Open Source Intelligence Doctrine

Slides:



Advertisements
Similar presentations
Intelligence in the 21st Century: Re-focusing Intelligence to Shape the Strategic Environment Joint Military Intelligence Training Center Douglas H. Dearth.
Advertisements

® The New Craft of Intelligence What Should the T Be Doing to the I in IT? Robert David Steele Federal Convention on Emerging Technologies A Forum on Homeland.
® OPEN SOURCE INTELLIGENCE & RELEVANT INFORMATION: EXECUTIVE BRIEFING (CINC BRIEF) Robert D. Steele, OSS CEO.
® SNAKES IN THE GRASS: Open Source Intelligence Doctrine Robert D. Steele, OSS CEO.
OSS’ 04 OSINT and Global Issues 13 April 2004 Joe Mazzafro APL STILO
TIME IMPACT SHORT TIME IMPACT LONG MULTI-CULTURAL & TRANS-NATIONAL EQUITIES SINGLE-CULTURE SINGLE-ORGANIZATION EQUITIES LEADERS DECIDE PEOPLE DECIDE TOP-DOWN.
Cyber-Command 101 Planned Words in Notes Format. What is the IO Threat?
® Modern Strategic Governance Director General Global Strategy Deputy Director Global Strategy Deputy Director Response Management Associate Directors.
® Open Source Intelligence & Strategic Generalizations Robert David Steele OSS CEO Prepared 25 August 2003.
® Afterthoughts & Additions Robert David Steele Intelligence Coach Prepared 30 August 2003.
® Strategic Threat Assessment: A Regional Approach to Intelligence, Force Structure, & Combined Operations Robert David Steele OSS.NET 3 March 2003 Miami,
® Welcome to the Real World: Force Structure Trade-Offs Robert David Steele Truth Helps, But Only When You Listen….
Planned Words in Notes Format
® European Intelligence Network Open borders demand regional intelligence Decades of lax control over immigration & citizenship demand aggressive policing.
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
Chapter 24 ai Alex Newell. American foreign policy Goals of foreign policy Tools of foreign policy The executive branch Role of private groups.
Steele-Yale-6 Reality Intelligence Tired Wired Ethics Solutions Eight Tribes OSE M4IS2 New Mind Robert David Steele CEO (pro bono) Earth Intelligence Network.
Building open regional innovation strategies: New opportunities provided by Smart Specialisation Strategies Claire Nauwelaers Independent STI policy expert.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Applications in Acquisition Changing Defense Environment.
Brian Connett, LCDR, USN US NAVAL ACADEMY
FUTURE OF CROATIAN MILITARY EDUCATION To DEVERSIFY or to SPECIALIZE?
Theories of Ethnic Conflict and Conflict Resolution LECTURE 1 Ethnic Conflict and How to Explain It: An Overview of Relevant Theories.
Emergency Management & Homeland Security Interface Samuel Musa National Defense University.
Aerospace Power Defined. 2 Overview  Define Aerospace Power Competencies Functions Doctrine  Discuss the Principles of War & Tenets of Aerospace Power.
Appraisals – Fish farming projects -Management -Development Kirsten Bjøru Senior Adviser Norad.
ON INTELLIGENCE Overview 2.6
MCA-3 The Graduate Certificate of Africa Strategic Intelligence Studies Why CAS? This graduate certificate prepares students to critically identify, analyze.
Information Warfare Playgrounds to Battlegrounds.
Middle East and North Africa The Military Implications Sir Tim Garden.
