OSINT
Open-Source Intelligence — intelligence derived from publicly available information
Audio readout of this entry.
OSINT — open-source intelligence — is intelligence derived from publicly available information: news broadcasts, newspapers and periodicals, social-media posts, commercial databases, academic literature, court records, government publications, and the structured open data released by states, international organisations, and commercial entities. The category is defined by its source rather than by its method; analysts processing OSINT use the same techniques of collection, evaluation, and synthesis applied to any other discipline.
The state OSINT establishment is older and larger than the popular framing of "open source" as a recent development suggests. The Foreign Broadcast Information Service, established 1941, monitored and translated foreign-language radio broadcasts for the US government from the Second World War through 2005, when its functions were absorbed into the CIA's Open Source Center. The BBC Monitoring service has performed an equivalent role for the United Kingdom since 1939. State OSINT has historically been characterised as unglamorous — the discipline that produced press summaries and translation digests rather than agent-running coups.
The 2010s and 2020s have substantially repositioned OSINT in the public record. Bellingcat — the investigative collective founded by Eliot Higgins in 2014 — produced the first detailed identifications of GRU Unit 29155 personnel implicated in the Salisbury attack, the 2014 destruction of Bulgarian arms broker Emilian Gebrev's facilities, and the parallel Vrbětice operation. The Pegasus Project, the 2021 cross-publication of Forbidden Stories and Amnesty International's Security Lab, used OSINT methods alongside forensic mobile-device analysis to attribute targeting. The International Consortium of Investigative Journalists has produced comparable work on financial intelligence questions.
The strength of OSINT is its capacity to be published. Where SIGINT and HUMINT findings typically remain classified for decades, OSINT investigations can be made public on the timescale of weeks. The post-2014 GRU identifications and the post-2018 Pegasus targeting analyses both shaped diplomatic and legal responses in real time, in a way that would have been impossible if the same evidence had emerged only through classified channels. For the editorial purposes of this site — which depends entirely on the public record — OSINT is the discipline whose output is most directly useable.
See also
- HUMINT — closed-source human collection
- SIGINT — closed-source signals collection
- IMINT — closed-source imagery; commercial imagery is now an OSINT input
- MASINT — technical-signature work; the OPCW's published findings are an OSINT-adjacent register
- GEOINT — increasingly publishable through commercial geospatial data