US Intelligence Ignores Open Source Data

The US' ability to monitor and analyse data and information requires that the US Intelligence Community (IC) gather, analyse information and strategic intelligence to anticipate geo- strategic shifts, as well as shorter-term intelligence so that the United States can respond to the actions and provocations of rivals both from within the US and externally

However, the US intelligence community has continued to ignore the usefulness of the enormous open sources of intelligence, simply because the information is publicly available and isn’t secret.

The intelligence community refers to monitor others using secret expensive classified satellites and intelligence-collection programs rather than to gather unclassified free information on the Internet. But intelligence should engage with open source as well as classified information and data.

Russia has conducted a strategic misinformation campaign to influence the results of elections in multiple countries, including the UK, Ukraine, France and the US and they did it on social media in view of everyone, except the intelligence officers who only look at classified sources. Because they did not engage with social media US officials said they were not warned about the fake news and misinformation. This also applied to China when senior advisors to the US government say  they do not understand enough about Beijing’s strategic goals and intentions.

Congress should have an open-source centre  that translates important Chinese documents for consumption by English-language readers. The US did have a method of analysis, but the US government took down its own open source center website.

This process of ignoring open sources also happened in  January when the Capitol in Washington DC was invaded by people who had organised, planned, and announced their plans to riot on-line.

The US government has an urgent need for intelligence based on open source information to understand and reveal foreign governments’ campaigns to harm the US and to identify the sources of online radicalisation campaigns and to better understand other countries’ strategy and tactics.

“And so the US Intelligence Community stands at the dawn of a new era of technological innovation and transformation unprecedented in its history.

“Driven by artificial intelligence (AI) and associated emerging technologies, including cloud computing, advanced sensors, and big data analytics, the approaching “AI era” will transform both the nature of the global threats the IC is responsible for assessing and the IC’s ability to accurately detect and assess them,” says the opening of a January 2021 report by the Centre for Strategic and International Studies.

CSIS:     RAND:      Washington Post:      Defense One:        

You Might Also Read: 

EU Court Rules Out Mass Online Surveillance:

 

« New Effective Network Firewall Security
More Women Cyber Security Professionals Needed »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.