OPEN SOURCE INTELLIGENCE: EXECUTIVE OVERVIEW Robert David Steele President, OSS Inc. <bear@oss.net> 1 PRESENTATION PLAN I n t r o Overview of Open Sources, Software, and Services I n t Src SW Svcs Over view C M A n a l y s i s C o a l i t i o n O p e r a t i o n s C e l l O v e r v i e w C o n c l u s i o n s 2 DEFINITIONS • DATA: raw report, image or broadcast • INFORMATION: collated data of generic interest and usually widely disseminated • INTELLIGENCE: concisely tailored answer reflecting a deliberate process of discovery, discrimination, distillation, and delivery of data precisely suited to need 3 TIMELINE NEXT SEVEN YEARS: A Very Hard Road LAST SEVEN YEARS: OPEN SOURCE SOLUTIONS Inc. (4000 trained) Society of Competitive Intelligence Professionals (6000 members) Community Open Source Program Office (USA) Eighteen governments doing one thing or another WWII AND COLD WAR: Special Librarians Association (14,000 members) External Research & Analysis Funds Lloyd’s and Jane’s BBC & FBIS Churchill adept at correspondence LONG AGO: “Legal travelers” 4 OSINT AND THE IC “The Intelligence Community has to get used to the fact that it no longer controls most of the information.” The Honorable Richard Kerr Deputy Director of Central Intelligence (USA) 5 OSINT DEFINED • From Open World – Open sources – Open software – Open services • From Closed World – – – – – Requirements analysis Collection Management Source Validation Source Fusion Compelling Presentation 6 WHAT OSINT IS NOT I “…nothing more than a collection of news clippings”. “…the Internet.” “…a substitute for spies and satellites.” 7 WHAT’S MISSING? SIGINT: Dedicated collectors, processors, exploiters IMINT: Dedicated collectors, processors, exploiters HUMINT: ALL-SOURCE ANALYST Dedicated collectors, processors, exploiters MASINT: Dedicated collectors, processors, exploiters OSINT: ??? 8 THE ALL-SOURCE SOLUTION Broadcast Monitoring Subject-Matter Experts Commercial Geospacial OSINT HUMINT SIGINT IMINT MASINT Classified Collection Targeting Support 9 All-Source Analysis Answers NEW INTELLIGENCE GAP I N F O R M A T I O N Available Information Actionable Intelligence GAP BETWEEN WHAT YOU CAN KNOW AND WHAT YOU CAN USE TIME 10 INFORMATION ARCHIPELAGO Business Information Information Brokers & Private Investigators Intelligence Mass & Niche Media Schools & Universities Defense Government 11 MORE COMPLEX THREAT PHYSICAL STEALTH, HIGH TECH PRECISION BRUTES TARGETING (MIC / HIC) ECONOMIC WAR HIGH TECH CYBER STEALTH, DATABASE TARGETING GUERRILLA WAR MONEY--RUTHLESSNESS POWER BASE KNOWLEDGE--IDEOLOGY SEERS (C3I WAR) CULTURAL WAR NATURAL LOW TECH STEALTH, BRUTES RANDOM (LIC) TARGETING TERRORISM LOW TECH SEERS IDEO - (JIHAD) STEALTH, MASS TARGETING 12 FAILING OVERALL A-/B+ OBVIOUS MILITARY WE DO WELL ENOUGH CRIME AND TERROR WE DO BADLY C-/D+ SIQ CIVILIAN CYBERSPACE WE HAVE DECADES TO GO IDEOLOGY AND ENVIRONMENT WE DON’T DO AT ALL D-/F+ 13 LEVELS OF ANALYSIS STRATEGIC Integrated Application Military Sustainability Geographic Location Civil Allies OPERATIONAL Selection of Time and Place Military Availability Geographic Resources TACTICAL Application of Finite Resources Military Reliability Geographic Terrain TECHNICAL Isolated Capabilities Civil Stability Civil Psychology Military Lethality Geographic Atmosphere Civil Infrastructure Over time and space Channels & Borders Of strategic value Quantities & Distribution Internally available for use Volatility of sectors Training & Maintenance Mobility implications Cohesion & Effectiveness Military Systems One by One Climate Manipulation Civil Power, Transport, Communications, 14 & Finance FAILING IN DETAIL F- STRATEGIC: What to Build D- OPERATIONAL: When to Fight C- TACTICAL: What to Use B- TECHNICAL: How to Use It Military Sustainability Geographic Location Civil Allies Military Availability Geographic Resources Civil Stability Military Reliability Geographic Terrain Civil Psychology Military Lethality Geographic Atmosphere Civil Infrastructure 15 MIXED REPORTS • Allen Dulles (DCI): 80% • Gordon Oehler (D/NPC): 80% • Ward Elcock (DG/CSIS): 80% • Joe Markowitz (D/COSPO): 40% 16 COSTS OF SECRECY • CLIENT ACCESS: too much, too late, too secret--doesn’t get due attention • TRANSACTION COSTS: 10-100X OSINT • OPPORTUNITY COSTS: classification of system deficiencies gives original contractors a lifetime system monopoly • FUNCTIONAL COSTS: noninteroperability, operational disconnects 17 PURPOSES OF SECRECY “Everybody who’s a real practitioner, and I’m sure you’re not all naïve in this regard, realizes that there are two uses to which security classification is put: the legitimate desire to protect secrets, and protection of bureaucratic turf. As a practitioner of the real world, it’s about 90 bureaucratic turf; 10 legitimate secrets as far as I’m concerned.” Rodney B. McDaniel Executive Secretary, National Security Council Senior Director, (White House) Crisis Management Center 18 VALUATION METRICS I • TIMING: Is it “good enough” NOW • CONTEXT: Is it “good enough” over-all, that is, does it provide a robust contextual understanding or is it a “tid-bit” in isolation? • CONTENT: Is it “good enough” to improve the decision at hand? Can I share it? 19 VALUATION METRICS II • RETURN ON EXPOSURE: Does this information, openly available, attract other information that is equally useful? (10X) • INCLUSIVENESS: Does this information, openly available, reach those who have a “need to know” that would not otherwise have been included in distribution? (20%) 20 OSINT AND REALITY I “If it is 85% accurate, on time, and I can share it, this is a lot more useful to me than a compendium of Top Secret Codeword material that is too much, too late, and needs a safe and three security officers to move it around the battlefield.” U.S. Navy Wing Commander Leader of First Flight Over Baghdad Speaking at TIG-92, Naval War College 21 OSINT AND REALITY II • Post-Cold War political-military issues tend to arise in lower Tier (per PDD-35) nations where U.S. classified capabilities are least applicable or largely unavailable. • Warning of these largely Third World crises has not required classified collection. • Approach and resolution has required increased reliance on international organizations and non-traditional coalition partners with whom information must be shared and who are not “cleared” for sensitive sources & methods. 22 THE BURUNDI EXERCISE • COMMISSION ON INTELLIGENCE (USA) • ONE MAN, ONE ROLODEX, ONE DAY – – – – – – Flag/CEO POL-MIL Briefs (Oxford Analytica) Journalists on the Ground (LEXIS-NEXIS) World-class academics (Inst. Sci. Info.) 1:100,000 combat charts (Soviets via Eastview) Tribal OOB and historical summary (Jane’s) 1:50,000 combat imagery (SPOT Image) 23 OPEN SOURCE MARKETPLACE SOURCES SOFTWARE SERVICES Current Awareness Internet Tools Online Search & Retrieval (e.g. Individual Inc.) (e.g. NetOwl, Copernicus) (e.g. NERAC, Burwell Enterprises) Current Contents Data Entry Tools Media Monitoring (e.g. ISI CC Online) (e.g. Vista, BBN, SRA) (e.g. FBIS via NTIS, BBC) Directories of Experts Data Retrieval Tools Document Retrieval (e.g. Gale Research, TELTECH) (e.g. RetrievalWare, Calspan) (e.g. ISI Genuine Document) Conference ProceedingsAutomated Abstracting Human Abstracting Library, CISTI) (e.g. NetOwl, DR-LINK) (e.g. British (e.g. NFAIS Members) Commercial Online Sources Automated Translation Telephone Surveys (e.g. LN, DIALOG, STN, ORBIT) (e.g. SYSTRAN, SRA NTIS-JV) (e.g. Risa Sacks Associates) Risk Assessment Reports Data Mining & Visualization Private Investigations (e.g. Forecast, Political Risk) (e.g. i2, MEMEX, Visible Decisions) (e.g. Cognos, Pinkertons, Parvus) Maps & Charts Market Research (e.g. East View Publications) Desktop Publishing & Communications Tools Commercial Imagery Electronic Security Tools Strategic Forecasting (e.g. SPOT, Radarsat, Autometric) (e.g. SSI, PGP, IBM Cryptolopes) (e.g. Oxford Analytica) (e.g. SIS, Fuld, Kirk Tyson) 24 CURRENT AWARENESS BASICS • • • • • • DOW JONES INTERACTIVE (Media, BBC) DIALOG (Periodicals, Books, Conferences) BRITISH LIBRARY (Conference Papers) World News Connection (FBIS) COPERNICUS (Internet Profiles) LEXIS-NEXIS (Legal/Criminal/Personality) 25 GEOSPACIAL SHORTFALLS AFRICA ASIA & PACIFIC EUROPE & MED WESTERN HEMISPHERE Algeria Bangladesh Greece Argentina Angola China Turkey Bolivia Djibouti Indonesia Brazil Ethiopia Kazakhstan Colombia Ghana Kyrgystan Ecuador Kenya Malaysia Grenada Liberia Myanmar Jamaica Madagascar New Caledonia Mexico Mozambique Papua New Guinea Paraguay Namibia Russia Peru South Africa Sri Lanka Suriname Sudan Viet-Nam Uraguay Uganda 4 Key Island Groups Venezuela For each of the above countries, less than 25% available in 1:50,000 form, generally old data. 26 MAPS & CHARTS Formerly classified Soviet maps Some 1:50, global 1:100 coverage Contour lines you can hide in…. Digital and printed, very low cost Topographic, Geological, Nautical Gazetteers, Indexes, Translations They got the cable car right…. < www.cartographic.com > 27 COMMERCIAL IMAGERY 10 meter imagery is 1:50,000 level and can provide contour lines. Synoptic coverage and two-day revisit available globally on 24 hours notice. Meets critical needs for creating maps, precision targeting, and mission rehearsal. <www.spot.com> 28 SOFTWARE FUNCTIONALITIES • • • • • • • • Monitor, alert Search, browse, gist Cluster, weight, summarize Translate Index, extract, stuff Query, view, structure Visualize, catalogue Facilitate, inspire 29 DATA VISUALIZATION Analysts Notebook -- Link Analysis -- <www.i2inc.com> 30 DATA EXPLOITATION SEARCHING True Total Content Access <www.memex.com> Flexible Retrieval Dynamic Updating Significantly Reduced Storage In-Built Security RETRIEVAL: Boolean Synonym Sound-Ex Garbled Searching EXPLOITATION : Ranking Clustering Feedback Analysis 31 DATA-ORIENTED SERVICES • Online Searchers – Source-centric/each system unique – Subject-matter competence/learning curve – Foreign language competence/full access • Document Retrieval – Copyright Compliance – Digitization 32 HUMAN-ORIENTED SERVICES • Human Collection Specialists – Telephone Surveys – Private Investigations – Market Research • Human Processing Specialists – Commercial Imagery, Maps, Visualization – Data Warehouses, Multi-Source Processing • Human Citation Analysis: World Mind Map 33 INFORMATION BROKERS Highly recommended “Local knowledge” Indexed by location, subject-matter, and foreign language skill www.burwellinc.com 34 GEOSPACIAL VISUALIZATION 1M 10M 20M 2M 30M 5M 1M 2M 5M 10M 8-100M 30M Ikonos KVR-1000 IRS-1C/D in 3D SPOT Image RADARSAT LANDSAT 35 CITATION ANALYSIS KOBAYASHI Y 87 MASTRAGO A 63 TILAK BV 92 36 OSINT ISSUE AREAS • Operational Security – Understand requirement in all-source context – Conceal/protect client identity and interest • Copyright Compliance – Get used to it • Foreign Language Coverage • Source Validation – OSINT assures authority, currency, confidence 37 OSINT RULES OF THE GAME • 80% of what you need is not online – 50% of that has not been published at all • 60% of what you need is not in English • 90% of the maps you need do not exist – but commercial imagery can address overnight • 80% of the information is in private sector – must leverage distributed private knowledge 38 INTERNET REALITY I (BAD) • COSPO (USA) Survey: roughly 1% of Internet is real content, roughly 50 great sites, 500 good sites--the rest is pornography and opinion • Internet is a cream puff in comparison to the kind of rich content/value added represented by commercial online services with editors/filters • MCIA/Other Experience: Internet devours analysts--they get lost or they get addicted, either way their productivity is cut in half 39 INTERNET REALITY II (GOOD) • Internet is exquisite as a collaborative work environment, and for information sharing • Internet has its uses (see OSINT HANDBOOK) – – – – – Indications & Warning (Tiananmen, Coup vs Gorby) Cultural Context (Bosnia, Islam, Indians in Mexico) Basic Research (card catalogues, lists, web sites) Science & Technology Collection (surprisingly good) Spotting & Assessment (trolling for potential agents) • Internet will explode over time--early days yet 40 OSINT IS A PROCESS • DISCOVERY--Know Who Knows – Just enough from just the right mix of sources • DISCRIMINATION--Know What’s What – Rapid source evaluation and data validation • DISTILLATION--Know What’s Hot – Answer the right question, in the right way • DELIVERY--Know Who’s Who – It’s not delivered until right person understands 41 INTEGRATED OSINT CONCEPT Internet Stream Commercial Online Feeds Q A Commercial Maps & Images DIRECT ACCESS: OSS-SRA TOOLKIT WITH TAILORED SOURCE ACCESS MEDIATED ACCESS: OSS EXPERTS WITH PROPRIETARY SOURCE METADATABASE CLIENT Offline Stream (“Gray Literature”) Human Experts “On Demand” PROCESSING TOOLKIT PLUS OSS EXPERT ANALYSTS PRODUCTION TOOLKIT PLUS OSS EXPERT ANALYSTS FEEDBACK LOOP OSS INTEGRATED ONE-STOP SHOPPING PROCESS Call Center -- Multi-Level Security -- Umbrella for Unified Billing 42 COLLECTION MANAGEMENT I • TIP-OFF – Wires, Jane’s help more than they know • TARGETING/CONSERVATION – Narrow the field for clandestine/covert assets • CONTEXT/VALIDATION – Ideal for double-checking human assets/story • COVER – Protects classified sources & methods 43 COLLECTION MANAGEMENT II “Do not send a spy where a schoolboy can go.” “The problem with spies is they only know secrets.” ALL-SOURCE ANALYSIS IMINT HUMINT SIGINT MASINT OPEN SOURCE INTELLIGENCE OPEN SOURCE INFORMATION 44 CM III/ALL-SOURCE ANALYSIS I OLD “LINEAR” PARADIGM NEW “DIAMOND” PARADIGM Customer Customer Analyst Analyst Collector Collector Source Source ACME OF SKILL IN 21ST CENTURY: Putting Customer with a Question in Touch with Source Able to Create New Tailored Knowledge in Real Time45 ALL-SOURCE ANALYSIS II • All-Source Analyst’s Role Must Change – – – – – Manage Network of Overt Sources Manage Resources to Fund Overt Sources Manage Classified Collection in Context Manage Client’s Incoming Open Sources Manage Client’s Needs for Open Intelligence • Myopic Introverts Need Not Apply…. 46 ALL-SOURCE ANALYSIS III STRATEGIC Integrated Application Military Sustainability Geographic Location Civil Allies OPERATIONAL Selection of Time and Place Military Availability Geographic Resources TACTICAL Application of Finite Resources Military Reliability Geographic Terrain TECHNICAL Isolated Capabilities Civil Stability Civil Psychology Military Lethality Geographic Atmosphere Civil Infrastructure Over time and space Channels & Borders Of strategic value Quantities & Distribution Internally available for use Volatility of sectors Training & Maintenance Mobility implications Cohesion & Effectiveness Military Systems One by One Climate Manipulation Civil Power, Transport, Communications, 47 & Finance THREAT ANALYSIS • LIBYAN TANK EXAMPLE (1992) – – – – Technical Level (Lethality): VERY HIGH Tactical Level (Reliability): LOW Operational Level (Availability): MEDIUM Strategic Level (Sustainability): LOW • We can no longer afford worst-case systems acquisition (and such systems are largely useless against 3 of 4 modern day threats) 48 STRATEGIC GENERALIZATIONS • • • • • • • Port utility Cross-country mobility Bridge loading limitations Intervisibility Aviation temperature averages Naval gunfire challenges Language requirements Half Zip 30T <900M HOT 5” dies Heavy 49 COALITION OPERATIONS I “… the concept of UN intelligence promises to turn traditional principles on their heads. Intelligence will have to be based on information that is collected primarily by overt means, that is by methods that do not threaten the target state or group and do not compromise the integrity or impartiality of the UN.” Hugh Smith as cited by Sir David Ramsbotham 50 COALITION OPERATIONS II • Assure minimal common appreciation of situation including terrain and civil factors • Enable information-sharing at unclassified level across national and civil-military lines • Significantly enhance information integration within own forces • Protect sensitive sources & methods 51 COALITION OPERATIONS III JOINT OSINT CELL 52 COALITION OPERATIONS IV OSINT “NET” G-2 PROVOST MARSHAL COMBAT ENGINEERS G-3 PSYOP CINC CIVIL AFFAIRS PAO POLAD 53 OSINT CELL I • Functions should include – – – – Current awareness briefs/tip-off “bundles” Rapid response reference desk Primary research Strategic forecasting • OSINT is a starting point for both the intelligence producer and the consumer 54 OSINT CELL II Click for full text MEXICAN INSURGENCY Wednesday, 3 September 1997 Mass Media Stories (Commercial Online Services, Edited Content) 01 02 03 Rough translation optional 02 03 Abstract may be online; copy can be ordered via email. CHIAPAS INSURGENCY CONTINUES Associated Press 1500 Words, “The Chiapas Insurgency continues to escalate, with 13 Mexican soldiers CHIAPAS LEADERSHIP VISITS GENEVA Los Angeles Times 1631 Words, “The leaders of the Chiapas insurgencies YUKATAN KIDNAPPING OF U.S. BUSINESSMAN El Tiempo, 764 Words, “Ayer en el sur de Mejico, un empresario Norte Americano fue sequestrado por Journals (Peer Reviewed Journals, Mostly Off-Line) 01 02 03 Click for full list in section EXPAND MOST RELEVANT NEW ARTICLE “A Comparative Approach To Latin American Revolutions” (Wickham-Crowley, INT J COMP, July 19 MOST HEAVILY CITED RECENT ARTICLE “Environmental Scarcity and Violent Conflict: The Case of Chiapas, Mexico” (Howard, Philip and MOST RELEVANT NEW FOREIGN LANGUAGE ARTICLE “Tierra, Pobreza, y Los Indios: La Situacion Revolucionaria en Mejico” (Gonzalez, Juan Fernando, Internet (Caution: Content Not Subject To Editorial Review) 01 EXPAND NEW SITE MATCHING PROFILE, EZLN <http://www.ezln.org> INCREASED ACTIVITY, OVER 1000 HITS YESTERDAY <http://www.eco.utexas.edu/faculty/Cleaver/chiapas95.html> New Major Document, “Chiapas—El Pueblo Adelante!” (14 pages) <http://www.indians.org/welker/chiapas2.htm> Documents can be provided; sites are pointers for client to access. EXPAND Number of lines per entry can be changed 55 OSINT CELL III REQUIREMENTS OFFICER/ COLLECTION MANAGER INTERNET SPECIALIST PRIMARY RESEARCH SPECIALIST COMMERCIAL ONLINE SPECIALIST EXTERNAL SERVICES SPECIALIST EDITOR/ANALYST PRESENTATION MANAGER 56 OSINT CELL IV • Must be national in approach – Centralized coordination – Decentralized processing • Problems will persist – – – – Security, funding, cultural barriers Training & education vacuum Concepts & doctrine vacuum Foreign language inadequacies 57 OSINT BUDGET (GENERIC) Bottom line: 1% of OPS or 5% of INTEL budget Recommended national defense OSINT allocations (%): Commercial Imagery Acquisition .166/Yr JOINT VISION Ground Stations .033/Yr UN/NATO/Regional OSINT Architecture .066/Yr Joint, Service, and Command OSINT Cells .100/Yr Defense OSINT Training Program .016/Yr Defense Internet Seeding Program .016/Yr OSINT Analysts at Embassies with Funds .033/Yr OSINT Direct Support Program .550/Yr Contingency/Crisis OSINT Surge Program .016/Yr 58 OSINT BUDGET (USA) Bottom line: 1% of OPS or 5% of INTEL budget Recommended national defense OSINT allocations (USA)*: Commercial Imagery Acquisition 250M/Yr JOINT VISION Ground Stations (10@$5M) 50M/Yr UN/NATO/Regional OSINT Architecture 100M/Yr Joint, Service, and Command OSINT Cells (15@$10M) 150M/Yr Defense OSINT Training Program 25M/Yr Defense Internet Seeding Program 25M/Yr OSINT Analysts at Embassies with Funds (100@$500K) 50M/Yr OSINT Direct Support Program 825M/Yr Contingency/Crisis OSINT Surge Program 25M/Yr * Supports 50,000 SI/TK analysts and 250,000 action officers 59 CONCLUSION • MILITARY CAN’T DO IT ALONE – Need Resources from Business, Academia – Need to Integrate Needs of Policy, Police • MILITARY CAN TAKE THE LEAD – Has the Discipline and Command Structure – Has the Budget Flexibility – Has Best Trans-National Relationships 60 IO BIG PICTURE All-Source Intelligence (Spies, Satellites, and Secrets) OSINT as Input Information Warfare INFORMATION OPERATIONS OSINT as Output Information Peacekeeping “Don’t send a bullet where a byte will do….” 