® SNAKES IN THE GRASS: Open Source Intelligence Doctrine Robert D. Steele, OSS CEO <[email protected]> ® Information Superiority OSINT Support to Acquisition Relevant Information Information Operations OSINT Support to Operations Security Information Peacekeeping ® WAR LONG TIME INFORMATION WARFARE OPERATIONS SECURITY & COUNTERINTELLIGENCE HERE INFORMATION PEACEKEEPING INTELLIGENCE THERE EDUCATION SHORT TIME PEACE ® CIVIL CENTER OF GRAVITY Information Warfare Private Sector! Information Peacekeeping INFORMATION COMMONS Electronic Security & Counterintelligence Big Secret Open Source Intelligence Education Not Secret ® All-Source Intelligence (Spies, Satellites, and Secrets) OSINT as Input Information Warfare INFORMATION OPERATIONS OSINT as Output Information Peacekeeping “Don’t send a bullet where a byte will do….” ® DEFINITION Information Peacekeeping is the active exploitation of information and information technology--in order to peacefully modify the balance of power between specific individuals and groups--so as to achieve national policy objectives. The three elements of Information Peacekeeping, in order of priority, are intelligence (providing useful actionable information); information technology (providing “tools for truth” which afford the recipient access to international information and the ability to communicate with others; and electronic security & counterintelligence (a strictly defensive and preventive aspect of being able to sustain Information Peacekeeping operations. Robert D. Steele, 1994 ® JOINT STAFF ISSUE AREAS • • • • • J-1 J-2 J-3 J-4 J-5 • J-6 No OOB for refugee/POW info. Assumes SI/TK will have it all. No OOB for IO/IW/IP No role in information “supply” Not held accountable for supportability of plans in terms of information availability Not accountable for coalition-civil interoperability or for ensuring that external information can be integrated/exploited ® NEW INTELLIGENCE GAP I N F O R M A T I O N Actionable Intelligence The New Intelligence Gap: the difference between what you can know and what you can use! TIME OSINT is as complex as the other disciplines… ® Existing doctrine assumes RI comes from IC or other units! Information Superiority Information Grid C2 Warfare Information Operations Information Warfare Surveillance Relevant Information ISR C4ISR Reconnaissance Intelligence Information System Computers Communications Command and Control Control Command C4I C4 C3 C2 ® SIGINT: What’s Missing? Dedicated collectors, processors, exploiters IMINT: Dedicated collectors, processors, exploiters HUMINT: Dedicated collectors, processors, exploiters MASINT: Dedicated collectors, processors, exploiters OSINT: ??? ALL-SOURCE ANALYST ® COMPETING OSINT MODELS Validated OSINT SI/TK SI/TK Selective Importation Just Enough, Just in Time System High/Firewall Default to Validated OSINT ® FOUR THREAT/IO TYPES SOLIC/LEA UNCONVENTIONAL LOW INTENSITY CONFLICT AND GANG WARFARE HIC/MRC STRATEGIC NUCLEAR AND CONVENTIONAL MILITARY WAR INFOWAR/ ECONOMIC ESPIONAGE IW/ECON INFORMATION WAR/ CRIME & ECONOMIC ESPIONAGE PROLIFERATION/ MIGRATION JIHAD/ GREENPEACE TERRORISM/ GLOBAL CRIME MINDWAR RELIGIOUS, POLITICAL AND ENVIRONMENTAL REFUGEES ® That’s it for doctrine….now on to the OSINT overview.
© Copyright 2026 Paperzz