ON INTELLIGENCE Overview 2.4
PEACE MISSIONS IN AFRICA: LESSONS LEARNED Prof Theo Neethling & Lt Col Abel Esterhuyse Faculty of Military Science (Military Academy), Stellenbosch University.
Africa Center for Strategic Studies Tuesday, 10 July 2007 Africa Center for Strategic Studies Dr. Louis A. Picard Senior Research Fellow and Director of.
1 “Energy Security dimension in EU CSDP: Guidelines for the Future” RADM Bruce Williams CBE Deputy Director General EU Military Staff.
Why War? Why an Army? John M. House Colonel (retired), US Army.
Foreign & Defense Policies. Discussion Questions:  Why do you think the Founders intentionally divided responsibility for foreign affairs between president.
Joint Vision Why a New Document n Sustain and build on momentum of Joint Vision process ã Continue evolution of the joint force n Lessons learned.
The National Security Bureaucracy. Key Agencies The State Department.
® Copyright © 2000 by OSS Inc. All Rights Reserved 1 Non-Traditional Threats Georgetown University 21 September 2000 Non-Traditional Threats Georgetown.
Air Force Strategy to Resources
1 Chapter 14 - Intelligence Operations. 2 Why did the Intelligence Fail to Precipitate Appropriate Action? Pearl Harbor The Japanese had already.
Mr. Tom Matthews OUSD(I) The overall classification of this brief is UNCLASSIFIED Discussion with the Intelligence Community Officer Course 10 April 2006.
Political Science American Government and Politics Chapter 15 Foreign and Defense Policy.
Security Environment During Coalition Operations.
Global Security Issues
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
The Changing Role of Military Officers and Defense Officials in Dealing with Future Defence and Security Challenges.
The impact of Technology on levels of crime 19 February 2003.
Information Warfare Playgrounds to Battlegrounds.
Aim To examine what developments are needed in curricula to prepare military officers and defense officials for their roles in dealing with future defense.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Sustainment Solutions Envelope (SSE) Sustainment Solutions Envelope (SSE) Presented at the Defense Standardization Program Conference, 16 March 2004.
THE SECURITY SECTOR REVIEW PROCESS. ISSUES Understanding: -Scope: What are the elements of a SS Review? -Need: Why review the Security Sector? -Process:
Homeland Security and Emergency Management Discussion U.S. Department of Homeland Security  National Preparedness Directorate, FEMA Higher Education Conference.
The United States Foreign Assistance Reforms: An Overview.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Rebalancing The Instruments of National Power COL John F. Agoglia Director US. Army Peacekeeping and Stability Operations Institute (PKSOI) 10 April 2008.
Office of the Deputy Chief of Staff
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Foreign & Military Policy
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
Executive Order United States Intelligence Activities
THE POLICE AS AN ACTOR WITHIN INTERNATIONAL SECURITY POLICY
Purchasing and Supply Chain Management
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Joint Vision 2020.
Brigadier General Md Amin Akbar Colonel Justus Majyambere
Presentation transcript:

Open Source Intelligence Doctrine ® SNAKES IN THE GRASS: Open Source Intelligence Doctrine Robert D. Steele, OSS CEO <bear@oss.net>

® Information Superiority Information Peacekeeping Relevant Information Information Operations OSINT Support to Acquisition OSINT Support to Operations Security

® WAR LONG TIME HERE THERE SHORT TIME PEACE INFORMATION WARFARE OPERATIONS SECURITY & COUNTERINTELLIGENCE HERE THERE INFORMATION PEACEKEEPING INTELLIGENCE EDUCATION SHORT TIME PEACE

Information Peacekeeping Open Source Intelligence ® CIVIL CENTER OF GRAVITY Private Sector! Information Warfare Information Peacekeeping INFORMATION COMMONS Open Source Intelligence Electronic Security & Counterintelligence Education Big Secret Not Secret

® All-Source Intelligence (Spies, Satellites, and Secrets) Information Warfare Information Peacekeeping INFORMATION OPERATIONS “Don’t send a bullet where a byte will do….” OSINT as Output OSINT as Input Within the allied military community, and to a lesser extent within selected European and Asian militaries, there has been much discussion of the emerging importance of information warfare and information operations. The original hyperbole about “information dominance” is now in disrepute. The military has not, however, come to grips with the fact that the bulk of any information operations campaign must be comprised of content and ideally of open source intelligence--intelligence coming in to guide the commander and staff; and intelligence going out to influence belligerents, bystanders, and coalition bubbas. Information peacekeeping and the role of virtual intelligence in avoiding and resolving conflict are discussed in two of the references, both available through the Internet. We have a long way to go before a byte will be as effective as a bullet. It will take at least a decade--perhaps a half century--before we get desperate enough to actually carry out strategic assessments on vanishing aquifers, the impact of starvation in Africa on Australia, and so on. Only when intelligence steps up to its role as a preventive forecast compelling enough to induce executive action in time of peace, might we be considered skilled at information operations.

® DEFINITION Information Peacekeeping is the active exploitation of information and information technology--in order to peacefully modify the balance of power between specific individuals and groups--so as to achieve national policy objectives. The three elements of Information Peacekeeping, in order of priority, are intelligence (providing useful actionable information); information technology (providing “tools for truth” which afford the recipient access to international information and the ability to communicate with others; and electronic security & counterintelligence (a strictly defensive and preventive aspect of being able to sustain Information Peacekeeping operations. Robert D. Steele, 1994

JOINT STAFF ISSUE AREAS ® JOINT STAFF ISSUE AREAS J-1 No OOB for refugee/POW info. J-2 Assumes SI/TK will have it all. J-3 No OOB for IO/IW/IP J-4 No role in information “supply” J-5 Not held accountable for supportability of plans in terms of information availability J-6 Not accountable for coalition-civil interoperability or for ensuring that external information can be integrated/exploited

Available Information ® NEW INTELLIGENCE GAP INFORMATION TIME Available Information Actionable Intelligence The New Intelligence Gap: the difference between what you can know and what you can use! OSINT is as complex as the other disciplines…

® Existing doctrine assumes RI comes from IC or other units!

What’s Missing? ® SIGINT: Dedicated collectors, processors, exploiters IMINT: Dedicated collectors, processors, exploiters HUMINT: Dedicated collectors, processors, exploiters MASINT: Dedicated collectors, processors, exploiters OSINT: ??? ALL-SOURCE ANALYST

COMPETING OSINT MODELS ® COMPETING OSINT MODELS SI/TK Validated OSINT SI/TK Selective Importation System High/Firewall Just Enough, Just in Time Default to Validated OSINT

® FOUR THREAT/IO TYPES HIC/MRC STRATEGIC NUCLEAR AND CONVENTIONAL MILITARY WAR SOLIC/LEA UNCONVENTIONAL LOW INTENSITY CONFLICT AND GANG WARFARE IW/ECON INFORMATION WAR/ CRIME & ECONOMIC ESPIONAGE MINDWAR RELIGIOUS, POLITICAL AND ENVIRONMENTAL REFUGEES PROLIFERATION/MIGRATION JIHAD/ GREENPEACE TERRORISM/ GLOBAL CRIME INFOWAR/ ECONOMIC ESPIONAGE Here is another way of looking at the four warrior classes and the four forms of war they inspire. There are also four operational overlays that highlight the inadequacy of our existing defense, foreign policy, and law enforcement departments, as well as the intelligence programs that support them. I suppose we are ready for strategic nuclear and conventional war, but frankly I don’t think we are. We have moved so many key pieces into the reserve, including combat support and combat service support units as well as civil affairs, intelligence, and other vital elements, that I do not believe we can really go to war in less than 180 days, and I am not at all confident that our stocks of ammunition, and especially precision munitions, will last longer than ten days. We are clearly unprepared in the other three areas of warfare, and this is largely because we do not have a modern understanding of the complexity of the threat, nor a political willingness to restructure our forces and realign modest amounts of funds, in order to create a coherent national security capability that is global, seamless, and effective across organizational, national, cultural, and security boundaries.

That’s it for doctrine….now on to the OSINT overview. ® That’s it for doctrine….now on to the OSINT overview.