SlideShare a Scribd company logo
1 of 5
OSINT Forum – Week 5
For this forum, you are to answer
one or more
of the questions listed below. The original post must be a
minimum of
250
words. Additionally, you must post two peer responses on a
classmate’s original post. Responses should be a minimum of
200
words each and include direct questions.
Questions:
- How have the authors detailed the value of open sources.
Discuss one or more values. Provide real-time examples to your
discussion.
- Explain the importance of open source information and the
intelligence cycle.
- Why should intelligence personnel who have access to
classified information should not produce unclassified products
on the same subjects?
- What are the downsides of open source information?
- Identify sources one can go to collect open source
information. Provide details for each source identified.
Reading & Resources:
Collecting Open Source Intelligence via Tailored Information
Delivery Systems
Producing Intelligence from Open Sources
NATO OSINT Handbook
(pages 1-35)
The Downside of Open Source Intelligence
Student Response #1 – Nicholas
The Intelligence cycle is what drives collection from every
intelligence discipline. And that is especially true with OSINT.
First there must be requirements to drive the intelligence cycle.
With the requirements in place, the analysts will have an idea of
what they are going to collect on, when the requirements are
known they will be further scrutinized by the planning and
direction phase which is led by the National Security Branch
(Intelligence nd, np). Once the analyst is aware of the
requirements and the planning/direction has taken place, they
can now collect raw information through open source. Once the
analyst gathers the information, they process and exploit it into
a usable form. Once the information has been sorted and placed
in a workable form, the analyst will now turn the raw
information into intelligence (Intelligence nd np). Last and not
least, once the information is turned into intelligence it will be
put in the correct format to fit their customer’s needs. This is
why the intelligence cycle is very important for open source
information and the analysis of this information into
intelligence. The steps above are pulled from the basic
intelligence cycle, while the intelligence cycle that focuses
primarily on OSINT (according to NATO) only uses planning
and direction, collection, processing and exploitation, searching
anonymously on the web, production, and dissemination and
evaluation (Kernan 2012, 15). The steps are all similar, but the
steps NATO points out for OSINT is more specific to OSINT,
rather than every collection effort.
Since a lot of us have spoke about deception techniques and
some of the flaws involved with OSINT, I figured I’d also add
in some opinions/information about the downsides of open
source information. Although OSINT is viewed valuable in most
cases, reliability issues arise from proliferation on individual
cites that produce propaganda, misinformation, or
disinformation (Hulnick 2002, 568). The argument can be made
about other INT’s having reliability issues, but the fact remains
that Open Source information can be printed or spoke about by
anyone. With SIGINT, an individual might be targeted for a
reason and the only reliability with SIGINT in this realm is if
the individual is aware of the situation and alters what he/she is
saying. So, what this says is every intelligence discipline will
have downsides, but it’s how the analyst recognizes the
downsides and works around them.
References:
“Intelligence Cycle.” FBI.gov. Accessed 2 November 2014.
http://www.fbi.gov/about-us/intelligence/intelligence-cycle.
Hulnick, Arthur S. 2002. “The Downside of Open
Source Intelligence.” International Journal of Intelligence and
Counter Intelligence.
Kernan, W.F. November 2001. “NATO Open Source
Intelligence Handbook.”
Student Response #2 – Dwayne
What are the downsides of open source information?
It has been widely noted throughout the last 60 years or
so that open source intelligence (OSINT) aids in providing the
bulk of information used by the intelligence community. Some
regard it as the “bread and butter” of analysis, serving as the
basis from which other intelligence is then sought. While
having been increasingly used, this method of intelligence
collection is not without its drawbacks, as is the case with any
of the “int’s”.
Perhaps the largest challenge is sorting through the
mountains of open source information in search of usable
information to refine into intelligence. Hulnick says that “The
conventional wisdom suggests that the greatest problem is the
excess of OSINT now overwhelming the ability of analysts to
sort through it. This pressure, though not new, has been
exacerbated by the proliferation of open source data in recent
years” (Hulnick, 2002, 566). More and more websites are being
developed every year that release or track possibly usable
information. Technology has had to try and keep pace with the
exponential increase in OSINT targets, which is no small
matter.
Another major concern about OSINT is that it is
unreliable. This is not a new concern, nor is it limited to
OSINT. All intelligence sources must be thoroughly vetted for
reliability before they become an asset. This applies to OSINT
sources just the same. Through experience and comparison,
OSINT sources can be screened for reliability, bias and
propaganda by the analysts, particularly the seasoned veterans.
OSINT, historically, has also been proven to be used as
a conduit for deception and disinformation campaigns by US
adversaries – and also the US themselves. Knowing that OSINT
is susceptible to being exploited in that manner, it further
reinforces the idea that the seasoned analysts must be weary and
closely scrutinize subject matter.
Resource:
Hulnick, A. 2002.
The downside of open source intelligence
. International Journal of Intelligence and Counterintelligence.
15:565-579. Retrieved from
https://edge.apus.edu/access/content/group/security-and-global-
studies-
common/Intelligence%20Studies/INTL%20422/Content/Week%
205/The%20Downside%20of%20Open%20Source%20Intelligen
ce_Hulnick.pdf
OSINT Forum – Week 5 Questions Answered

