Revolutionizing OSINT: Future for the Australian Intelligence

Share

Background

         Data is power, the oil of the 21st century [1]; former Deputy National Security Advisor Matt Pottinger and David Feith distinguished it as “the indispensable resource that will fuel artificial intelligence, algorithms, economic strength, and national power” [2]. Democratic leaders around the globe have acknowledged that harnessed data is the principal driver for economic growth: Narendra Modi, data is the real wealth [3]; Shinzo Abe, data is a significant gap buster for an economy to move forward [4]; and Angela Merkel, “data will be the raw material of the twenty-first century,” [5].

            Similarly, leaders of autocratic countries share the same view but also sight it as a national power. For example, President Xi Jinping sees big data strategy as the core of the digital economy in the technological revolution and industrial transformation [6]. Meanwhile, Russia’s decade’s push for digital sovereignty is perceived as greater control over information, underscoring its importance in securing the country’s future and role in changing the world order [7].

           Information is power; data collection and harnessing are the most critical undertakings of powerful states today [8]. Information harvested and harnessed from big data is classified as open-source intelligence (OSINT); In an intelligence and counterintelligence journal report, described as a real-time data collection process using open or public sources [9].

Executive Summary

  • Big data is powering OSINT. Social media platforms are big data in practice, and intelligence value can be gathered and harnessed from these platforms.
  • Intelligence work is no longer government; anyone with online connectivity can gather and harness troves of information.
  • Creating a dedicated OSINT department in each of the ten Australian Intelligence Communities (IC) is a priority task to maximize capabilities and maintain a strategic intelligence advantage (defense and offense posture) both domestically and internationally over adversaries.

Key Developments and Challenges

            The last decade showed some of OSINT’s key developments impacting the standard intelligence cycle.

            Big data brings new power to OSINT. Social media is a standard of big data seen today. The uncovering of the Syrian use of cluster bombs and exposing the transfer of weapons from Iran to Syria by Eliot Higgins in 2013 from his home harnessing the enormous amount of information spread across the internet is a form of OSINT practice [10].

            Ukraine’s invasion by Russia was forewarned weeks earlier by the U.S. with high possibilities, citing intelligence sources mainly from OSINT and other sources; intelligence (OSINT) harnessed from big data sources- social media, taken and uploaded by smartphones [11].

     However, behind the prospects of these developments are challenges manifested by some states’ technological advancement and their gray activities undermining other countries.

            In 2017, China’s first civil-military cyber security innovation center was unveiled, focusing on cyber-defense systems for military use [13]. Innovation strategy of commercialized militarization translating economic and technological achievements into military power. Correspondingly, PLA is likely spending $1.6bn yearly on AI research & development (R&D) and procurement [14] as compared to Australia’s projected investment of $1.35bn for cyber capabilities over the next decade [15]. China’s innovation is a crucial challenge for the Australian IC, feeling the weight of China’s use of technology in AI R&D and application to strengthen its PLA as AI is an enabler for big data, considering the breaches made in the country’s telecommunication attributed to Chinese spies [16]. On the other hand, young Australians today, like any other growing youth in other countries, are sharing too much personal information with the TikTok entertainment platform leading to a higher risk of data exploitation. At a macro level, the Chinese government could likely use these data for espionage for influence and propaganda, Kris Mansted said [17]. Lately, Chinese link cyber attackers have mined Australian computer systems for months, seeking vital information about defense and energy [18].

See Related Article: https://thesoufancenter.org/intelbrief-2023-january-9/

            The TikTok data exploitation possibilities can be linked with other Chinese confirmed hacking activities; for instance, “four Chinese militaries were charged with hacking into Equifax stealing personal data of 145 million Americans in 2017 [19]. This Equifax data theft, including other incidents, confirms that not only is stealing innovation central but also personal information (data) is of significant value to the Chinese government. China is building a sea of big data sets for the American people to improve its artificial intelligence capabilities to predict and influence mindset and behavior. A situation that could likely happen to the Australian people. As in the case of Australian TikTok users (dominantly young population), personal data and online data history posted on the platform all contribute to a high degree of future exploitation comparably subject to influencing mindset and behavior affecting the national interest. Sensitive personal data defines a high probability of categorizing subjects prone to spy grooming/recruitment; the worst part is that these young promising Australians’ security clearance and cover are blown up already long before finishing a school degree and entering government service or the intelligence community.

Australian Restructure Response

            Covering the key developments and challenges layering OSINT, this paper views that revolutionizing OSINT is the intelligence outlook for Australia. Setting it in the intelligence structure boosts its capabilities to be fully attained in the intelligence domain. Thus, creating a dedicated OSINT department in each of the ten Australian Intel Communities is a priority task to increase strategic intelligence advantage in both domestic and international collection and harnessing of data over adversaries. ONI- OSINT will likewise coordinate and evaluate other national Intel Communities OSINT in the structure.

            The prospective task is achievable as it relates only to creating an additional department within the agency, thus not affecting the whole structure and system of the agency concerned and the national intelligence community landscape. For example, the financial allocation would use the existing approved budget allocation of the agency concerned for its first-year implementation until additional resources are supported for the second fiscal year.

            OSINT is big data harnessed, and when controlled per agency mandate, it complements other intelligence needs by the government. Protecting Australia is not seen in physical stature alone. A valued intelligence protects the country and its people by providing insights on potential threats and opportunities from enormous data pumped inside the Australian internet domain and assessing probable outcomes for proposed policy options or immediate actions. In doing so, innovating the structure within intelligence agencies to include influencing people’s mindset and work behavior based on current trends- the emergence of big data and AI is of great importance to leverage contentious countries undermining Australia’s values and interests.

by: Byron Filog Allatog

___________________________________________________

References:

[1] The Economist, “The world’s most valuable resource is no longer oil, but data,” The Economist, May 06, 2017. https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data (accessed Jan. 08, 2022).

[2] ANI, “For West, China dangerous rival rather than favourite investment destination-Report,” ANI Asian News International, Feb. 01, 2022. https://www.aninews.in/news/world/asia/for-west-china-dangerous-rival-rather-than-favourite-investment-destination-report20220201175058/ (accessed Oct. 08, 2022).

[3] ANI, “Data is real wealth: PM Modi in Davos,” Business Standard, Jan. 23, 2018. https://www.business-standard.com/article/news-ani/data-is-real-wealth-pm-modi-in-davos-118012300923_1.html (accessed Oct. 08, 2022).

[4] S. Abe, “‘Defeatism about Japan is now defeated’: Read Abe’s Davos speech in full,” World Economic Forum, Jan. 23, 2019. https://www.weforum.org/agenda/2019/01/abe-speech-transcript/ (accessed Oct. 08, 2022).

[5] C. P. Parker, “Angela Merkel at Davos: we need global cooperation, not walls,” World Economic Forum, Jan. 24, 2018. https://www.weforum.org/agenda/2018/01/angela-merkel-at-davos-we-need-global-cooperation-not-walls/ (accessed Oct. 08, 2022).

[6] C. Pan, “In his own words, China’s president outlines a vision of digital economy with 5G connectivity and data at its core,” South China Morning Post, Jan. 15, 2022. https://www.scmp.com/business/china-business/article/3163534/his-own-words-chinas-president-outlines-vision-digital (accessed Oct. 08, 2022).

[7] A. Epifanova and P. Dietrich, “Russia’s Quest for Digital Sovereignty,” DGAP German Council on Foreign Relations, Feb. 21, 2022. https://dgap.org/en/research/publications/russias-quest-digital-sovereignty (accessed Oct. 09, 2022).

[8] E. Rosenbach and K. Mansted, “The Geopolitics of Information,” Kennedy School of Government, Harvard University, 2019.

[9] G. Hribar, I. Podbregar, and T. Ivanuša, “OSINT: A ‘Grey Zone’?,” International Journal of Intelligence and CounterIntelligence, vol. 27, no. 3, pp. 529–549, Sep. 2014, doi: 10.1080/08850607.2014.900295.

[10] M. Moran, “Big data brings new power to open-source intelligence,” The Conversation, May 14, 2014. https://theconversation.com/big-data-brings-new-power-to-open-source-intelligence-26554 (accessed Oct. 09, 2022).

[11] C. Nazareth, “Technology is revolutionizing how intelligence is gathered and analyzed – and opening a window onto Russian military activity around Ukraine,” Feb. 15, 2022. https://theconversation.com/technology-is-revolutionizing-how-intelligence-is-gathered-and-analyzed-and-opening-a-window-onto-russian-military-activity-around-ukraine-176446 (accessed Oct. 08, 2022).

[12] McKinsey & Company, “Author Talks: Open season for intelligence gathering,” McKinsey & Company, Mar. 31, 2022. https://www.mckinsey.com/featured-insights/mckinsey-on-books/author-talks-open-season-for-intelligence-gathering (accessed Oct. 08, 2022).

[13] M. Nouwens and H. Legarda, “China’s pursuit of advanced dual-use technologies,” IISS, Dec. 18, 2018. https://www.iiss.org/blogs/research-paper/2018/12/emerging-technology-dominance (accessed Sep. 22, 2022).

[14] J. Harper, “China Matching Pentagon Spending on AI,” National Defense, Jan. 06, 2022. https://www.nationaldefensemagazine.org/articles/2022/1/6/china-matching-pentagon-spending-on-ai

[15] J. Macmillan, “Cybersecurity spending gets $1.35 billion boost in wake of online attacks against Australia,” ABC NEWS, Jun. 29, 2020. https://www.abc.net.au/news/2020-06-29/cyber-security-investment-link-attacks-scott-morrison/12404468 (accessed Oct. 05, 2022).

[16] J. Robertson and J. Tarabay, “Chinese Spies Accused of Using Huawei in Secret Australia Telecom Hack,” Bloomberg, Dec. 17, 2021. https://www.bloomberg.com/news/articles/2021-12-16/chinese-spies-accused-of-using-huawei-in-secret-australian-telecom-hack (accessed Oct. 09, 2022).

 [17] A. Arora, “So what if China can access your TikTok data?,” SBS News, Jul. 18, 2022. https://www.sbs.com.au/news/article/so-what-if-china-can-access-your-tiktok-data/mr1anx97k (accessed Oct. 09, 2022).

 [18] NEWS, “Chinese cyber attack on Australia exposed,” news.com.au, Aug. 30, 2022. https://www.news.com.au/technology/online/hacking/chinese-cyber-attack-on-australia-exposed/news-story/2a4e4f6a9eb301e8158c37f7632fa505 (accessed Oct. 08, 2022).

[19] J. Fruhlinger, “Equifax data breach FAQ: What happened, who was affected, what was the impact?,” CSO Australia, Feb. 13, 2020. https://www.csoonline.com/article/3444488/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html (accessed Oct. 08, 2020).

Read more

Local News