US Intelligence Ignores Open Source Data

The US' ability to monitor and analyse data and information requires that the US Intelligence Community (IC) gather, analyse information and strategic intelligence to anticipate geo- strategic shifts, as well as shorter-term intelligence so that the United States can respond to the actions and provocations of rivals both from within the US and externally

However, the US intelligence community has continued to ignore the usefulness of the enormous open sources of intelligence, simply because the information is publicly available and isn’t secret.

The intelligence community refers to monitor others using secret expensive classified satellites and intelligence-collection programs rather than to gather unclassified free information on the Internet. But intelligence should engage with open source as well as classified information and data.

Russia has conducted a strategic misinformation campaign to influence the results of elections in multiple countries, including the UK, Ukraine, France and the US and they did it on social media in view of everyone, except the intelligence officers who only look at classified sources. Because they did not engage with social media US officials said they were not warned about the fake news and misinformation. This also applied to China when senior advisors to the US government say  they do not understand enough about Beijing’s strategic goals and intentions.

Congress should have an open-source centre  that translates important Chinese documents for consumption by English-language readers. The US did have a method of analysis, but the US government took down its own open source center website.

This process of ignoring open sources also happened in  January when the Capitol in Washington DC was invaded by people who had organised, planned, and announced their plans to riot on-line.

The US government has an urgent need for intelligence based on open source information to understand and reveal foreign governments’ campaigns to harm the US and to identify the sources of online radicalisation campaigns and to better understand other countries’ strategy and tactics.

“And so the US Intelligence Community stands at the dawn of a new era of technological innovation and transformation unprecedented in its history.

“Driven by artificial intelligence (AI) and associated emerging technologies, including cloud computing, advanced sensors, and big data analytics, the approaching “AI era” will transform both the nature of the global threats the IC is responsible for assessing and the IC’s ability to accurately detect and assess them,” says the opening of a January 2021 report by the Centre for Strategic and International Studies.

CSIS:     RAND:      Washington Post:      Defense One:        

You Might Also Read: 

EU Court Rules Out Mass Online Surveillance:

 

« New Effective Network Firewall Security
More Women Cyber Security Professionals Needed »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Cybonet

Cybonet

Cybonet provides easy to deploy, flexible and scalable security solutions that empower organizations of all sizes to actively safeguard their networks in the face of today’s evolving threats.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Arab Information & Communication Technologies Organization (AICTO)

Arab Information & Communication Technologies Organization (AICTO)

The Arab ICT Organization (AICTO) is an Arab governmental organization working under the aegis of the league of Arab States.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

Tuskira

Tuskira

Tuskira is a Preemptive Cyber Defense & Response Platform powered by Agentic AI, designed to go beyond traditional vulnerability management.

ColCERT

ColCERT

ColCERT is the national cybersecurity emergency response team of Colombia.