More Related Content

Similar to OSINT Forum – Week 5 Questions Answered

Deriving Intelligence from Open Source Information
Deriving Intelligence from Open Source InformationDeriving Intelligence from Open Source Information
Deriving Intelligence from Open Source InformationAdrianPBTaylor
 
LIS 60030 Final Project
LIS 60030 Final ProjectLIS 60030 Final Project
LIS 60030 Final ProjectLaura Levy
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
OSINT Extra Credit  Show your knowledge of OSINT and expand on the .docx
OSINT Extra Credit  Show your knowledge of OSINT and expand on the .docxOSINT Extra Credit  Show your knowledge of OSINT and expand on the .docx
OSINT Extra Credit  Show your knowledge of OSINT and expand on the .docxloganta
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesNora A. Rahim
 
Confrontation or CollaborationCongress and the Intelligen.docx
Confrontation or CollaborationCongress and the Intelligen.docxConfrontation or CollaborationCongress and the Intelligen.docx
Confrontation or CollaborationCongress and the Intelligen.docxmaxinesmith73660
 
What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?Zoe Gilbert
 
Answer one of the following (250 words)QuestionsWhat ro.docx
Answer one of the following (250 words)QuestionsWhat ro.docxAnswer one of the following (250 words)QuestionsWhat ro.docx
Answer one of the following (250 words)QuestionsWhat ro.docxSHIVA101531
 
Colaboración Juan Pablo Somiedo Foreknowledge2
Colaboración Juan Pablo Somiedo Foreknowledge2 Colaboración Juan Pablo Somiedo Foreknowledge2
Colaboración Juan Pablo Somiedo Foreknowledge2 Juan Pablo Somiedo
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalJohn Dunne
 
Colaboración Juan Pablo Somiedo Foreknowledge issue3r
Colaboración Juan Pablo Somiedo Foreknowledge issue3rColaboración Juan Pablo Somiedo Foreknowledge issue3r
Colaboración Juan Pablo Somiedo Foreknowledge issue3rJuan Pablo Somiedo
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...g8briel
 
Intelligence cooperation: The OSINT option
Intelligence cooperation: The OSINT optionIntelligence cooperation: The OSINT option
Intelligence cooperation: The OSINT optionAxel Dyevre
 
2015-06-02-SCIA-Presentation-Infocodex-Final
2015-06-02-SCIA-Presentation-Infocodex-Final2015-06-02-SCIA-Presentation-Infocodex-Final
2015-06-02-SCIA-Presentation-Infocodex-FinalBeat Meyer
 
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro... Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...MITRE ATT&CK
 
Second Mini Research Paper Topic and Annotated Bibliography For this.docx
Second Mini Research Paper Topic and Annotated Bibliography For this.docxSecond Mini Research Paper Topic and Annotated Bibliography For this.docx
Second Mini Research Paper Topic and Annotated Bibliography For this.docxwrite12
 

Similar to OSINT Forum – Week 5 Questions Answered (20)

Deriving Intelligence from Open Source Information
Deriving Intelligence from Open Source InformationDeriving Intelligence from Open Source Information
Deriving Intelligence from Open Source Information
 
LIS 60030 Final Project
LIS 60030 Final ProjectLIS 60030 Final Project
LIS 60030 Final Project
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
OSINT Extra Credit  Show your knowledge of OSINT and expand on the .docx
OSINT Extra Credit  Show your knowledge of OSINT and expand on the .docxOSINT Extra Credit  Show your knowledge of OSINT and expand on the .docx
OSINT Extra Credit  Show your knowledge of OSINT and expand on the .docx
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Confrontation or CollaborationCongress and the Intelligen.docx
Confrontation or CollaborationCongress and the Intelligen.docxConfrontation or CollaborationCongress and the Intelligen.docx
Confrontation or CollaborationCongress and the Intelligen.docx
 
What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?
 
