Professional Documents
Culture Documents
CHENG, Yu Chin
PhD candidate, Institute of Political Science, Charles University in Prague
Adjunct Lecturer, school of International Relations and Diplomacy,
Anglo-American University (Prague)
Email: cheng@fsv.cuni.cz
The Scholar, Hinsley, defines that military intelligence is a military service that uses
intelligence gathering disciplines which informs the commanders' decision making
process by providing analysis of available data from a wide range of sources including
forecast environmental changes. In tradition and practice, military intelligence is seldom
interacted with informers, who stand outside army. Notwithstanding, the gathering
approaches of military intelligence are in the time to shape again in the era of Internet
application.
Since Robert Metcalfe invented Internet, Metcalfe’s Law has been domination in the
field of communication, and this law has also impacted on intelligence community,
particularly military intelligence. This paper is based on the approach of single case study,
and employs organizational decision-making theory to analyze the study; furthermore, the
method of open source intelligence is applied for data processing.
The goals of the paper are twofold—argument and statement. The argument is to
demonstrate the availability of military intelligence application in the model of civilian-
military cooperation. Regardless of the classified intelligence, civilian-military
cooperation can be in the way of the cooperation of open-source intelligence. Secondly,
the possibility of civilian-military cooperation could be undertaken via Internet tools, and
the safety of Internet is so important that the model of e-interaction between military and
civilian can be effective.
1. Introduction
The paper has two key points—e-interaction and open-source intelligence. E-
interaction means PC users interact over Internet, and the methods of e-interaction are
The text of this part is very similar with one of my papers— The application of OSINT in IR
studies that had been published at NCCU in Taipei. Regardless of no innovative ideas, many
scholars have discussed the principles, approaches and even theories of OSINT, and they have
already defined them undoubtedly; therefore, this paper applies the partial text of The application
of OSINT in IR studies in this research.
1
mentioned, such as Intellipedia, Blog, WWW, and Rollyo. In accordance with these
methods, PC users become great public military intelligence contributors to help
commanders make better decisions. Whatsoever PC users contribute, the source of
military intelligence comes from public and open data better, and open source
intelligence is also encouraged in this research.
Most OSINT experts define open source intelligence as unclassified information that
has been deliberately discovered, discriminated, distilled and disseminated to a select
audience in order to address specific questions. With knowledge of relevant and
reliable sources of open source information, the PC users can devote collection
energy and analytical expertise to develop source-collection strategy and to fulfill the
goals of military intelligence.
Secondly, it is named Open Source Information [OSIF]. OSIF has an editorial process
that filters and validates data. Those can be newspapers, general daily report, books and
periodicals. Third one is OSINT, and it is unclassified information that has been
deliberately discovered, discriminated, distilled and disseminated to a select audience in
order to address specific question. After those abovementined procedures, the last one
action is designed to examine the accuracy and the relevance of OSINT regarding the
ongoing IR researches.
Validated OSINT (OSINT-V) is last but not least one in these four categories of open
information and intelligence. OSINT-V is information to which a very high degree of
certainty can be attributed and it can also come from an assured open source to which no
question can be raised concerning its validity. As a matter of fact, applying OSINT-V can
not only speed up the research, but also can compare and contrast among OSINTs. But it
is very disputable that the PC users have no ways to exploit OSINT-V, because the
military intelligence services never share its intelligence products with PC users.
Summing up, OSINT is high capable of processing huge amount of open source, and
mapping the process of data collecting, analyzing and synthesis. In expectation, OSINT
2
can satisfy what the commander needs; and in the other words, PC users provide OSINT
to help the military intelligence service modify itself in the more complex environment of
military intelligence gathering.
