washington, D.C.: Regnery Gateway Publising,
1989): 20.
37
http://scholarcommons.usf.edu/jss/vol6/iss5/5
DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.3