Answer one of the following (250 words)QuestionsWhat ro.docx
Answer one of the following (250 words)QuestionsWhat ro.docxAnswer one of the following (250 words)QuestionsWhat ro.docx
Answer one of the following (250 words)QuestionsWhat ro.docx
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 
Colaboración Juan Pablo Somiedo Foreknowledge2
Colaboración Juan Pablo Somiedo Foreknowledge2 Colaboración Juan Pablo Somiedo Foreknowledge2
Colaboración Juan Pablo Somiedo Foreknowledge2
 
Intelligence cycle
Intelligence cycleIntelligence cycle
Intelligence cycle
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 Final
 
Colaboración Juan Pablo Somiedo Foreknowledge issue3r
Colaboración Juan Pablo Somiedo Foreknowledge issue3rColaboración Juan Pablo Somiedo Foreknowledge issue3r
Colaboración Juan Pablo Somiedo Foreknowledge issue3r
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
 
2007 un dss class before one briefing
2007 un dss class before one briefing2007 un dss class before one briefing
2007 un dss class before one briefing
 
Intelligence cooperation: The OSINT option
Intelligence cooperation: The OSINT optionIntelligence cooperation: The OSINT option
Intelligence cooperation: The OSINT option
 
2015-06-02-SCIA-Presentation-Infocodex-Final
2015-06-02-SCIA-Presentation-Infocodex-Final2015-06-02-SCIA-Presentation-Infocodex-Final
2015-06-02-SCIA-Presentation-Infocodex-Final
 
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro... Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 
Second Mini Research Paper Topic and Annotated Bibliography For this.docx
Second Mini Research Paper Topic and Annotated Bibliography For this.docxSecond Mini Research Paper Topic and Annotated Bibliography For this.docx
Second Mini Research Paper Topic and Annotated Bibliography For this.docx
 

More from loganta

Paper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docx
Paper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docxPaper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docx
Paper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docxloganta
 
Paper format APA WORDS 275subject Environmental studies and .docx
Paper format APA WORDS 275subject Environmental studies and .docxPaper format APA WORDS 275subject Environmental studies and .docx
Paper format APA WORDS 275subject Environmental studies and .docxloganta
 
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docxPaper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docxloganta
 
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docxPaper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docxloganta
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxloganta
 
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docxPaper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docxloganta
 
Paper must be APA format.  Integrate worldview as well as Bible refe.docx
Paper must be APA format.  Integrate worldview as well as Bible refe.docxPaper must be APA format.  Integrate worldview as well as Bible refe.docx
Paper must be APA format.  Integrate worldview as well as Bible refe.docxloganta
 
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docxPage 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docxloganta
 
Pages1, Double spacedSources1Order typeEssaySubject.docx
Pages1, Double spacedSources1Order typeEssaySubject.docxPages1, Double spacedSources1Order typeEssaySubject.docx
Pages1, Double spacedSources1Order typeEssaySubject.docxloganta
 
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docxPages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docxloganta
 
OverviewGlobal organizations have branches that are located .docx
OverviewGlobal organizations have branches that are located .docxOverviewGlobal organizations have branches that are located .docx
OverviewGlobal organizations have branches that are located .docxloganta
 
OverviewThe tasks in this assignment focus on the concept of organ.docx
OverviewThe tasks in this assignment focus on the concept of organ.docxOverviewThe tasks in this assignment focus on the concept of organ.docx
OverviewThe tasks in this assignment focus on the concept of organ.docxloganta
 
P4-4 How is the compounding process related to the payment of.docx
P4-4 How is the compounding process related to the payment of.docxP4-4 How is the compounding process related to the payment of.docx
P4-4 How is the compounding process related to the payment of.docxloganta
 
OverviewOver the course of the semester you will prepare a m.docx
OverviewOver the course of the semester you will prepare a m.docxOverviewOver the course of the semester you will prepare a m.docx
OverviewOver the course of the semester you will prepare a m.docxloganta
 
OverviewIn our study of poetry, we have discussed several key po.docx
OverviewIn our study of poetry, we have discussed several key po.docxOverviewIn our study of poetry, we have discussed several key po.docx
OverviewIn our study of poetry, we have discussed several key po.docxloganta
 
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docxPA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docxloganta
 
OverviewIn this project you will implement a server for the Purdue.docx
OverviewIn this project you will implement a server for the Purdue.docxOverviewIn this project you will implement a server for the Purdue.docx
OverviewIn this project you will implement a server for the Purdue.docxloganta
 
OverviewIf there is one important lesson you can learn as social s.docx
OverviewIf there is one important lesson you can learn as social s.docxOverviewIf there is one important lesson you can learn as social s.docx
OverviewIf there is one important lesson you can learn as social s.docxloganta
 
Over 600,000 Americans lost their lives in the Civil War, with the N.docx
Over 600,000 Americans lost their lives in the Civil War, with the N.docxOver 600,000 Americans lost their lives in the Civil War, with the N.docx
Over 600,000 Americans lost their lives in the Civil War, with the N.docxloganta
 
Over the long period of time that life has existed on Earth, there.docx
Over the long period of time that life has existed on Earth, there.docxOver the long period of time that life has existed on Earth, there.docx
Over the long period of time that life has existed on Earth, there.docxloganta
 

More from loganta (20)

Paper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docx
Paper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docxPaper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docx
Paper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docx
 
Paper format APA WORDS 275subject Environmental studies and .docx
Paper format APA WORDS 275subject Environmental studies and .docxPaper format APA WORDS 275subject Environmental studies and .docx
Paper format APA WORDS 275subject Environmental studies and .docx
 
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docxPaper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docx
 
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docxPaper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docx
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
 
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docxPaper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
 
Paper must be APA format.  Integrate worldview as well as Bible refe.docx
Paper must be APA format.  Integrate worldview as well as Bible refe.docxPaper must be APA format.  Integrate worldview as well as Bible refe.docx
Paper must be APA format.  Integrate worldview as well as Bible refe.docx
 
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docxPage 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
 
Pages1, Double spacedSources1Order typeEssaySubject.docx
Pages1, Double spacedSources1Order typeEssaySubject.docxPages1, Double spacedSources1Order typeEssaySubject.docx
Pages1, Double spacedSources1Order typeEssaySubject.docx
 
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docxPages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
 
OverviewGlobal organizations have branches that are located .docx
OverviewGlobal organizations have branches that are located .docxOverviewGlobal organizations have branches that are located .docx
OverviewGlobal organizations have branches that are located .docx
 
OverviewThe tasks in this assignment focus on the concept of organ.docx
OverviewThe tasks in this assignment focus on the concept of organ.docxOverviewThe tasks in this assignment focus on the concept of organ.docx
OverviewThe tasks in this assignment focus on the concept of organ.docx
 
P4-4 How is the compounding process related to the payment of.docx
P4-4 How is the compounding process related to the payment of.docxP4-4 How is the compounding process related to the payment of.docx
P4-4 How is the compounding process related to the payment of.docx
 
OverviewOver the course of the semester you will prepare a m.docx
OverviewOver the course of the semester you will prepare a m.docxOverviewOver the course of the semester you will prepare a m.docx
OverviewOver the course of the semester you will prepare a m.docx
 
OverviewIn our study of poetry, we have discussed several key po.docx
OverviewIn our study of poetry, we have discussed several key po.docxOverviewIn our study of poetry, we have discussed several key po.docx
OverviewIn our study of poetry, we have discussed several key po.docx
 
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docxPA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
 
OverviewIn this project you will implement a server for the Purdue.docx
OverviewIn this project you will implement a server for the Purdue.docxOverviewIn this project you will implement a server for the Purdue.docx
OverviewIn this project you will implement a server for the Purdue.docx
 
OverviewIf there is one important lesson you can learn as social s.docx
OverviewIf there is one important lesson you can learn as social s.docxOverviewIf there is one important lesson you can learn as social s.docx
OverviewIf there is one important lesson you can learn as social s.docx
 
Over 600,000 Americans lost their lives in the Civil War, with the N.docx
Over 600,000 Americans lost their lives in the Civil War, with the N.docxOver 600,000 Americans lost their lives in the Civil War, with the N.docx
Over 600,000 Americans lost their lives in the Civil War, with the N.docx
 
Over the long period of time that life has existed on Earth, there.docx
Over the long period of time that life has existed on Earth, there.docxOver the long period of time that life has existed on Earth, there.docx
Over the long period of time that life has existed on Earth, there.docx
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 

