Congress should require the Director of National Intelligence to make open source intelligence more widely available, the U.S.-China Economic and Security Review Commission recommended in its latest annual report.
Last June, the former OpenSource.gov web portal was “decommissioned.” Its contents were transferred to classified or restricted networks that are mostly inaccessible to those outside the intelligence community.
ROBERT STEELE: This is a great guide if you only care about the 1% of 1% of 1% of 1% of 1% that is online. The author, from the much-discredited Southern Law Poverty Center that scams people for donations while censoring haters (anyone committed to the truth), has done a fine job on the pimple under the donkey’s tail. He should apply to the CIA’s Open Source Center, where he will find himself in good company. Serious people can start here: #OSINT.
As OSINT investigators, collectors, and analysts, we have to be familiar with the dark web and be able to navigate it with efficiency. We also have to be able to extract information from it in a targeted, efficient matter. Here are a few tools you can use to get you started, get you familiar, and get your comfortable in the difficult task of inspecting the dark web.
Rethinking OSINT as an Intelligence Discipline
Defining Open Source and OSINT
…News Media Content
…Long-Form Social Media Content
…Short-Form Social Media Content
OSINT Methodology: The OSINT Operations Cycle
Zion Market Research has published a new report titled “Open Source Intelligence Market by Deployment Type (Cloud and On-premises); by Source (Public Government Data, Professional and Academic Publications, Commercial Data, Grey Literature, Media, and Internet); by Security Type (Data Analytics, Text Analytics, Artificial Intelligence, Big Data, Human Intelligence, Content Intelligence, and Dark Web Analysis); for Application (Private Sector, Public Sector, Military and Defense, Homeland Security, and National Security) – Global Industry Analysis, Size, Share, Growth, Trends, and Forecast 2016 – 2026”.
As an example of transformative change that is now underway, Joshipura pointed to the telecom industry. “For the past 137 years, we saw proprietary solutions,” he said. “But in the past several years, disaggregation has arrived, where hardware is separated from software. If you are a hardware engineer you build things like software developers do, with APIs and reusable modules. In the telecom industry, all of this is helping to scale networking deployments in brand new, automated ways.”