The procedure is clear and the function needs care. Figure indicates that the procedure
of OSINT comes out with input (source), manufacture (data processing), and output
(OSINT), and supervision (OSINT-V). Open source involves OSD and OSIF basically,
and their functions are quite different. OSD harmonizes all primary source, such like raw
print, broadcast, oral debriefing, photography, tape recording, commercial satellite image
or personal letter. Having said that, OSD has visual-audio, image and context. (Table 1
Type and characteristics of OSD)
1 Chris Pallaris, Open Source Intelligence: A Strategic Enabler of National Security, retrieved
from http://www.isn.ethz.ch/pubs/ph/details.cfm?id=50169
3
Table 1 Type and characteristics of OSD
Raw Oral Photo- Tape Commercial Personal
Broadcast
print debriefing graphy recording satellite image letter
Visual √
Raw Oral Photo- Tape Commercial Personal
Broadcast
print debriefing graphy recording satellite image letter
Audio √ √ √
Visual-Audio √
Image √ √
Context √ √
Raw print
Raw print may indicate unpublished works, such like draft articles, thesis,
dissertations, or like non-academic works. This data reveal the purpose, inspiration and
aspiration of research; however, it needs verification and examination. Because this data
is primary but immature, and therefore it is supposed to be cross-reference, instead of
citation. Of course, this data could be cited after corroboration.
Oral debriefing
This data could be useful, valuable but neither worthy nor evident. As usual, oral
debriefing is interview, and this type relates highly with interviewee and interviewer, and
Q&A circle. Qualified interviewee and interviewer are important and not ambiguous, but
nevertheless unqualified interviewee or interviewer cannot match unqualified interviewer
or interviewee anymore. (Table 2 Interaction between interviewer and interviewee during
oral debriefing)
After some careful consideration, oral debriefing needs one evaluation checklist to
start off. This checklist has the high five elements such as who, what, where, when, and
why. (List 1 Oral debriefing checklist)
4
List 1 Oral debriefing checklist
Oral debriefing checklist
Oral debriefing offers information but it needs organization and verification. During
interview, there are usually five most important question and answers that the
researchers are keen to discover and know.
Photography
Photography is partial data and can provide some characteristics of the target. Under
the conditions of empirical public military intelligence contributors, the photography is
the evidence to testify experience. For example, the public military intelligence
contributors require some evidence to proof facts, such like troop activities or exercises,
the development of new innovative weapons, and the location of military facilities. By
using photography, the public military intelligence contributors can strength the
accountability of the facts.
Nonetheless, most photography of military activities are high sensitive, and cannot be
allowable; even the source of photography originates publicly, but some nations prohibit
the photography of military activities. In respect of nations’ concern for safety, the public
military intelligence contributors must cross-refer themselves to laws.
Tape recording
Tape recording is an ambiguous data, but is an obvious manifestation; particulary,
when military intelligence services got them from the public. This type of data can help
the military intelligence officers apprehend the whole situation, but it sometimes brings
them imposture. Having said that, In addition, the military intelligence services need to
verify tape recording seriously when they report to the commanders before. This is real
argument that tape recording of military activities might be either real or a trick;
therefore, the serious and precise procedure of processing tape recording is very
necessary.
5
and exercises. However, most of important, the enemy’s military capacity and action are
effortless to be watched via commercial satellite image.
Personal letter
Personal letter is this kind of data which can provide the writer’s intent, purpose and
people net. Having said that, personal letter let the public military intelligence
contributors uncover one person’s background, and reveal unknown secret. However, it is
high exceptionable to connect secret and truth, particularly the persons who had appeared
in the past; obviously, the military intelligence contributor cannot find a word within
ancestor’s mouth. The researchers need attention to apply this data and in this regard to
examine it very carefully.
OSINT includes editorial information, and it has already been mentioned in the
abovementioned paragraph. OSINF is the feature that represents the editorial information
in OSINT. OSINF is referred as newspaper, general daily report, books and periodicals,
and so on; having said that, all information that is edited can be OSINF. It is obvious that
OSINF is either paper or on-line format, and is hard to explain whether OSINF is easy to
access or not difficult to discover in local or globe.
Newspaper
Newspaper always provides immediate information and correct but sometimes
incorrect to audiences. As a matter of fact, no news will be reported and sometimes the
reported news is accompanied with built-purpose. Therefore it is very fastidious to apply
newspaper for public military intelligence contributors. In practice, newspaper indicates
the date, the publisher, the reporter’s name, the topic and context of event, and sometimes
offers comment. Newspaper is always around public military intelligence contributors,
and is thought easily to access but no way to deal with actually.
Nowadays many media company owners invest a lot in the construction of news
databases that could be free-access or not. Metaphorically speaking, key words are like
arrows, and one good archer is able to maximize the shooting average. To pick up the
good collection key words or terms, it is one easy job for the well-training experts.
However, software technology is advanced and this cutting-edge innovation can help
public military intelligence contributors to tackle about key words setting. Google
Suggest and Google Sets provide the researchers the example and suggested key words to
narrow down the scope of newspaper search. Those functions can help public military
intelligence contributors who are not very familiar with the Boolean operation, and offer
some researchers who have not idea about the right key words.
6
General daily report
General daily report could be concise, comprehensive and on time. One report is
designed to aim on the certain readers by the particular writers. General daily report
refers to the situation in the whole day, but lacks of long-term strategic information and
analysis. This kind of information can favor the researchers who charge of the short-term
research, but can need more help in analysis activities while the long-term researches
carry on.
One good thing is that general daily report usually exploits primary source, and the
researchers can save time in raw data management. Nonetheless, the researchers should
pay more attention on applying general daily report, because this information can save
the researchers’ energy, but they should pick up some suitable report to match their
purpose-built research. The general daily report can be formulated:
General daily report= comprehensive data+ certain date/timeframe+5 w report (who, what,
where, when, why)+ report whom (1)
Regardless of books, the periodicals seem more serious and professional. It is not
thought correctly that book is less professional; however, in truth, the periodicals disscuss
the certain subject or issue very often. The reseachers need to know what periodicals are
highly related with their studies, and they seize the current development or reshape their
researches in this way.
2 Hendl, J. (2005). Kvalitativní výzkum: Základní metody a aplikace. Praha: Portál, s.320. (The
qualitative research: the basic methods and its application)
7
Issue
Topic
Volume number
Date
Title of papers
Author
Essay review
Book review
Commentary
Publisher
Figure 2 the cover of the periodical— intelligence and national security
Source: http://www.informaworld.com/smpp/title~content=g792283661~db=all
Apparently, the periodicals proclaim basic information on the cover, such as issue
number, topic of the periodical, published date, name of author, book review, name of
publisher, volume number, title of papers, essay review, and commentary. These
information from the periodical just matches the method of information collection
strategy—who, what, when, where, and why.
Table 3 the relation between the basic information of periodical and collection strategy
WHO WHAT WHEN WHERE WHY
Issue √
Topic √
Date √
Author √
Book Review √ √ √ √ √
Publisher √ √ √ √
Volume number √
Essay review √ √ √
Commentary √ √ √ √ √
In theory, public military intelligence contributors collect OSD and OSINF, and
process them systematically, and will obtain OSINT. Otherwise, however, it is arguable
for public military intelligence contributors to produce OSINT; because neither the
procedure of intelligence providing nor data collection or distinguishing is familiar with
every public military intelligence contributor. On the contrary, the public military
intelligence contributor, who employs the procedure of intelligence producing, may
confuse the military intelligence services; therefore not every public military intelligence
contributor should undertake the last phase of intelligence cycle.
8
2. The architecture of e-interaction
The architecture of e-interaction is based on three tools and one concept. The tools are
Intellipedia, Blog and WWW, and particularly Blog and WWW are suggested to operate
with the search engine—Rollyo, which is a self-organised search engine. In addition, the
concept is e-interaction, and this activity need basing on Internet among PC users. Since
Robert Metcalfe invented Internet, Metcalfe’s Law has been domination in the field of
communication, and this law has also impacted on intelligence community, particularly
military intelligence. In Metcalfe’s term, communication is interaction, and it is no
limitation of immigration.
2.1. Intellipedia
In general, intelligence should come from all sources, and it is named ASINT (All
Source Intelligence); in detail, ASINT consists of OSINT and SECINT (Secret Source
intelligence). Having abovementioned OSINT, SECINT is quiet different among them,
and its authorship and ownership often belongs to national authorities. SECINT is
formidable for public military intelligence contributors, and instead OSINT could be
possible and available for them. Based on this principle and condition, Intellipedia
bridges military staffs and civilian in the activities of military intelligence.
D. Calvin Andrus wrote, “We must transform the Intelligence Community into a
community that dynamically reinvents itself by continuously learning and adapting as the
national security environment changes.”3 Andrus and his superiors broke the limitation
and boundary of the intelligence community and officers, and succeeded to invent
Intellipedia via the concept of Wikipedia. “Wiki” is the vocabulary of Hawaiian, and it
means fast; according to the concept of fast, the U.S. intelligence community gather
intelligence not only fast and tremendously.
9
cooperation; definitely, the system welcomes U.S. natives, foreigners, civilians and
military to be a military intelligence contributor. Surely, Intellipedia grants different
access for various groups; in case, potential threat damages national security.
The basic idea of intelligence management in Intellipeida is that this graphic depicts
these six characteristics. From simple, self-organized personal relationships emerges
complex adaptive behavior. Information from the external environment enters the system
and impinges on the on these relationships as either positive or negative feedback. The
personal relationships are changed and the complex behavior adapts.4
Intellipedia is the driver that changes the nature of intelligence. Andrus applies
Melcalfe’s Law to proof the change, and it is persuasive for intelligence officers to
establish the mode of civilian-military cooperation in the activities of military intelligence
over Internet.
4 Ibid, 9
10
Blog and WWW are very familiar with PC users, who are military lovers or fans; as
usual, they can exploit search engine to discover whatever they need, such like google or
yahoo. However, mass irrelative data wastes time and resource; therefore designing own
search engine become a new trend among Internet users. Here comes the formula, and it
demonstrates the author’s idea for military intelligence contributors:
The outlook of Rollyo is as the same as other search engines for PC users, but its
function is certainly various among them. In particular, Rollyo specialises in customised
search engines; via Rollyo, PC users can add or delete favorite web address or blog, and
seek target information. Having said that, Rollyo can search the content of blog or web
pages automatically, instead of looking up manually. Rollyo brings the vital importance
for public military intelligence contributors, because they should not spend more time to
find military data or information than before; furthermore, they strengthen the percentage
of target information under the frame of customised search engines.
Add or delete
blogs or web
papers
For instance, one PC user would update the news of google’s products among google
users in the world; eventually, they publish that news on their blogs or web pages.
11
Nevertheless, it cannot be possible to view every blog or web page; Instead of that, PC
users can apply Rollyo for the latest news of google products. All the same, public
military intelligence contributors can also exploit Rollyo to discover the latest or valuable
information.
Key in “google”
Having agreed that, fast, the latest and tremendous data could support the system of
military intelligence; on the contrary, unqualified or non-verified data can reserve the
original and health military intelligence. “To be or not to be, that is a question.” However,
aut viam inveniam aut faciam and dulce bellum inexpertis can trigger a meaningful
discussion with this matter.
In addition, the safety of Internet between military intelligence services and home PCs
is still in the centre of people’s concern; more and more ghost networks or PCs penetrate
the Internet system of military intelligence services or PC users lack of Internet security.
Like intelligence, PC viruses or programme destroyers could foster collapse of e-
interaction; furthermore, e-interaction could become e-leaking in the aftermath of PC or
12
Internet infection. Even though a few disadvantages cannot benefit in the aftermath, e-
interaction is becoming the new trend of military intelligence management.
For example, the first time chlorine was used in an improvised explosive device in
Iraq, someone created a wiki page asking what intelligence officers and others in the field
should do to collect evidence of the usage. “Twenty-three people at 18 or 19 locations
around the world chimed in on this thing, and we got a perfectly serviceable set of
instructions in two days,” says Tom Fingar, who headed the National Intelligence Council
from 2005 to 2008.5 On the contrary, when Tom Fingar tried in 2006 to produce an NIE
on Nigeria using Intellipedia, he failed because it generated a stream of information
rather than a formal thesis and was taken over by the traditional system. 6 Whether
consequence or effort is brought for military intelligence community, the e-interaction has
been a role in the activities of military intelligence management.
In peace time, misuse of military intelligence may be corrected without injuries, but by
contrast, that incident costs military intelligence officer’s life in war time. At the same
time, it is more complicated to develop or execute e-interaction in the battlefield; in
particular, how one military intelligence receiver and contributor functions e-interaction
while escalation into war. That could be a critical problem to deal with in e-interaction.
4. Conclusion
Open source produces useful and valuable intelligence, and Internet enriches the
effectiveness of data collection. Melcalfe’s Law indicates Critical Mass, and it also paves
the way to broaden intelligence activities. E-interaction emphasises the mode of civilian-
military cooperation in military intelligence, but it also triggers military intelligence’s
worry, but it appeals to public military intelligence contributors. High speed and broad
variety of information are the special characteristics, but personal identification and
Internet safety worry military intelligence officers or expose informers.
5 Calabresi, M. (2009). Wikipedia for spies: The CIA discovers web 2.0. Retrieved April 2,
2009, from http://www.time.com/time/nation/article/0,8599,1890084,00.html
6 Ibid.
13
Whether advantage or disadvantage is coming up to military intelligence, but it is
believed that Melcalfe’s Law has changed the nature of military intelligence, and e-
interaction provides a new approach for data collectors. Having believed that, the
approach of military intelligence gathering has changed definitely, but the safety and
personal identification will be a setback or critical issue in military intelligence
management.
14
References
Amason, A. C., & Schweiger, D. M. (1997). The effects of conflict on strategic decision
making effectiveness and organizational performance. Using Conflict in
Organizations,
Anderson, P. A. (1983). Decision making by objection and the cuban missile crisis.
Administrative Science Quarterly, 28(2), 201-222.
Ben-Yashar, R., & Nitzan, S. (1998). Quality and structure of organizational decision-
making. Journal of Economic Behavior and Organization, 36(4), 521-534.
Huber, G. P. (1981). The nature of organizational decision making and the design of
decision support systems. MIS Quarterly, 5(2), 1-10.
Jordan, A. A., Taylor, William J. , Jr., & Mazarr, M. J. (1999). American national security
(5th ed.). Maryland: the John Hopkins University Press.
15
Koltuksuz, A., & Tekir, S. (2006). Intelligence analysis modeling. Proceedings of the
2006 International Conference on Hybrid Information Technology-Volume 01, , 146-
151.
Lin, Z., & Carley, K. (1997). Organizational decision making and error in a dynamic task
environment. Journal of Mathematical Sociology, 22(2), 125-150.
Lowenthal, M. (1998). Open source intelligence: New myths, new realities. Special
Report from Open Source Solutions,
Mayes, B. T., & Allen, R. W. (1977). Toward a definition of organizational politics. The
Academy of Management Review, 2(4), 672-678.
Memon, N., Hicks, D., & Esbensen, K. (2008). Special edition on open source
intelligence and web mining. International Journal of Networking and Virtual
Organisations (IJNVO),
Rues, R., & Kunz, P. J. (2003). Corporate open source intelligence on the internet.
Proceedings of 2nd European Conference on Information Warfare and Security:
University of Reading, 30th June-1st July 2003.,
Saveri, A., & Rheingold, H. (2005). Rapid decision making for complex issues: How
technologies of cooperation can help.
Stalder, F., & Hirsh, J. (2002). Open source intelligence. First Monday, 7(6)
Umphress, D. A. (2005). Diving the digital dumpster: The impact of the internet on
collecting open-source intelligence. Air & Space Power Journal, 19(4), 82-91.
16