Introduction
The rapid expansion of online data since the advent of the Internet has greatly enhanced the ability of state and non-state actors to collect and analyse openly accessible information on a growing range of security issues, from climate change to terrorism and arms proliferation.Footnote 1 Over the past decade, the rise of social media and smartphones equipped with cameras has accelerated this trend.Footnote 2 Photos and videos from Russia’s war in Ukraine and Israel’s invasion of Gaza have flooded social media with vast amounts of data, profoundly shaping public perceptions of contemporary security. This explosion of publicly available data has ushered in what some experts view as a new era of intelligence – the targeting, collection, analysis, and dissemination of information to reduce decision-makers’ uncertainty.Footnote 3 The exploitation of publicly accessible data by intelligence practitioners in the public and private sectors, as well as civil society, is often referred to as open-source intelligence (OSINT). Despite the growing academic and professional interest in OSINT, efforts to systematically organise knowledge on its rise and implications for security remain limited.
This article addresses one central research question: how do experts interpret the rise of OSINT and its implications for contemporary security? To explore this, we combined a comprehensive literature review and a semi-structured discussion with a panel of experts. First, we compiled a bibliography of over 100 publications on OSINT using search queries such as: (OSINT OR ‘Open source intelligence’) AND security. We applied three selection criteria to narrow our focus on: (1) academic contributions following a social scientific approach, (2) excluding more technical fields like computer science, (3) ensuring relevance to security studies. From this, we identified 25 key publications, which formed the corpus for an annotated bibliography. Four main debates emerged, on semantics, the spread of OSINT, its integration, and the challenges it poses. This initial foray also highlighted additional areas for exploration, such as the ethics of online investigations. Using a snowball method, we expanded the bibliography to capture a broader spectrum of research and debates (e.g. considering research in law and journalism). To integrate the latest trends in the field of practice, we broadened our search to include select non-academic platforms such as blogs and traditional and social media. These sources proved especially useful in connecting conceptual points to empirical practices, for example, on the ethics of OSINT.Footnote 4
We then presented our initial findings to a panel of 15 security experts from academia, the private sector, and government, representing several Western countries.Footnote 5 The panel convened for a one-day workshop in May 2024 under the Chatham House rule to promote candid discussion.Footnote 6 The exchange allowed us to confirm and expand our coverage of the literature, test the validity of our main claims, and identify areas requiring further research.Footnote 7
The article is structured around four key themes. The first section addresses definitional issues and their implications. We define open-source intelligence and distinguish it from open-source investigation and information. The second section examines the spread of OSINT from government institutions to broader communities of practice, arguing that the rise of OSINT reflects an evolutionary process rather than a revolutionary one. Sensationalist claims about OSINT’s revolutionary potential confuse the availability of open data with the production of intelligence. Producing intelligence requires expert knowledge, analytic skills, and careful coordination – resources that are not available to just anyone. This raises the question of the institutionalisation of OSINT, which is addressed in the third section. Framing of OSINT as a set of practices, we emphasise the need for digital literacy training over the creation of new organisations. The fourth section addresses three core challenges faced by OSINT practitioners: information overload, reliability, and ethics and regulatory boundaries. These challenges echo well-known issues in intelligence work and provide a sound basis to structure digital literacy training. We conclude by discussing the broader implications of OSINT’s rise for security studies, linking the rise of OSINT to broader debates on the proliferation of security actors and expertise beyond the state.
Defining OSINT
The definition and understanding of OSINT are subject to ongoing debate and interpretation. This semantic discussion is important because it delineates the parameters of the field of practice and debates about its emergence, development, and implications on international affairs. Experts agree on most of the building blocks of the definition of OSINT, but they disagree on its characterisation as an intelligence discipline.
Political entities on both side of the Atlantic have proposed their own definition of OSINT. The US House of Representatives once defined OSINT as ‘intelligence that is produced from publicly available information and is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement.’Footnote 8 This definition presents OSINT as a finalised product. More recently, the European Union has construed OSINT as a practice: ‘the practice of collecting and analysing information gathered from open sources to produce actionable intelligence’.Footnote 9 Both definitions make a useful distinction between ‘raw’ publicly available information – sometimes also characterised as open-source information or OSINF – and OSINT, which results from a more systematic process of collection, exploitation, and dissemination to meet a requirement.Footnote 10 Civil society investigative groups like Bellingcat put even more emphasis on this process and now use the term open-source investigation (OSINV) to refer to their work, thus also distancing themselves from government and corporate intelligence practices and products.Footnote 11
Following an academic approach, Coulthart and Nussbaum conduct a systematic review of relevant literature to extract the core components of a definition of OSINT. They hold that OSINT is ‘legally obtained public or commercial information that has been validated, analysed, and disseminated to meet an intelligence requirement’.Footnote 12 First, their focus on legally obtained information distinguishes OSINT from clandestine or covert intelligence-gathering methods, which intelligence practitioners and hackers use to manipulate human and technical sources of information.Footnote 13 Yet, in some countries, this legal criterion could rule out the use of data stolen by others and available online.Footnote 14 While OSINT does not involve gaining unauthorised access to data in a system or computer (hacking), defining it as inherently ‘legal’ risks narrowing our understanding of the diverse sources and methods practitioners employ. For example, OSINT often involves using grey data available online, even when their release was unauthorised.Footnote 15
Second, the information is public or commercial. It is public in the sense that it is, in theory, accessible to all. This excludes protected sources but does not mean that the information is always freely accessible, hence the reference to commercial information. An important implication of the public availability of the information used to produce OSINT is that it is almost always second-hand.Footnote 16 The OSINT Foundation explains: ‘for the information to be publicly available, it must have been collected, processed, and disseminated by someone else for other purposes’.Footnote 17 This point, however, does not always hold true. A practitioner could overtly request information to a source or a forum in ways that are publicly traceable, and this could still contribute to a broader effort to produce OSINT.
Third, there is a broad consensus among experts that the effort to validate, analyse, and disseminate OSINT distinguishes it from other types of information. Casual observers might associate OSINT with photos of destroyed tanks, which have flooded social media since the start of Russia’s war in Ukraine. In the absence of a visible effort to validate the source of such pictures, analyse their meaning in the broader context of this war, and tailor the dissemination of relevant information to the needs of an audience, posting a photo together with its source (e.g. a Telegram channel) is more likely to constitute OSINF.
Fourth, the need for an ‘intelligence requirement’ to be expressed can help to differentiate OSINT from the outputs produced by hobbyists whose coverage sometimes seems to follow their own interests or what they might assume is in the public interest. In contrast, government agencies, private companies, and mature civil society groups work towards requirements that they or their consumers identify.Footnote 18
Scholars and practitioners debate whether OSINT can or should be considered as a distinct intelligence discipline, on par with human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), and geospatial intelligence (GEOINT). Some government intelligence professionalsFootnote 19 contend that OSINT does not qualify as a distinct discipline. Many government agencies integrate OSINT into other intelligence disciplines, where it often serves as a foundation to orient and validate more specialised capabilities involving human and technical sensors.Footnote 20 In practice, integration tends to blur the lines between disciplines.Footnote 21 For example, Rae Baker demonstrates the use of publicly available electromagnetic signal data and commercial imagery in her maritime OSINT tutorial.Footnote 22 The ability to blend multiple disciplines and corroborate sources and methods is a hallmark of high-end OSINT. While OSINT investigations might challenge conceptual and bureaucratic boundaries, that does not negate the existence and value of OSINT as a specialised field of practice.
Unlike other intelligence disciplines, which are defined by the type of source exploited − such as human or electronic communications − OSINT stands apart by relying solely on non-secret sources. Hatfield defines a secret source as one controlled by a government actor who can restrict access to it.Footnote 23 However, this focus on state secrets is problematic, as non-state actors, including terrorist groups, also tightly control information about their operations.Footnote 24 Additionally, limiting the definition of OSINT to non-secret sources overlooks the extent to which advanced OSINT techniques, such as public database exploitation and voicemail retrieval, can challenge the boundaries of state secrecy.Footnote 25 A notable example comes from investigative group Bellingcat, which used OSINT techniques to uncover the identities and activities of Russian military intelligence officers involved in the poisoning of Sergei and Yulia Skripal in Salisbury.Footnote 26 Many observers likely assumed that only government counter-intelligence officers could achieve such a breakthrough. By combining multiple sources and methods, advanced open-source investigations can penetrate state secrets in ways comparable to traditional disciplines.
If ‘intelligence is as intelligence does’,Footnote 27 then OSINT can also be defined by its actions. A large community of researchers and investigators identify their work as OSINT, contributing to its development as a distinct set of practices. These practices vary widely but are unified by the common challenges of finding, collecting, evaluating, analysing, and disseminating information from open sources. Some well-established practitioners consider OSINT as a distinct intelligence discipline, though one that permeates all others.Footnote 28 Critiques may argue that proponents of OSINT as a discipline have vested organisational interests, but the same can be said of those who seek to dismiss it. From this perspective, debates over OSINT’s definition and classification as an intelligence discipline reflect personal trajectories, organisational preferences, and cultural variations, influencing who is included or excluded within communities handling open and classified sources.
Our definition of OSINT is deliberately broad to encompass a wide and rapidly evolving range of practices, some overlapping with established disciplines like SIGINT and GEOINT. We define OSINT as a set of practices involving the collection, validation, and exploitation of publicly available data and information to meet informational needs. It qualifies as a discipline because it is grounded in a structured body of knowledge, including established concepts and methods. An active community is engaged in defining related standards, as we illustrate in this article. Viewed this way, investigators and spies practised OSINT long before it was formally named.
The spread of OSINT
OSINT emerged progressively. Intelligence historian Christopher Andrew describes early uses of open sources by decision-makers in Renaissance Venice.Footnote 29 Practices – such as consulting newspapers from adversary countries – became more systematic when general staffs and institutionalised military intelligence emerged in the late 19th century. Block identifies two main conditions for the emergence of OSINT practices: the existence of a critical mass of (printed) news available to the public, and the expression of specific informational needs regarding adversaries.Footnote 30 One of first public uses of the expression ‘open-source intelligence’ or OSINT can be traced back to an article former Central Intelligence Agency (CIA) officer Robert David Steele published in a professional journal.Footnote 31 In the late 1990s, Steele and Lowenthal – another former CIA officer – published an instructional book on OSINT, discussing sources, collection management, and integration in all-source analysis and operations.Footnote 32 The advent of the Internet opened new opportunities to access data and information, fostering the emergence of a larger community of practice from the mid-1990s onward. Over a decade later, Michael Bazzell, a former special agent with the Federal Bureau of Investigation, authored one of the first handbooks compiling OSINT techniques, thus facilitating the dissemination of a body of practical knowledge.Footnote 33 Changes in the online environment, software, and methodological developments have pushed him to periodically update his handbook. This is now part of a growing body of contributions and initiatives, such as the Atlantic Council’s digital sherlocks programme, that focus on how to do OSINT.Footnote 34 These contributions, and the establishment of associations and conferences for OSINT professionals, have played an important role in consolidating a community of practice that goes well beyond government intelligence agencies.Footnote 35
The open nature of OSINT has facilitated its spread beyond state agencies. Over the past decade, professional communities have increasingly leveraged OSINT. First, security studies scholars have used it to research on issues such as weapons proliferationFootnote 36 and terrorist organisations.Footnote 37 Second, legal and human rights professionals use OSINF and OSINV to document violations of human rights and provide evidence in investigations and court cases.Footnote 38 For example, scholars and international organisations have published guidelines on using digitally derived evidence in investigating violations of international law.Footnote 39 Third, investigative journalists employ open-source investigation techniques to expose corruption and human rights abuses.Footnote 40 Groups like Bellingcat have sparked debates about whether OSINT has ‘revolutionized’ conflict journalism,Footnote 41 while educators are exploring how to integrate OSINT into journalism curricula.Footnote 42 Open-source university laboratories are emerging in law schoolsFootnote 43 and security studies programmes,Footnote 44 particularly in well-established universities in the Global North. Fourth, OSINT is also foundational to the development of competitive intelligence in the private sector.Footnote 45 Drawing on research about epistemic communities, the spread of OSINT to these fields can be interpreted as the result of a growing demand for expertise to fill information gaps caused by uncertainty in global affairs.Footnote 46 This demand may also explain OSINT’s success in attracting significant followings on social media, where users likely share a similar need to address uncertainty.
Today, the term OSINT evokes non-state groups like Bellingcat. Yet we understand little about the wider networks of actors, including government units, civil society groups, private companies, hobbyists, and volunteers, that engage in OSINT and support its proliferation.Footnote 47 The field lacks exploratory research into the profiles and trajectories of these practitioners, their interactions and how they form networks across organisational boundaries.
The rise of OSINT has sparked an academic debate over its characterisation. Security studies scholars often question whether the rise of ‘new’ practices should be construed as an evolution or a revolution.Footnote 48 Sebe views OSINT as revolutionary, highlighting the unprecedented breadth and depth of available information, and emphasisng resource abundance and diversity.Footnote 49 This ‘revolutionary’ perspective conflates the availability of open sources and the production of intelligence, which requires technical expertise, coordination, and resources. Williams and Blum take a more measured stance, describing OSINT as entering a new phase thanks to the data yields from Web 2.0 and big data.Footnote 50 This aligns well with Block’s offer and demand model, which highlights the availability of a critical mass of public information and the articulation of specific informational needs.Footnote 51 Based on similar premises, Minas predicts OSINT’s indispensability in the current century.Footnote 52
The current OSINT hype has raised its profile in online communities, the media, and even in government circles. Intelligence consumers in government and beyond are now more likely to expect more intelligence, in more detail, and faster.Footnote 53 As the OSINT community grows and draws more attention, the need for clear standards to evaluate what constitutes (good) OSINT becomes increasingly evident. Many observers and online personas conflate OSINF with OSINT, the latter requiring a more rigorous process of validation and analysis. Competencies among self-identified OSINT practitioners vary widely, ranging from casual participants to highly skilled teams like Bellingcat.Footnote 54 At the lower end of competencies, some individuals merely repost images or videos found online, without verifying their sources. Such practices misuse the OSINT label, lending a false sense of credibility to inadvertently misleading information (misinformation) or conveying intentional falsehoods (disinformation) disguised as fact-checking.Footnote 55 For example, a social media account with over 500,000 followers falsely claimed a satellite image of clouds and shadows over a desert depicted craters caused by Iranian missiles in Israel.Footnote 56 In contrast, practitioners with advanced OSINT skills meticulously and visibly validate, process,, and analyse information, for example to geolocate and contextualise an incident. Doing so lends credibility to their claims and authority to their persona.Footnote 57 When used in such a manner, OSINT techniques can corroborate or challenge emerging narratives about security issues. To preserve OSINT’s integrity as both a methodological approach and a community of practice, it is essential to establish and articulate core standards and competencies. Doing so will not only safeguard the credibility of OSINT but also lay the groundwork for its adoption within governmental, corporate, and non-profit organisations.
Integrating OSINT
The rise of OSINT is reshaping the information environment, compelling public and private organisations to reevaluate traditional intelligence practices that emphasise information control and compartmentalisation. In information-centric sectors, institutions that overlook OSINT risk missing crucial opportunities to broaden their sources and modernise their methods. OSINT’s growing prominence has prompted some Western intelligence communities to clarify their strategies for integration while reaffirming distinct contributions to decision-makers and the public.Footnote 58 However, an over-reliance on OSINT carries the risk of eroding expertise in core disciplines like HUMINT and SIGINT, which remain central to the identity and effectiveness of government intelligence agencies.Footnote 59 The challenge lies in finding ways to integrate OSINT methods and competencies without compromising the broader intelligence ecosystem.
Integrating OSINT sources and methods poses challenges at three levels: community, organisation, and individual. Looking at the US intelligence community, Amy Zegart suggests creating an independent agency dedicated solely to OSINT,Footnote 60 replacing the Office of the Director of National Intelligence’s Open Source Enterprise.Footnote 61 She argues that specialisation would drive innovation. This reflects ongoing debates, in the United States and beyond, about whether OSINT should be centralised within a single agency or decentralised across various organisations, directorates, and units. A more authentic community approach would promote the development of OSINT competencies well beyond the boundaries of a single government entity.Footnote 62
At the organisational level, the integration of OSINT into government agencies underscores its value as a complementary tool rather than a substitute for more established intelligence methods. Despite its growing prominence in investigating security incidents, OSINT is unlikely to fundamentally challenge the enduring importance of secret intelligence in shaping decision-making.Footnote 63 OSINT tends to deliver the most value when combined with other disciplines.Footnote 64 This reflects the principle that all-source intelligence, which allows for corroboration across multiple methods, is more reliable than single-source approaches. In mature organisations, OSINT is systematically cross-referenced with other intelligence sources, which professionals process and analyse to orient intelligence agencies and inform decision-makers.Footnote 65
This integration process, however, raises critical questions about structure and flexibility. Dover argues for the establishment of internal OSINT teams,Footnote 66 while Lahneman advocates a more flexible approach, delegating specific tasks to a trusted network of contractors.Footnote 67 This flexibility reflects the reality that non-state actors tend to have fewer security, organisational, and legal constraints that can limit OSINT activities.Footnote 68 Moreover, as the private sector owns and brokers much of the data critical to OSINT investigations, governments depend on partnerships with external entities to access data.Footnote 69
The debate over whether to insource or outsource OSINT capabilities overlaps with discussions on crowdsourcing, where the public is directly asked to help fulfil informational needs.Footnote 70 Van der Meulen highlights the challenges faced by Dutch military intelligence in adopting this method,Footnote 71 raising questions about its suitability for government agencies. A promising line of research would examine how organisational culture influences the propensity, ability, and integration of OSINT practices and partnerships. Most research on OSINT has focused on state capabilities, despite its importance in the private sector, and non-governmental organisations. Lewis Sage-Passant notes that private-sector intelligence gathering often relies on open sources.Footnote 72 Additionally, OSINT practices are accessible to violent non-state actors like Hamas, which have used them to support their targeting efforts against the Israeli Defense Forces.Footnote 73 The panel of experts we assembled agreed that how this broader range of non-state actors integrate OSINT remains an underexplored area of research.Footnote 74 While not extensively studied, we can hypothesise that groups like Bellingcat succeed because they leverage global and diverse networks that grant them direct access to incident sites, and sources and methods that are not easily developed by more structured government or corporate bodies. If this decentralised, creative approach is a key driver of OSINT’s success, the establishment of a centralised government agency dedicated to OSINT could undermine some of its key strengths by introducing rigid frameworks that limit flexibility, innovation, and access to networks of supporters.
Institutional design alone has limited impact if there is no existing inclination towards OSINT. This brings us to a third level of analysis: the individual. Psychologists Pedersen and Jansen show that people tend to place more confidence in secret information than in open sources.Footnote 75 Gentry notes that analysts are likely to avoid OSINT if it conflicts with their preferences.Footnote 76 Such tendencies suggest that some analysts might neglect or delegate OSINT tasks, undervaluing its potential. Addressing these biases is essential. Familiarising personnel with the value of OSINT could also bring additional benefits. For example, Glassman and Kang find that OSINT collection introduces intellectual puzzles that foster alternative ways of thinking,Footnote 77 akin to the advantages of some structured analytic techniques.Footnote 78 A practical recommendation, then, is to adapt training programmes to emphasise OSINT’s utility rather than creating dedicated units.Footnote 79 This strategy aligns with broader efforts to enhance digital literacy while also addressing critical challenges in today’s information environment.Footnote 80
Challenges
The main challenges facing OSINT practitioners mirror those confronting traditional intelligence professionals, namely information overload, reliability, and ethical and regulatory issues.Footnote 81 First, information overload refers to the overwhelming volume of data and information available for collection and exploitation.Footnote 82 This issue has long been recognised, as seen in intelligence failures like the 1941 surprise attack on Pearl Harbor.Footnote 83 The digital age has exacerbated this challenge, with vast amounts of data now readily available. Arno Reuser, who helped to establish an early OSINT capability in the Dutch military intelligence and security service, proposes a design solution by reframing and integrating the OSINT process.Footnote 84 More operational solutions include developing software to help analysts discover, filter, and analyse large datasets.Footnote 85 These efforts intersect with growing interest in using artificial intelligence (AI) to automate the processing and analysis of (open-source) information, offering a potential path to mitigating information overload.Footnote 86 As advanced data analytics and AI technologies become increasingly central to processing openly available data, a growing divide is likely to emerge. Well-resourced entities, such as government agencies and private companies, will benefit from access to cutting-edge software, while groups with limited resources, including civil society organisations and hobbyist investigators, may struggle to keep pace. This disparity raises questions about equitable access to technological advancements, and its implications for the broader OSINT ecosystem and information landscape.Footnote 87
Second, reliability – the extent to which data consistently and accurately informs analysis – is a major concern. Open sources are especially vulnerable to intoxication, where adversaries intentionally spread false information to deceive OSINT practitioners and the public.Footnote 88 This issue has become more pronounced during Russia’s war in Ukraine, which has seen a surge in strategic communication through press releases, orchestrated leaks, and disinformation campaigns.Footnote 89 The fog and noise of war complicate efforts to provide a reliable picture of ongoing events. Optimist voices explore how OSINT can help clear the ‘fog of war’ by dispelling false narratives arising from both sides.Footnote 90 Conversely, Schrijver examines how Ukrainian intelligence services have leveraged selectively disclosed protected information on social media to highlight Russian actions and shape public perceptions.Footnote 91
A promising line of research focuses on developing methods to evaluate the reliability of open-source information. Campbell proposes a metric for assessing the legitimacy of content created by OSINT users on Twitter (now X), with questions tied to three types of legitimacy: output, normative, and pragmatic.Footnote 92 Digital investigator Aric Toler outlines techniques for verifying and authenticating user-generated content, addressing concerns over OSINT’s reliability.Footnote 93 Methods like establishing provenance, time, and location through digital tools – such as commercial satellite imagery and reverse image searches – can reduce doubts about authenticity. As the OSINT community matures, it is consolidating best practices and seeking standardisation.Footnote 94 However, OSINT alone is unlikely to consistently achieve the reliability offered by more robust approaches that rely on corroboration across the broader spectrum of intelligence disciplines.
Tackling information overload and evaluating the reliability of data requires competencies. The competencies and resources that separate OSINT experts from hobbyists and casual Internet users deserve more scholarly attention. Extensive subject knowledge is crucial for understanding and prioritising information on complex security developments.Footnote 95 Experience and familiarity with sources also enable analysts to better discern between true and false information.Footnote 96 In this sense, OSINT demands skills and resources that are not easily acquired or universally available. The rise of OSINT is not ‘democratising intelligence’.Footnote 97 Even highly skilled experts can struggle to effectively interpret and contextualise open-source information, particularly when tasked with analysing regions or topics outside their expertise. The growing importance of AI tools to process and analyse vast amounts of openly accessible data, and the high costs associated with advanced capabilities in this domain, also suggest that high-end OSINT capabilities are not easily accessible to a broad audience.
Third, openly available data, information, and intelligence can harm individuals by violating their privacy or scapegoating them. OSINT requires careful ethical consideration. Gibson highlights how social media exhibitionism and unrestricted data access blur the lines between public and private spheres, complicating ethical considerations in OSINT activities.Footnote 98 Hribar and colleagues identify legal grey areas in advanced OSINT techniques, noting that government agencies can exploit these to broaden their collection targets and the types of information they collect, potentially infringing on privacy without technically breaking laws.Footnote 99 Ronn and Soe similarly warn against the unethical use of social media by intelligence agencies, stressing the violation of privacy rights in public online spaces.Footnote 100 These perspectives emphasise the urgent need for communities and organisations to develop clear ethical guidelines and regulations to ensure responsible open-source investigations.
As OSINT practices continue to evolve, incorporating new methods and developing new capabilities, adapting regulations and oversight mechanisms becomes increasingly important. The General Data Protection Regulations, for instance, impose strict guidelines on privacy and security, limiting what data can be collected and for how long it can be kept.Footnote 101 Continuing scrutiny is essential to ensure that current regulations adequately address potential harms and are properly implemented and enforced. Regulatory efforts are not limited to supranational organisations or national governments – the OSINT community also has a role to play. The OSINT Foundation, for example, has developed a code of conduct that addresses controversial practices like the use of sock puppets (fake social media accounts) and hacked and leaked data.Footnote 102 Scholars, too, can play a role in shaping the normative foundations of OSINT by developing ethical frameworks to guide its practices, including in areas such as social media intelligence.Footnote 103 These contributions can help address concerns about the potential misuse of OSINT in sensitive contexts. However, the credibility and utility of normative frameworks depend heavily on the presence of accountability mechanisms which can incentivise compliance and deter deviations from shared standards.
Further research is needed to explore two key dimensions of accountability in the OSINT domain. First, the extent to which OSINT groups like Bellingcat can contribute to the democratic accountability of government (intelligence services) – by making their activities more transparent to accountability bodies such as parliament, courts, specialised oversight bodies, the media, and the public – remains underexamined. Second, there is a need to investigate how OSINT practitioners across public, private, and civil society sectors are themselves held accountable for their actions and outputs. Addressing these gaps is essential to foster a trustworthy OSINT ecosystem.
Conclusion
There is an emerging consensus on defining OSINT as a process involving the collection, analysis, and dissemination of information from publicly or commercially available sources. This process distinguishes OSINT from ‘raw’ open-source information, emphasising the rigorous validation and analysis required to turn data into actionable intelligence. Experts broadly agree that OSINT now plays a foundational role in guiding information collection and analysis across various fields. They also highlight three key challenges – information overload, reliability, and ethical and regulatory considerations – that provide a foundation to consolidate core OSINT competencies and develop relevant training.
One point of contention is whether OSINT should be classified as a distinct intelligence discipline or as a facet of existing intelligence methods. This debate has significant policy implications for how organisations can most effectively incorporate OSINT capabilities and adapt to the ever-growing volume of open-source data. Some view OSINT’s rise as revolutionary, calling for the creation of specialised government agencies dedicated solely to its exploitation. However, much of the evidence indicates that the emergence of OSINT has been more evolutionary, developing progressively alongside other intelligence and digital investigation methods. This suggests that information and digital literacy training might be more important for leveraging OSINT than the creation of dedicated organisations.
Despite OSINT’s growing importance, several areas remain underexplored. One key question is what factors have driven its proliferation over the past few decades. While technological advancements are often considered as the primary catalyst, sociological factors – such as career trajectories and networks of acquaintances – have likely also played a significant role in shaping its expansion.Footnote 104 Investigating the sociology of OSINT could provide valuable insights into broader debates, on the motivations behind digital activism,Footnote 105 and the influence of epistemic communities in spreading security knowledge, practices, and discourses.Footnote 106
Second, and relatedly, further research is needed to explore how OSINT is reshaping the role of expertise in security affairs. The rise of OSINT has contributed to the proliferation of security actors and practices beyond the state.Footnote 107 While this proliferation does not render the state obsolete, it challenges public authorities to adapt their roles to harness external capabilities.Footnote 108 Notably, the increasing involvement of companies and civil society in supporting government agencies requires adaptations in oversight mechanisms to ensure that reliance on external or emerging capabilities does not create new accountability gaps.Footnote 109
The growing prominence of OSINT on social and traditional media also contributes to shaping security perceptions.Footnote 110 OSINT practitioners leverage emerging investigation techniques – often relying on striking visual evidence – to make authoritative claims about security affairs.Footnote 111 In doing so they act as ‘influencers’, actively contributing to the construction of contemporary security narratives.Footnote 112 However, these techniques are not infallible, and the information and knowledge OSINT practitioners convey can raise critical concerns. A discursive perspective could therefore examine how the rise of OSINT shapes specific understandings of security. In one notable anecdote, a senior Western intelligence official reported that a policymaker asked why they first learned about an emerging security issue from Bellingcat rather than the designated government agency.Footnote 113 This example underscores the growing authority of OSINT expertise in influencing policy perceptions, even among government officials. What, then, are the broader implications of the rise of OSINT on the security discourse? In recent years, the Western OSINT community has focused predominantly on threats posed by Russia. To what extent does this dominant OSINT narrative sideline other pressing global challenges like climate change and global health? Do alternative OSINT discourses exist beyond the Global North, and if so, how do they differ in their focus?
Third, the ethical and legal challenges posed by OSINT require further attention. Early contributions have explored the tension between the social good and potential harm caused by open-source investigations and digital activism.Footnote 114 This concern extends beyond government agencies,Footnote 115 to include private sector data brokers and consultancies whose practices often escape rigorous scrutiny,Footnote 116 as well as civil society groups and hobbyists. OSINT techniques can enable harmful practices like doxing – the intentional online publication of private information – raising serious ethical questions about their use. In one case, online sleuths were urged to use publicly available data to track rioters who attended the 6 January 2021 attack on the US capitol, leading to the misidentification and public harassment of at least one individual.Footnote 117 Both government agenciesFootnote 118 and investigative groupsFootnote 119 are working to develop norms that guide their practices and mitigate potential harm. Scholars focused on the ethics of intelligence and security have an important role to play in developing standards for the responsible use of digital fieldwork and integrating these to the broader body of knowledge on social science research methods.Footnote 120 Ultimately, further research is needed to explore how OSINT can contribute responsibly to security studies and aid efforts to govern the increasingly complex information landscape that informs and defines much of the field.
Acknowledgements
The authors would like to thank participants in the workshop they organised on ‘OSINT and the war in Ukraine’, University of Leiden, 2024. The lead author used an AI agent he trained to assist with copyediting the initial article manuscript, focusing on clarity and grammar.
Funding statement
Research for this paper is part of a project entitled ‘Open-source research and the war in Ukraine: Intelligence for the people by the people?’ (project number 406.XS.04.088) of the research programme SSH Open Competition XS pilot 2022–2023 round 4 which is (partly) financed by the Dutch Research Council (NWO).
Damien Van Puyvelde is Associate Professor and Head of the Intelligence and Security Research Group at Leiden University.
Fernando Tabarez Rienzi is Open Source Investigator at the Centre for Information Resilience.