OSINT Forum – Week 5 Questions Answered

  • 1. OSINT Forum – Week 5 For this forum, you are to answer one or more of the questions listed below. The original post must be a minimum of 250 words. Additionally, you must post two peer responses on a classmate’s original post. Responses should be a minimum of 200 words each and include direct questions. Questions: - How have the authors detailed the value of open sources. Discuss one or more values. Provide real-time examples to your discussion. - Explain the importance of open source information and the intelligence cycle. - Why should intelligence personnel who have access to classified information should not produce unclassified products on the same subjects? - What are the downsides of open source information? - Identify sources one can go to collect open source information. Provide details for each source identified. Reading & Resources: Collecting Open Source Intelligence via Tailored Information Delivery Systems Producing Intelligence from Open Sources NATO OSINT Handbook (pages 1-35) The Downside of Open Source Intelligence
  • 2. Student Response #1 – Nicholas The Intelligence cycle is what drives collection from every intelligence discipline. And that is especially true with OSINT. First there must be requirements to drive the intelligence cycle. With the requirements in place, the analysts will have an idea of what they are going to collect on, when the requirements are known they will be further scrutinized by the planning and direction phase which is led by the National Security Branch (Intelligence nd, np). Once the analyst is aware of the requirements and the planning/direction has taken place, they can now collect raw information through open source. Once the analyst gathers the information, they process and exploit it into a usable form. Once the information has been sorted and placed in a workable form, the analyst will now turn the raw information into intelligence (Intelligence nd np). Last and not least, once the information is turned into intelligence it will be put in the correct format to fit their customer’s needs. This is why the intelligence cycle is very important for open source information and the analysis of this information into intelligence. The steps above are pulled from the basic intelligence cycle, while the intelligence cycle that focuses primarily on OSINT (according to NATO) only uses planning and direction, collection, processing and exploitation, searching anonymously on the web, production, and dissemination and evaluation (Kernan 2012, 15). The steps are all similar, but the steps NATO points out for OSINT is more specific to OSINT, rather than every collection effort. Since a lot of us have spoke about deception techniques and some of the flaws involved with OSINT, I figured I’d also add in some opinions/information about the downsides of open source information. Although OSINT is viewed valuable in most cases, reliability issues arise from proliferation on individual cites that produce propaganda, misinformation, or disinformation (Hulnick 2002, 568). The argument can be made
  • 3. about other INT’s having reliability issues, but the fact remains that Open Source information can be printed or spoke about by anyone. With SIGINT, an individual might be targeted for a reason and the only reliability with SIGINT in this realm is if the individual is aware of the situation and alters what he/she is saying. So, what this says is every intelligence discipline will have downsides, but it’s how the analyst recognizes the downsides and works around them. References: “Intelligence Cycle.” FBI.gov. Accessed 2 November 2014. http://www.fbi.gov/about-us/intelligence/intelligence-cycle. Hulnick, Arthur S. 2002. “The Downside of Open Source Intelligence.” International Journal of Intelligence and Counter Intelligence. Kernan, W.F. November 2001. “NATO Open Source Intelligence Handbook.” Student Response #2 – Dwayne What are the downsides of open source information? It has been widely noted throughout the last 60 years or so that open source intelligence (OSINT) aids in providing the bulk of information used by the intelligence community. Some regard it as the “bread and butter” of analysis, serving as the basis from which other intelligence is then sought. While having been increasingly used, this method of intelligence collection is not without its drawbacks, as is the case with any of the “int’s”. Perhaps the largest challenge is sorting through the mountains of open source information in search of usable information to refine into intelligence. Hulnick says that “The conventional wisdom suggests that the greatest problem is the
  • 4. excess of OSINT now overwhelming the ability of analysts to sort through it. This pressure, though not new, has been exacerbated by the proliferation of open source data in recent years” (Hulnick, 2002, 566). More and more websites are being developed every year that release or track possibly usable information. Technology has had to try and keep pace with the exponential increase in OSINT targets, which is no small matter. Another major concern about OSINT is that it is unreliable. This is not a new concern, nor is it limited to OSINT. All intelligence sources must be thoroughly vetted for reliability before they become an asset. This applies to OSINT sources just the same. Through experience and comparison, OSINT sources can be screened for reliability, bias and propaganda by the analysts, particularly the seasoned veterans. OSINT, historically, has also been proven to be used as a conduit for deception and disinformation campaigns by US adversaries – and also the US themselves. Knowing that OSINT is susceptible to being exploited in that manner, it further reinforces the idea that the seasoned analysts must be weary and closely scrutinize subject matter. Resource: Hulnick, A. 2002. The downside of open source intelligence . International Journal of Intelligence and Counterintelligence. 15:565-579. Retrieved from https://edge.apus.edu/access/content/group/security-and-global- studies- common/Intelligence%20Studies/INTL%20422/Content/Week% 205/The%20Downside%20of%20Open%20Source%20Intelligen ce_Hulnick.pdf