Espionage Black Book Four: Open-Source Intelligence Explained
()
About this ebook
Read more from Henry Prunckun
Espionage Black Book Ten: Foundations of Intelligence Explained Rating: 0 out of 5 stars0 ratingsHow to Undertake Surveillance & Reconnaissance: From a Civilian and Military Perspective Rating: 0 out of 5 stars0 ratingsEspionage Black Book Five: Basic Intelligence Explained Rating: 0 out of 5 stars0 ratings
Related to Espionage Black Book Four
Related ebooks
Intelligence Cycle Management: Optimizing Data Flow in Military Operations Rating: 0 out of 5 stars0 ratingsTactical Objective: Strategic Maneuvers, Decoding the Art of Military Precision Rating: 0 out of 5 stars0 ratingsReducing Uncertainty: Intelligence Analysis and National Security Rating: 0 out of 5 stars0 ratingsGovernance and Security as a Unitary Concept Rating: 0 out of 5 stars0 ratingsPrometheus Astray Rating: 5 out of 5 stars5/5Information Operations: Facts Fakes Conspiracists Rating: 0 out of 5 stars0 ratingsThe Grey Line: Modern Corporate Espionage and Counter Intelligence Rating: 0 out of 5 stars0 ratingsKept in the Dark: The Denial to Bomber Command of Vital Enigma and Other Intelligence Information During World War II Rating: 0 out of 5 stars0 ratingsSpies for Hire: The Secret World of Intelligence Outsourcing Rating: 3 out of 5 stars3/5The Watergate Coup: 50 Years Later - What We Now Know Rating: 0 out of 5 stars0 ratingsGovernance from the Bottom Up: One Hundred Horrible Examples from the Top Down Rating: 0 out of 5 stars0 ratingsMilitary Communications: Strategies for Secure and Efficient Battlefield Information Systems Rating: 0 out of 5 stars0 ratingsAgents, informants and traitors: dark history, #5 Rating: 0 out of 5 stars0 ratingsEpistemology of Intelligence Agencies Rating: 0 out of 5 stars0 ratingsDeep State: Inside the Government Secrecy Industry Rating: 4 out of 5 stars4/5Defense 101: Understanding the Military of Today and Tomorrow Rating: 5 out of 5 stars5/5Last Hurrah for an Evil Empire Rating: 0 out of 5 stars0 ratingsMilitary Education and Training: Forging Elite Forces, Tactics, Strategy, and Discipline in 21st Century Warfare Rating: 0 out of 5 stars0 ratingsBattle: Strategic Warfare Tactics from Ancient to Modern Times Rating: 0 out of 5 stars0 ratingsThe Americans and Philosophy: Reds in the Bed Rating: 0 out of 5 stars0 ratingsInformation Technology and Military Power Rating: 5 out of 5 stars5/5War Resistance & Intelligence: Essays in Honour of M.R.D. Foot Rating: 3 out of 5 stars3/5WW2 Codebreaking Events and Organisations: A Wartime Glossary Rating: 0 out of 5 stars0 ratingsAmong Enemies: Counter-Espionage for the Business Traveler Rating: 0 out of 5 stars0 ratingsThe Hall of Mirrors: War and Warfare in the Twentieth Century Rating: 4 out of 5 stars4/5The CIA World Factbook 2024-2025 Rating: 0 out of 5 stars0 ratingsPsychology of Intelligence Analysis Rating: 5 out of 5 stars5/5Espionage Agency Mossad and Eichmann Drama Rating: 0 out of 5 stars0 ratingsThe Secrets of Spies: Inside the Hidden World of International Agents Rating: 0 out of 5 stars0 ratings
Espionage For You
Spy Dust: Two Masters of Disguise Reveal the Tools and Operations that Helped Win the Cold War Rating: 4 out of 5 stars4/5That's What They Want You to Think: Conspiracies Real, Possible, and Paranoid Rating: 4 out of 5 stars4/5Red Sea Spies: The True Story of Mossad's Fake Diving Resort Rating: 4 out of 5 stars4/5Benghazi: Know Thy Enemy Rating: 5 out of 5 stars5/5Code Name: Lise: The True Story of the Woman Who Became WWII's Most Highly Decorated Spy Rating: 4 out of 5 stars4/5Lying in Wait: Ann Rule's Crime Files: Vol.17 Rating: 4 out of 5 stars4/5The Mueller Report Rating: 4 out of 5 stars4/5Evading and Escaping Capture: Escape, Evasion, and Survival Rating: 0 out of 5 stars0 ratingsNancy Wake: The gripping true story of the woman who became the Gestapo's most wanted spy Rating: 0 out of 5 stars0 ratingsThe Big Book of Spy Trivia: Spy Stories, Secret Agent Facts, and Espionage Skills from History's Greatest Covert Missions Rating: 0 out of 5 stars0 ratingsR.A.W. Hitman: The Real Story of Agent Lima Rating: 5 out of 5 stars5/5The Princess Spy: The True Story of World War II Spy Aline Griffith, Countess of Romanones Rating: 4 out of 5 stars4/5FBI Diary: Profiles of Evil Rating: 5 out of 5 stars5/5The Director: My Years Assisting J. Edgar Hoover Rating: 2 out of 5 stars2/5The Mueller Report: The Final Report of the Special Counsel into Donald Trump, Russia, and Collusion Rating: 4 out of 5 stars4/5Hidden History: An Exposé of Modern Crimes, Conspiracies, and Cover-Ups in American Politics Rating: 4 out of 5 stars4/5How to Catch a Russian Spy: The True Story of an American Civilian Turned Double Agent Rating: 3 out of 5 stars3/5Three Minutes to Doomsday: An Agent, a Traitor, and the Worst Espionage Breach in U.S. History Rating: 4 out of 5 stars4/5The Amazing SAS: The Inside Story of Australia's Special Forces Rating: 3 out of 5 stars3/5Diagrams of Targeted Justice Rating: 0 out of 5 stars0 ratingsA Spy in Plain Sight: The Inside Story of the FBI and Robert Hanssen—America's Most Damaging Russian Spy Rating: 4 out of 5 stars4/5Nine Lives: My Time As MI6's Top Spy Inside al-Qaeda Rating: 4 out of 5 stars4/5Witness Rating: 4 out of 5 stars4/5Mafia Spies: The Inside Story of the CIA, Gangsters, JFK, and Castro Rating: 4 out of 5 stars4/5The Entity: The Vatican Intelligence Service Rating: 0 out of 5 stars0 ratingsWar in the Shadows: Resistance, Deception and Betrayal in Occupied France Rating: 5 out of 5 stars5/5
Reviews for Espionage Black Book Four
0 ratings0 reviews
Book preview
Espionage Black Book Four - Henry Prunckun
ESPIONAGE BLACK BOOK FOUR:
Open-Source Intelligence Explained
Henry Prunckun
In this series of technical monographs:
Espionage Black Book One: Intelligence Databases Explained
Espionage Black Book Two: Codes and Ciphers Explained
Espionage Black Book Three: Surveillance Explained
Espionage Black Book Four: Open-Source Intelligence Explained
Espionage Black Book Five: Basic Intelligence Explained
Espionage Black Book Six: Spy Tradecraft for Citizens Explained
Espionage Black Book Seven: Spy Radio Explained
Espionage Black Book Eight: Industrial Espionage Explained
Espionage Black Book Nine: Secret Police Explained
Espionage Black Book Ten: Foundations of Intelligence Explained
Espionage Black Book Four:
Open-Source Intelligence Explained
Copyright © 2025 by Henry Prunckun
This book is copyright.
Except in the case of study, research, or review,
no portion of this book may be reproduced by any means
without the prior written permission of the author.
EPUB Version ISBN 978-0-9580178-7-9
Bibliologica Press
P.O. Box 656
Unley, South Australia, 5061
Australia
CONTENTS
Open-Source Intelligence
Taxonomy of Intelligence Sources
Intelligence Community
Informing Investigations
Collection
Validating Sources
Analysis
Reports
Ethical Considerations
About the Author
— CHAPTER ONE —
OPEN-SOURCE INTELLIGENCE
_______________________________________
I
f intelligence is information that has been evaluated, then open-source intelligence (OSINT) is information from open sources that have been evaluated. The evaluation process involves a cyclical procedure that starts with defining the research question or making a statement to guide the inquiry. Arguably, this is the most critical aspect of secret research because without compass bearing,
an investigation can drift off course. Without proper orientation, decision-makers will not receive the advice they need.
The next step is to identify the information that can answer the question. Because intelligence research is conducted in secret, we might think that only secret information is used. Yet, there is no truth to this thought. The world is awash with data. It is all around us, and any piece of data in the public domain is free to gather.
What makes intelligence research different to other forms of research, is that some aspect of the process is secret. This could be the source, the way the data were collected, the analysis method, the weighting given to the conclusions, or the final report.
As an example, take the U.S. National Intelligence Estimates (NIE). ¹ These reports are the product of the U.S. intelligence community’s collective long-term thinking on a particular issue. Although classified, these reports are, from time to time, released to the public. But before they are, the aspects of them that make them secret are removed.
Once collected, the evaluation process begins. Each data item needs to be assessed as to its accuracy and reliability. This is done the same way that a scholar evaluates information used in an academic study. ² As a guide, intelligence analysts use the so-called Admiralty Code or NATO System. These systems are based on the Admiralty Grading System developed during World War II for tactical military purposes. At the time, the intention was to assign some level of certainty to information used in combat intelligence reports. It was an effective system and continued. We will be revisited in Chapter Six when we discuss validating information sources.
The analytic stage of the process is the part where the raw data is assessed, transforming it into intelligence. In Chapter Seven, we look at how this is done.
Once analyzed, the findings are compiled into report form and circulated to those with need-to-know or a right-to-know. ³ In intelligence terminology, this is called dissemination to intelligence consumers.
These steps are called the intelligence cycle. Although practitioners and scholars talk about this cycle in slightly different terms, the underlining steps that move an analyst’s thinking from question to answer are the same. Figure 1 shows one such view.
Diagram Description automatically generatedFigure 1—A typical view of the intelligence cycle.
HISTORY OF OPEN-SOURCE INTELLIGENCE
Arguably, open-source information was not the fountain of intelligence of early militaries, and hence political planning. Sun Tzu wrote, Knowledge of the enemy’s dispositions can only be obtained from other men.
⁴ The Bible cites gathering information by deploying spies.⁵ This is understandable because the sources of information were limited to what a person could collect by the five senses.
The coming of age of open-source information can be attributed to the Second World War when William Wild Bill
Donovan posited that intelligence is neither mysterious nor sinister.⁶ Agents of the Office of Strategic Services could obtain more helpful information in a few minutes spent with a freight train brakeman than Mata-Hari could in an entire evening.⁷
A case often cited as the quintessential instance of the start of open-source intelligence involved what was then the U.S. Foreign Broadcast Information Service.⁸ The FBIS was created in 1941 to collect information that supported combat operations.⁹
The often-cited example centers on Allied forces’ need to know how effective