Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Analysis: Classifying open source intel?
by Shaun Waterman
Washington (UPI) Sep 16, 2008


Jennifer Sims said under the definition of classified information -- data the release of which would damage the national security of the United States -- intelligence could, and should, be classified even when the source was open, "because of the insights you derive for the decision-maker from that source."

Intelligence from open sources like the Internet is now recognized as an essential part of the work of U.S. agencies -- but one leading expert in the field says much more of it should be secret.

"Open source intelligence is widely recognized as both an essential capability and a formidable asset in our national security infrastructure," CIA Director and retired Air Force Gen. Michael Hayden told a conference in Washington Friday.

Hayden quoted the strategic plan issued this year by Director of National Intelligence Michael McConnell: "No aspect of (intelligence) collection requires greater consideration or holds more promise than open source information."

But the conference, organized by the DNI's Open Source Center, the agency based at the CIA that provides analysis of open sources for U.S. intelligence, also heard counterintuitive calls for more of its product to be classified.

Jennifer Sims, director of intelligence studies at Georgetown University, told United Press International there was another rationale for classifying intelligence reports, other than the traditional one of protecting sources and methods.

She said under the definition of classified information -- data the release of which would damage the national security of the United States -- intelligence could, and should, be classified even when the source was open, "because of the insights you derive for the decision-maker from that source."

"That requires classification because the release of it tells people what decision-makers find insightful about the open source analysis."

In other words, if it is worth knowing, it is worth preventing adversaries from knowing.

"If you don't classify" open source intelligence products, she argued, "what you're saying is that you're not providing any particular insights that matter to the competition."

Sims also cited the DNI's strategic plan, which defined the key role of the sprawling collection of U.S. agencies known as the Intelligence Community as providing "decision advantage" in a dangerous and quickly changing world.

"What's new and exciting about the use of the term 'decision advantage' is that it reminds everybody that the core business of intelligence is not gathering secrets. The core business of intelligence is providing insights for decision-makers who are engaged in life-or-death competitions, and those insights require classification wholly apart from any need to protect sources and methods."

But Sims also argues against the widely held assumption that open source intelligence gathering requires no protection of sources and methods.

All intelligence collection involves at least five elements, she explained: command and control, sensors, platforms, processing and exploitation, and finally data exfiltration.

Even in open source, she said, "You will want to classify your command and control, because you don't want people to know what your requirements are." Processing and exploitation should also be secret "at least in part �� because you want to keep your methods for deriving insights from the data away from anybody else."

Steven Aftergood, a government-transparency advocate at the Federation of American Scientists, said Sims "made the most coherent argument for open source secrecy I have heard."

But, he said, in actual fact, very few of the analyses produced by the Open Source Center fitted Sims' picture of material that conferred a vital advantage over the country's adversaries.

"Only a small minority of OSC analytical products fits that description," he told UPI. "The overwhelming bulk have no operational relevance. They are at best contextual," he added, comparing them to the research backgrounders prepared by the Congressional Research Service.

"They are not inputs into strategic decision-making."

According to Aftergood, Sims' argument was "misleading to the extent that it presented the exception as the rule."

Aftergood's conclusion was echoed by Kim Robson, the center's deputy director, who told UPI that "the vast majority of what we produce is not classified �� and doesn't have to be."

"In some cases," Robson added, OSC reports end up being classified "because of the sensitive nature" of their conclusions.

"If the information will �� reveal intentions and capabilities, then it ought to be protected in some way, even if the (underlying) information is unclassified," she explained.

But in most cases the restrictions on the circulation of OSC reports was a matter of copyright, not classification, she said.

Robson acknowledged there might be times when even unclassified information should be protected -- for instance, by being labeled as "Controlled Unclassified Information."

She gave the example of a young al-Qaida operative who was revealing operational vulnerabilities on a blog or social network site. "That could provide us with a decision advantage," she said. "Maybe we don't want to tell al-Qaida that one of their operatives is out there blogging about their vulnerabilities. So that would be something you'd want to keep in sensitive channels, even though it's unclassified."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Analysis: New measure for cybersecurity
Washington (UPI) Sep 11, 2008
A group of experts from academia, the private sector and government are putting their heads together to answer the long-nagging question: How do you measure the cost-effectiveness of cybersecurity efforts? It is an issue, they say, that dogs officials and executives, leaving them reliant on intuition and a tick-the-box approach to security measures. The 80-strong group, brought together ... read more


CYBER WARS
Science By The Light Of The Moon

Chang'e-1 Sends Back Verbal Wishes

Russian Water Detector To Ride Piggyback On U.S. Lunar Orbiter

Robot Scout Will Test New Lunar Landing Techniques For Future Explorers

CYBER WARS
NASA Selects CU-Boulder To Lead Mars Mission

More Soil Delivered To Phoenix Lab

NASA Selects MAVEN Mission To Study Mars Atmosphere

Opportunity Bids Farewell To Victoria

CYBER WARS
Building A New Rocket For The Nation

Actel Launches Flash-Based FPGAs Into Space

US astronaut promotes Mexican space agency

NASA's Ares I Rocket Passes Review To Reach Critical Milestone

CYBER WARS
Short Flight For Shenzhou 7

China To Launch Third Manned Space Flight Sep 25

Shenzhou: A Spacewalk In The Sunlight

New Crews For Shenzhou

CYBER WARS
Hurricane Ike's impact felt at International Space Station: NASA

Russia To Launch Progress M-65 Space Freighter To ISS

Russia's Progress Spacecraft Buried In Pacific Ocean

European freighter detaches from space station

CYBER WARS
New Impulse To Russian Rockets

Sea Launch Prepares For The Launch Of Galaxy 19

ATK Propulsion And Composite Technologies Key To Successful Delta II Launch

United Launch Alliance Launches GeoEye-1 Commercial Satellite

CYBER WARS
First Picture Of Likely Planet Around Sun-Like Star

VLT Instrument Hints At The Presence Of Planets In Young Gas Discs

NASA Carl Sagan Fellows To Study Extraterrestrial Worlds

Universally Speaking, Earthlings Share A Nice Neighborhood

CYBER WARS
Objectivity Database Used To Build Comprehensive Space Object Catalog

SATLYNX Introduces Innovative Media Streaming Solution At IBC 2008

UK-DMC Satellite First To Transfer Sensor Data Using Bundle Protocol

Modern Wireless Technologies Based On Decades Of Work




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement