Military Space News  





. Analysis: Classifying open source intel?

Jennifer Sims said under the definition of classified information -- data the release of which would damage the national security of the United States -- intelligence could, and should, be classified even when the source was open, "because of the insights you derive for the decision-maker from that source."
by Shaun Waterman
Washington (UPI) Sep 16, 2008
Intelligence from open sources like the Internet is now recognized as an essential part of the work of U.S. agencies -- but one leading expert in the field says much more of it should be secret.

"Open source intelligence is widely recognized as both an essential capability and a formidable asset in our national security infrastructure," CIA Director and retired Air Force Gen. Michael Hayden told a conference in Washington Friday.

Hayden quoted the strategic plan issued this year by Director of National Intelligence Michael McConnell: "No aspect of (intelligence) collection requires greater consideration or holds more promise than open source information."

But the conference, organized by the DNI's Open Source Center, the agency based at the CIA that provides analysis of open sources for U.S. intelligence, also heard counterintuitive calls for more of its product to be classified.

Jennifer Sims, director of intelligence studies at Georgetown University, told United Press International there was another rationale for classifying intelligence reports, other than the traditional one of protecting sources and methods.

She said under the definition of classified information -- data the release of which would damage the national security of the United States -- intelligence could, and should, be classified even when the source was open, "because of the insights you derive for the decision-maker from that source."

"That requires classification because the release of it tells people what decision-makers find insightful about the open source analysis."

In other words, if it is worth knowing, it is worth preventing adversaries from knowing.

"If you don't classify" open source intelligence products, she argued, "what you're saying is that you're not providing any particular insights that matter to the competition."

Sims also cited the DNI's strategic plan, which defined the key role of the sprawling collection of U.S. agencies known as the Intelligence Community as providing "decision advantage" in a dangerous and quickly changing world.

"What's new and exciting about the use of the term 'decision advantage' is that it reminds everybody that the core business of intelligence is not gathering secrets. The core business of intelligence is providing insights for decision-makers who are engaged in life-or-death competitions, and those insights require classification wholly apart from any need to protect sources and methods."

But Sims also argues against the widely held assumption that open source intelligence gathering requires no protection of sources and methods.

All intelligence collection involves at least five elements, she explained: command and control, sensors, platforms, processing and exploitation, and finally data exfiltration.

Even in open source, she said, "You will want to classify your command and control, because you don't want people to know what your requirements are." Processing and exploitation should also be secret "at least in part żż because you want to keep your methods for deriving insights from the data away from anybody else."

Steven Aftergood, a government-transparency advocate at the Federation of American Scientists, said Sims "made the most coherent argument for open source secrecy I have heard."

But, he said, in actual fact, very few of the analyses produced by the Open Source Center fitted Sims' picture of material that conferred a vital advantage over the country's adversaries.

"Only a small minority of OSC analytical products fits that description," he told UPI. "The overwhelming bulk have no operational relevance. They are at best contextual," he added, comparing them to the research backgrounders prepared by the Congressional Research Service.

"They are not inputs into strategic decision-making."

According to Aftergood, Sims' argument was "misleading to the extent that it presented the exception as the rule."

Aftergood's conclusion was echoed by Kim Robson, the center's deputy director, who told UPI that "the vast majority of what we produce is not classified żż and doesn't have to be."

"In some cases," Robson added, OSC reports end up being classified "because of the sensitive nature" of their conclusions.

"If the information will żż reveal intentions and capabilities, then it ought to be protected in some way, even if the (underlying) information is unclassified," she explained.

But in most cases the restrictions on the circulation of OSC reports was a matter of copyright, not classification, she said.

Robson acknowledged there might be times when even unclassified information should be protected -- for instance, by being labeled as "Controlled Unclassified Information."

She gave the example of a young al-Qaida operative who was revealing operational vulnerabilities on a blog or social network site. "That could provide us with a decision advantage," she said. "Maybe we don't want to tell al-Qaida that one of their operatives is out there blogging about their vulnerabilities. So that would be something you'd want to keep in sensitive channels, even though it's unclassified."

Community
Email This Article
Comment On This Article

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues




Tempur-Pedic Mattress Comparison

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News
Analysis: New measure for cybersecurity
Washington (UPI) Sep 11, 2008
A group of experts from academia, the private sector and government are putting their heads together to answer the long-nagging question: How do you measure the cost-effectiveness of cybersecurity efforts? It is an issue, they say, that dogs officials and executives, leaving them reliant on intuition and a tick-the-box approach to security measures.

.
Get Our Free Newsletters Via Email
  



  • Russian Fleet May Go To Mediterranean
  • Analysis: West vs. Russia, no end in sight
  • China says more talks set with India on border row
  • NATO Blocked In The Caucusus Part Two

  • Iran warns on nuclear cooperation, rattles sabre over Gulf
  • North Korea vows to build up 'war deterrent'
  • Iran Stalls On IAEA Nuke Probe US Threatens More Sanctions
  • India now a big world player thanks to nuclear nod: minister

  • NKorea conducts engine tests at new missile site: report
  • US Navy's New Submarine Class Conducts Tomahawk Cruise Missile Launches
  • NZ Navy And Air Force Test Fire Missile
  • US Navy Conducts Second Test Of Raytheon's Standard Missile-6

  • Pentagon proposes sale of missile defense system to UAE
  • Russian Blackjacks In Venezuela End Yankee Hegemony: Chavez
  • Lavrov accuses US of trying to encircle Russia with shield
  • Obama says missile shield cannot target Russia: Poland's Sikorski

  • Safer Skies For The Flying Public
  • Chinese airlines fly into headwinds in Olympic year
  • The M2-F1 - An Aircraft Without Wings
  • China's Tianjin building runway for Airbus test flights: report

  • QinetiQ Rolls Out Field-Transformable Dragon Runner SUGV
  • US drones bring fear and firepower to Qaeda war in Pakistan
  • Russian Army Adopts New Reconnaissance Drones
  • Virtual Reality Project Could Improve UAV Operations

  • Odierno warns on Iraq security as he takes US command
  • Odierno: towering US general charged with Iraq 'end-game'
  • Gates honours US leaders in Iraq as female bomber kills 22
  • Iraq close to security agreement with US: foreign minister

  • First Run Of Boeing Laser JDAM Demonstrated On B-52H
  • Boeing Awarded Contract For Radar Upgrade On Saudi AWACS Fleet
  • US to sell bunker-busting bombs to Israel: Pentagon
  • Eurofighter Typhoon Flight Milestone: 50,000 Hours And Climbing

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement