Redefining Societal Verification

Total Page:16

File Type:pdf, Size:1020Kb

Redefining Societal Verification Innovating Verification: New Tools & New Actors to Reduce Nuclear Risks Redefining Societal Verification PART OF THE Cultivating Confidence Verification Series About the Verification Pilot Project The Verification Pilot Project of the Nuclear Threat Initiative (NTI) convened technical and policy experts from around the world to develop recommendations for new ap- proaches to verification that could enable future progress on arms reductions. As the two-year project moved forward, it became clear that innovating verification could also prompt near-term progress on non-proliferation and nuclear security. NTI partnered with senior leaders from the U.S. Departments of Defense, Energy, and State as well as the governments of Norway, Sweden, and the United Kingdom. That dialogue identified the key challenges that became the subjects of the project’s three expert working groups, which included more than 40 technical and policy experts from a dozen countries. Innovating Verification: New Tools & New Actors to Reduce Nuclear Risks includes an overview and reports from the three working groups: • The Innovating Verification Overview includes a foreword by Sam Nunn, NTI’s chief executive officer and co-chairman, and key project findings and recommendations across report topics. • Verifying Baseline Declarations of Nuclear Warheads and Materials analyzes how baseline declarations can contribute to near- and long-term arms control and non-proliferation goals and how to verify them without compromising sensitive information. • Redefining Societal Verification explores how advances in information technologies, big data, social media analytics, and commercial satellite imagery can supplement existing verification efforts by governments and increase contributions from outside experts. • Building Global Capacity considers the value of expanded international participation in the verification of nuclear arms reductions and how this participation can increase confidence in nuclear threat reduction efforts among all states. The project builds on Cultivating Confidence: Verification, Monitoring, and Enforcement for a World Free of Nuclear Weapons (Nuclear Threat Initiative, 2010), which outlined key issues that states need to address to ensure that nuclear weapons reductions can proceed in a safe and transparent manner. B Innovating Verification: New Tools & New Actors to Reduce Nuclear Risks Innovating Verification: New Tools & New Actors to Reduce Nuclear Risks Redefining Societal Verification July 2014 PART OF THE Cultivating Confidence Verification Series Cover Images: © iStockphoto Print Report Design: Dinsmore Designs Copyright © 2014 by the Nuclear Threat Initiative All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmit- ted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission of the copyright holder. For permissions, send an e-mail request to [email protected]. The views expressed in this publication do not reflect those of the NTI Board of Directors or institutions with which they are associated. ii Innovating Verification: New Tools & New Actors to Reduce Nuclear Risks Contents Acknowledgments . v Contributors . vi Redefining Societal Verification Working Group ...........................vi 1 . Executive Summary . 1 Recommendations. 4 2 . Introduction . 6 3 . Transformative Information Technologies: Lessons Learned . .13 Telegraphy .......................................................... 13 Radio .............................................................. 14 Commercial High-Resolution Satellite Imagery ........................... 15 Lessons Learned ..................................................... 18 4 . New Media and Geospatial Tools . .19 5 . The Monitoring Continuum: Observing to Mobilizing . 25 Observation for Societal Verification ................................... 26 Mobilization for Societal Verification .................................... 32 6 . Potential Models of Societal Verification . .35 National Observation ................................................. 36 National Mobilization ................................................. 38 Cooperative Observation .............................................. 39 Cooperative Mobilization. 40 7 . Enabling and Connecting Experts in Societal Verification . 43 8 . Technical Challenges . 47 Identifying the Interested Population for Societal Mobilization ............. 47 Defining Motivations for Societal Mobilization ........................... 49 Redefining Societal Verification iii Finding Meaning in the Noise .......................................... 49 Managing Data Volume ............................................... 50 Fusion of Multiple Platforms ........................................... 50 Data Openness ....................................................... 51 Tools to Analyze Datasets beyond Twitter ................................ 51 Challenges with Language ............................................. 51 Evasion and Countermeasures ......................................... 53 9 . Policy Challenges . .54 Data Collection and Use .............................................. 55 Collection Concerns Specific to Mobilization ............................. 56 Disclosure of Information ............................................. 56 Privacy and Personal Data ............................................. 58 Perception Principle .................................................. 60 Trusting the Data ..................................................... 60 Human Subjects ...................................................... 61 Protection of the Reputation of Industry ................................. 61 Effect on Confidence Specific to Mobilization ............................ 62 Treason and Espionage ............................................... 63 Protections for Participants ............................................ 64 Public and Private Ownership of Data and Access ........................ 65 Protecting Anonymity ................................................ 67 10 . Recommendations . .68 11 . Appendix . .70 Existing Law ......................................................... 70 U.S. Expert and Public Opinion ........................................ 71 International Perspective on Privacy .................................... 73 12 . Endnotes . .75 iv Innovating Verification: New Tools & New Actors to Reduce Nuclear Risks Acknowledgments Acknowledgments This report would not have been possible without We also appreciate the many officials and experts the contributions of many. who briefed the working group and provided crit- ical insights. Special thanks to Douglas J. Naquin, We are extremely grateful for the advice and input Dylan Schmorrow, Lisa Costa, Jill Egeth and their of the senior government officials who helped shape team at MITRE; Anthony Stefanidis, Arie Croi- this effort from the beginning. In the United States, toru, Andrew Crooks and Jacek Radzikowski this list includes Donald L. Cook, Rose E. Gottemo- from the George Mason Center for Geospatial eller, Anne Harrington, and Andrew C. Weber; in Intelligence; and Paul Richards from Columbia the United Kingdom, Bryan Wells and Peter Sankey University. from the Ministry of Defence; Norwegian Ambassa- dor Kåre Aas; and Christer Ahlstrom at the Swedish Finally, we are indebted to all our colleagues at NTI. Ministry for Foreign Affairs. We also thank Richard In particular, we thank Carmen MacDougall and Gullikson and Gary Stradling of the United States Mimi Hall for their guidance and communications Defense Threat Reduction Agency and Kjetil Køber expertise. Special thanks are due to Elise Rowan of the Norwegian Ministry of Foreign Affairs. who managed the production of the project’s results to a successful conclusion. Tammy Ware was indis- We are grateful to NTI Co-Chairman and Chief pensible to the success of the project as her support Executive Officer Sam Nunn, Vice Chairman Des was both professional and personal to us and to all Browne, President Joan Rohlfing, and Executive the working group members. We also are grateful Vice President Deborah Rosenblum for their stra- to interns Lauren Callahan and Sahil Shah and to tegic vision and collective feedback. We would also Herbert Scoville Jr. Peace Fellow Jessica Bufford for like to thank the NTI Board of Directors for their their contributions to the project. ongoing support, in particular NTI President Emer- itus Charles B. Curtis. Corey Hinderstein Vice President, International Program Achieving the central aims of this project would not have been possible without our working group Andrew Newman, Ph .D . members. These highly respected experts have been Senior Program Officer, International Program extremely generous with their time and energy, and we have done our best to ensure that this project Kelsey Hartigan reflects their collective wisdom. Program Officer, International Program Redefining Societal Verification v Contributors Contributors REDEFINING SOCIETAL VERIFICATION WORKING GROUP Chair: Corey Hinderstein Frank Pabian, Ph.D. Vice President, International Program Fellow, Los Alamos National Laboratory Nuclear Threat Initiative Senior Open-Source Nonproliferation Analyst, Joint Research Centre Erica Briscoe, Ph.D. European Commission Senior Research Scientist Georgia Tech Research Institute Kurt K. Siemon, Jr. Director of the Office of Nuclear Verification, Office Kelsey Hartigan of Nonproliferation and International
Recommended publications
  • Recursive Incentives and Innovation in Social Networks
    Recruiting Hay to Find Needles: Recursive Incentives and Innovation in Social Networks Erik P. Duhaime1, Brittany M. Bond1, Qi Yang1, Patrick de Boer2, & Thomas W. Malone1 1Massachusetts Institute of Technology 2University of Zurich Finding innovative solutions to complex problems is often about finding people who have access to novel information and alternative viewpoints. Research has found that most people are connected to each other through just a few degrees of separation, but successful social search is often difficult because it depends on people using their weak ties to make connections to distant social networks. Recursive incentive schemes have shown promise for social search by motivating people to use their weak ties to find distant targets, such as specific people or even weather balloons placed at undisclosed locations. Here, we report on a case study of a similar recursive incentive scheme for finding innovative ideas. Specifically, we implemented a competition to reward individual(s) who helped refer Grand Prize winner(s) in MIT’s Climate CoLab, an open innovation platform for addressing global climate change. Using data on over 78,000 CoLab members and over 36,000 people from over 100 countries who engaged with the referral contest, we find that people who are referred using this method are more likely than others both to submit proposals and to submit high quality proposals. Furthermore, we find suggestive evidence that among the contributors referred via the contest, those who had more than one degree of separation from a pre-existing CoLab member were more likely to submit high quality proposals. Thus, the results from this case study are consistent with the theory that people from distant networks are more likely to provide innovative solutions to complex problems.
    [Show full text]
  • Intelligence Community Programs, Management, and Enduring Issues
    Intelligence Community Programs, Management, and Enduring Issues (name redacted) Analyst in Intelligence and National Security Policy November 8, 2016 Congressional Research Service 7-.... www.crs.gov R44681 Intelligence Community Programs, Management, and Enduring Issues Summary Congress’s and the American public’s ability to oversee and understand how intelligence dollars are spent is limited by the secrecy that surrounds the intelligence budget process. Yet, total spending on the Intelligence Community (IC) programs discussed in this report equates to approximately $70 billion dollars—roughly 10% of national defense spending. This report is designed to shed light on the IC budget—in terms of its programs, management, and enduring issues—using unclassified materials available in the public domain. This report focuses those IC programs, grouped, for the most part, under two labels: (1) the National Intelligence Program (NIP), and (2) the Military Intelligence Program (MIP). Nevertheless, the combined NIP and MIP budgets do not encompass the total of U.S. intelligence- related spending. Intelligence-related programs that are not part of the IC include, for example, the large Office of Intelligence within the Department of Homeland Security’s (DHS’s) Immigration and Customs Enforcement (ICE) division. The ICE Office of Intelligence is not included in the IC because, theoretically, ICE activities primarily support the DHS mission to protect the homeland. This report explains the management structure for the NIP and MIP to include their two separate budget processes and the roles of the Director of National Intelligence and the Under Secretary of Defense (Intelligence). The concluding section of this report considers the ability of the U.S.
    [Show full text]
  • Open Source Intelligence (OSINT)
    ATP 2-22.9 Open-Source Intelligence July 2012 DISTRIBUTION RESTRICTION: Unlimited Distribution Headquarters, Department of the Army *ATP 2-22.9 Army Techniques Publication Headquarters No. 2-22.9 (FMI 2-22.9) Department of the Army Washington, DC, 10 July 2012 Open-Source Intelligence Contents Page PREFACE.............................................................................................................. iv INTRODUCTION .................................................................................................... v Chapter 1 OPEN-SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS ........................ 1-1 Definition and Terms .......................................................................................... 1-1 Characteristics .................................................................................................... 1-1 The Intelligence Warfighting Function ................................................................ 1-2 The Intelligence Process .................................................................................... 1-3 The Planning Requirements and Assessing Collection Process ........................ 1-4 The Military Decisionmaking Process ................................................................ 1-4 Intelligence Preparation of the Battlefield ........................................................... 1-5 Chapter 2 PLANNING AND PREPARATION OF THE OSINT MISSION ............................. 2-1 Section I – Planning OSINT Activities ...........................................................
    [Show full text]
  • DNI Open Source Conference 2008 Transcripts
    Office of the Director of National Intelligence Transcripts from the DNI Open Source Conference 2008 Washington, DC September 11, 2008 – September 12, 2008 The links below will forward you to the appropriate transcripts: 1) Mr. Glenn Gaffney Deputy Director of National Intelligence for Collection 2) Mr. Michael V. Hayden Director of the Central Intelligence Agency 3) Ms. Christine McKeown Office of the Under Secretary of Defense for Intelligence 4) Mr. Doug Naquin Director of the Open Source Center 5) Mr. Charles E. Allen DHS Under Secretary for Intelligence & Analysis 6) Panel: Managing the Balance Between Privacy & National Security 1 Remarks and Q&A by the Deputy Director of National Intelligence for Collection Mr. Glenn A. Gaffney DNI Open Source Conference 2008 Washington, DC MS. SABRA HORNE (ODNI Senior Advisor for Open Source/Outreach): Good morning. Welcome ladies and gentlemen and welcome to the Second Annual DNI Open Source Conference. We’re thrilled to have you here. I’m Sabra Horne, Senior Advisor for Outreach and the organizer for this event. We see many familiar faces here, a lot of the wonderful folks we’ve worked with over the past few years as well as those of you who were able to attend the conference last year. But in this last year, we’ve added many, many, many new faces to our friends and family list – those of you who know that using open source is vital in ensuring that we protect our national security. Our list of friends and family has grown, and grown, and grown. You recognize that open source information is critical in transcending the confines of the traditional Intelligence Community.
    [Show full text]
  • ANTONY ANTONIOU (OSINT Security Analyst)
    EUROPEAN INTELLIGENCE ACADEMY (EIA) E-BOOK No. 1, MAY 2013 ANTONY ANTONIOU (OSINT Security Analyst) OPEN SOURCE INFORMATION, THE FUTURE OF INTELLIGENCE Copyright: Research Institute for European and American Studies (RIEAS) EUROPEAN INTELLIGENCE ACADEMY E-BOOK No. 1 MAY 2013 OPEN SOURCE INFORMATION, THE FUTURE OF INTELLIGENCE ANTONY ANTONIOU (OSINT Security Analyst) Preface. People from ancient times to our days had understood the importance of information and the significant role that valid information can play in all fields of human activities (politics, economy, during wars etc). References to spies, and their methods – techniques and means that they used can be found in historical texts from antiquity until today, also known theorists of war have addressed and reported (in their writings), the importance of information and the necessity of an enemy misinformation (we will mention two of them of Carl Von Clausewitz1 and Sun - Tzu2). The intelligence services began to take shape during the Second World War. Pioneers at the “intelligence field” were the Germans (in espionage, cryptography - cryptology, propaganda and generally speaking at the development of the appropriate techniques – methods and instruments – means), followed by British. Americans because of their non-participation in the war had left behind in the development of techniques and means for collecting and processing information. This changed after the Japanese attack on Pearl Harbor3 and the American entry into the war4. The USA intelligence 1 Carl Philipp Gottfried von Clausewitz (1 July 1780 – 16 November 1831): was a German-Prussian soldier and military theorist who stressed the "moral" (in modern terms, psychological) and political aspects of war.
    [Show full text]
  • New Tools for Collaboration: the Experience of the U.S. Intelligence Community
    JANUARY 2016 1616 Rhode Island Avenue NW Washington, DC 20036 202-887-0200 | www.csis.org Lanham • Boulder • New York • London 4501 Forbes Boulevard Lanham, MD 20706 301- 459- 3366 | www.rowman.com Cover photo: Rawpixel.com/Shutterstock New Tools for Collaboration The Experience of the U.S. Intelligence Community A Report of the CSIS Strategic Technologies Program ISBN 978-1-4422-5912-6 AUTHOR Ë|xHSLEOCy259126z v*:+:!:+:! Gregory F. Treverton Blank New Tools for Collaboration The Experience of the U.S. Intelligence Community AUTHOR Gregory F. Treverton January 2016 A Report of the CSIS Strategic Technologies Program Lanham • Boulder • New York • London About CSIS For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. Today, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organization headquartered in Washington, D.C. The Center’s 220 full-time staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and economic integration. Thomas J.
    [Show full text]
  • U.S. Intelligence Reform a Bureaucratic Politics Approach
    University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2010 U.S. Intelligence Reform A Bureaucratic Politics Approach Bonnie M. Schickler University of Central Florida Part of the Political Science Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Masters Thesis (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Schickler, Bonnie M., "U.S. Intelligence Reform A Bureaucratic Politics Approach" (2010). Electronic Theses and Dissertations, 2004-2019. 1669. https://stars.library.ucf.edu/etd/1669 U.S. INTELLIGENCE REFORM: A BUREAUCRATIC POLITICS APPROACH by BONNIE M. SCHICKLER B.A. University of Central Florida, 2008 A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science in the College of Science at the University of Central Florida Orlando, Florida Fall Term 2010 © 2010 Bonnie Schickler ii ABSTRACT This study investigates the current bureaucratic struggles that exist within the U.S. intelligence community as a result of the Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004. The first part of this research examines the history of intelligence reform in the United States beginning with the National Security Act of 1947. The second part provides an in- depth discussion of the 2004 legislation as well as an examination of the main bureaucratic conflicts that have arisen between the Director of National Intelligence (DNI) and the rest of the U.S.
    [Show full text]
  • A Survey of Systemic Risk Analytics
    OFFICE OF FINANCIAL RESEARCH U.S. DEPARTMENT OF THE TREASURY Office of Financial Research Working Paper #0001 January 5, 2012 A Survey of Systemic Risk Analytics 1 Dimitrios Bisias 2 Mark Flood 3 Andrew W. Lo 4 Stavros Valavanis 1 MIT Operations Research Center 2 Senior Policy Advisor, OFR, [email protected] 3 MIT Sloan School of Management, [email protected] 4 MIT Laboratory for Financial Engineering The Office of Financial Research (OFR) Working Paper Series allows staff and their co-authors to disseminate preliminary research findings in a format intended to generate discussion and critical comments. Papers in the OFR Working Paper Series are works in progress and subject to revision. Views and opinions expressed are those of the authors and do not necessarily represent official OFR or Treasury positions or policy. Comments are welcome as are suggestions for improvements, and should be directed to the authors. OFR Working Papers may be quoted without additional permission. www.treasury.gov/ofr A Survey of Systemic Risk Analytics∗ Dimitrios Bisias†, Mark Flood‡, Andrew W. Lo§, Stavros Valavanis¶ This Draft: January 5, 2012 We provide a survey of 31 quantitative measures of systemic risk in the economics and finance literature, chosen to span key themes and issues in systemic risk measurement and manage- ment. We motivate these measures from the supervisory, research, and data perspectives in the main text, and present concise definitions of each risk measure—including required inputs, expected outputs, and data requirements—in an extensive appendix. To encourage experimentation and innovation among as broad an audience as possible, we have developed open-source Matlab code for most of the analytics surveyed, which can be accessed through the Office of Financial Research (OFR) at http://www.treasury.gov/ofr.
    [Show full text]
  • Reflecting on the DARPA Red Balloon Challenge
    contributed articles Doi:10.1145/1924421.1924441 how more recent developments (such Finding 10 balloons across the U.S. illustrates as social media and crowdsourcing) could be used to solve challenging how the Internet has changed the way problems involving distributed geo- we solve highly distributed problems. locations. Since the Challenge was an- nounced only about one month before By John C. tanG, manueL Cebrian, nicklaus a. GiaCoBe, the balloons were deployed, it was not hyun-Woo Kim, taemie Kim, anD Douglas “BeaKeR” WickeRt only a timed contest to find the bal- loons but also a time-limited challenge to prepare for the contest. Both the dif- fusion of how teams heard about the Challenge and the solution itself dem- Reflecting onstrated the relative effectiveness of mass media and social media. The surprising efficiency of apply- ing social networks of acquaintances on the DaRPa to solve widely distributed tasks was demonstrated in Stanley Milgram’s celebrated work9 popularizing the no- tion of “six degrees of separation”; that is, it typically takes no more than six in- Red Balloon termediaries to connect any arbitrary pair of people. Meanwhile, the Internet and other communication technolo- gies have emerged that increase the Challenge ease and opportunity for connections. These developments have enabled crowdsourcing—aggregating bits of information across a large number of users to create productive value—as a popular mechanism for creating en- cyclopedias of information (such as ThE 2009 dARPA Red Balloon Challenge (also known Wikipedia) and solving other highly distributed problems.1 as the DARPA Network Challenge) explored how the The Challenge was announced at the Internet and social networking can be used to solve “40th Anniversary of the Internet” event a distributed, time-critical, geo-location problem.
    [Show full text]
  • Intelligence Authorization Act for Fiscal Year 2010
    PUBLIC LAW 111–259—OCT. 7, 2010 INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2010 VerDate Nov 24 2008 02:55 Oct 21, 2010 Jkt 099139 PO 00259 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL259.111 GPO1 PsN: PUBL259 anorris on DSK5R6SHH1PROD with PUBLIC LAWS 124 STAT. 2654 PUBLIC LAW 111–259—OCT. 7, 2010 Public Law 111–259 111th Congress An Act To authorize appropriations for fiscal year 2010 for intelligence and intelligence- Oct. 7, 2010 related activities of the United States Government, the Community Management [H.R. 2701] Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes. Be it enacted by the Senate and House of Representatives of Intelligence the United States of America in Congress assembled, Authorization Act for Fiscal SECTION 1. SHORT TITLE; TABLE OF CONTENTS. Year 2010. (a) SHORT TITLE.—This Act may be cited as the ‘‘Intelligence Authorization Act for Fiscal Year 2010’’. (b) TABLE OF CONTENTS.—The table of contents for this Act is as follows: Sec. 1. Short title; table of contents. Sec. 2. Definitions. TITLE I—BUDGET AND PERSONNEL AUTHORIZATIONS Sec. 101. Authorization of appropriations. Sec. 102. Restriction on conduct of intelligence activities. Sec. 103. Budgetary provisions. TITLE II—CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM Sec. 201. Technical modification to mandatory retirement provision of the Central Intelligence Agency Retirement Act. TITLE III—GENERAL INTELLIGENCE COMMUNITY MATTERS Subtitle A—Personnel Matters Sec. 301. Increase in employee compensation and benefits authorized by law. Sec. 302. Enhanced flexibility in nonreimbursable details to elements of the intel- ligence community.
    [Show full text]
  • Chapter 2 China's Impact on U.S. Security Interests
    CHAPTER 2 CHINA’S IMPACT ON U.S. SECURITY INTERESTS SECTION 1: MILITARY AND SECURITY YEAR IN REVIEW Introduction This section—based on a Commission hearing, discussions with outside experts and U.S. Department of Defense (DoD) officials, and independent research—examines China’s late 2012 national and military leadership transition, China’s 2012 defense white paper, China’s 2013 defense budget, China’s military moderniza- tion, security developments involving China, and the U.S.-China security relationship. The section concludes with a discussion of China’s impact on U.S. security interests. See chapter 2, section 2 and chapter 2, section 3, for coverage of China’s cyber activities and China’s maritime disputes, respectively. Leadership Transition President Xi Jinping Assumes Central Military Commission Chairmanship China’s late 2012 leadership transition brought the largest turn- over to the Central Military Commission (CMC) * in a decade. Xi Jinping assumed the position of both CMC chairman and Chinese Communist Party (CCP) general secretary at the CCP’s 18th Party Congress on November 15, 2012. President Xi then completed his accession as China’s senior leader by becoming the People’s Repub- lic of China (PRC) president on March 14, 2013. Although Presi- dent Xi was widely expected to eventually assume all three of Chi- na’s top leadership posts, many observers were surprised by the speed of his elevation to CMC chairman. Official Chinese press de- scribed President Xi’s early promotion as an ‘‘unusual twist to Chi- na’s leadership transition’’ and praised outgoing CMC Chairman Hu Jintao for his decision to step down.1 Mr.
    [Show full text]
  • Open-Source Intelligence from Wikipedia, the Free Encyclopedia (Redirected from Open Source Intelligence)
    Open -source intelligence - Wikipedia, the free encyclopedia Page 1 of 6 Open-source intelligence From Wikipedia, the free encyclopedia (Redirected from Open source intelligence) Open-source intelligence ( OSINT ) is intelligence collected from publicly available sources. [1] In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence. Contents ◾ 1 Open sources for intelligence ◾ 2 Definers for OSINT ◾ 3 Competitive intelligence ◾ 4 Risks for practitioners ◾ 5 Value ◾ 6 Process ◾ 7 History ◾ 8 OSINT communities ◾ 8.1 Government ◾ 8.2 Intelligence ◾ 8.3 Armed Forces ◾ 8.4 Homeland Security ◾ 8.5 Law enforcement ◾ 8.6 Business ◾ 9 See also ◾ 10 References ◾ 11 Literature ◾ 12 External links Open sources for intelligence OSINT includes a wide variety of information and sources: ◾ Media: newspapers, magazines, radio, television, and computer-based information. ◾ Web-based communities and user-generated content: social-networking sites, video sharing sites, wikis, blogs, and folksonomies. ◾ Public data: government reports, official data such as budgets, demographics, hearings, legislative debates, press conferences, speeches, marine and aeronautical safety warnings, environmental impact statements and contract awards. ◾ Observation and reporting: amateur airplane spotters, radio monitors and satellite observers among many others have provided significant information not otherwise available. The availability of worldwide satellite photography, often of high resolution, on the Web (e.g., Google Earth) has expanded open-source capabilities into areas formerly available only to major intelligence services. ◾ Professional and academic (including grey literature): conferences, symposia, professional associations, academic papers, and subject matter experts. [2] ◾ Most information has geospatial dimensions, but many often overlook the geospatial side of OSINT: not all open-source data is unstructured text.
    [Show full text]