61 VIRTUAL GLOBAL INTELLIGENCE Intelligence Community Government Knowledge National Distributed Knowledge Global Distributed Knowledge 1B 10B 100B 1 TRILLION 62 STRIKING A NEW BALANCE TECHNICAL $$ TS LIFERS HUMINT $$ MID-CAREER HIRES SECRET OSINT $$ 1-179 DAY/YR TEMPORARY EXPERTS IC MANNING IC DOLLARS UNCLASSIFIED IC PRODUCTION 63 Four Threats, Four Defense Forms SOLIC/LEA UNCONVENTIONAL LOW INTENSITY CONFLICT AND GANG WARFARE HIC/MRC STRATEGIC NUCLEAR AND CONVENTIONAL MILITARY WAR INFOWAR/ ECONOMIC ESPIONAGE IW/ECON INFORMATION WAR/ CRIME & ECONOMIC ESPIONAGE PROLIFERATION/ MIGRATION JIHAD/ GREENPEACE TERRORISM/ GLOBAL CRIME MINDWAR RELIGIOUS, POLITICAL AND ENVIRONMENTAL REFUGEES 64 INFORMATION STRATEGY • Military must work with rest of Nation • Four elements of information strategy: 1) 2) 3) 4) Connectivity Content access & validation nodes Coordination of standards & investments C4 security across the board • OSINT, at root, is about creating a “smart nation” within which “smart organizations” can thrive and be effective at their mission--OSINT is the enabling net. • OSINT impacts national security and competitiveness. 65 OSINT BUILDING BLOCKS Policy Intelligence Law Enforcement Intelligence Coalition Intelligence Military Intelligence Business Intelligence/OSINT Mass & Niche Media Intelligence Citizen Intelligence--Intelligence “Minuteman” Basic, Advanced, & Corporate Education Robert Steele, OSS NOTICES 31 May 1995, with Alvin Toffler; the concept of “Intelligence Minuteman” was developed by Alessandro Politi at OSS ‘92, and independently put forth and enhanced by Anthony Fedanzo in OSS READER. 66 NEW GOVERNMENT OPERATIONS DOCTRINE National Economic Council Transnational and Domestic Law Enforcement Operations Civilian Leaders Conventional Military (High-Tech) Information Driven Government Operations Diplomatic and Other Information Peacekeeping National Electronic Security & Operations Counterintelligence Program Special Operations (Low-Tech) Information Warfare Corps 67 REFERENCES I “Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions, and Operations" (Defense Daily Network, 4 March 1998) at <www.defensedaily.com/reports/osint.htm> Open Source Intelligence: HANDBOOK (Joint Military Intelligence Training Center, October 1996) at <www.oss.net/HANDBOOK> Open Source Intelligence: READER (OSS Inc., 1997) at <www.oss.net/READER> Concept Paper: Creating a Bare Bones Capability for Open Source Support to Defense Intelligence Analysts (OSS Inc., 18 August 1997) at <www.oss.net/DIAReport> “Open Source Intelligence: An Examination of Its Exploitation in the Defense Intelligence Community” (Major Robert M. Simmons, Joint Military Intelligence College, August 1995) 68 REFERENCES II “Virtual Intelligence: Conflict Resolution and Conflict Avoidance Through Information Peacekeeping”, Proceedings of the Virtual Diplomacy Conference of 1-2 April 1997 in Washington, D.C. (U.S. Institute of Peace) at <http://www.oss.net/VIRTUAL> Intelligence and Counterintelligence: Proposed Program for the 21st Century (OSS Inc., 14 April 1997 at <http://www.oss.net/OSS21>) “Information Peacekeeping: The Purest Form of War” in CYBERWAR: Myths, Mysteries, and Realities (AFCEA, 1998) at <www.oss.net/InfoPeace> Other references including self-study OSINT lessons at <www.oss.net>. 69 OSINT TRAINING PacInfo ‘98 OSINT and Complex Peacekeeping Ops 7-9 December 1998, Monterey, California EuroIntel ‘99 OSINT and Terrorism, Crime, & Proliferation 9-11 March 1999, The Hague, The Netherlands OSS ‘99 OSINT Sources & Methods 24-26 May 1999, Washington, D.C. 70 A LITTLE FUN Baaaa* *Sheep Lie…the official motto (and button) of CIA Mid-Career Course 101 71