The Future of OSINT and the Intelligence Community with Jason Barrett
SpyCast17 Sep 2024

The Future of OSINT and the Intelligence Community with Jason Barrett

Summary Jason Barrett (LinkedIn) joins Andrew (X; LinkedIn) to discuss the integration of open-source intelligence into the American Intelligence Community. Jason is the first-ever OSINT Executive. What You’ll Learn Intelligence Historical examples of OSINT The evolution of Open Source Intelligence The challenges and unique opportunities OSINT presents The future of OSINT within the Intelligence Community Reflections Trust and transparency Efficiency in intelligence gathering And much, much more … Quotes of the Week “We're living in an age when credibility and trust is really important to build. This is an opportunity for the IC to really build that trust, I think in important ways. So, it's an area I think you will see more of us being more transparent in our work.” – Jason Barrett. Resources SURFACE SKIM *SpyCasts* U.S. Army Open-Source Intelligence (OSINT) with Dennis Eger & Shawn Nilius (2024) Cybersecurity in The White House with Camille Stewart Gloster (2024) David Petraeus on Ukraine & Intelligence with the former CIA Director & 4* General (2023) Irregular Warfare & Intelligence with IWC Director Dennis Walters (2023) DEEPER DIVE Books OSINT Techniques: Resources for Uncovering Online Information, M. Bazzell (2023) Deep Dive: Exploring the Real-world Value of Open Source Intelligence, R. L. Baker (Wiley, 2023) Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence, N. A. Hassan & R. Hijazi (Apress, 2018) Primary Sources The IC OSINT Strategy 2024-2026 (2024) DoS Open Source Intelligence Strategy (2024) Ethical Frameworks in Open-Source Intelligence (2022) Open-Source Intelligence, Department of the Army (2012) Department of Defense OSINT Instruction (2010) *Wildcard Resource* You’ve probably practiced OSINT techniques many times before – Think, Facebook stalking your old college friends to see what they’re up to. Many video games also involve the usage of open-source collection techniques: Return of the Obra Dinn (2018) is one such critically acclaimed video game. The game, set on an early 19th-century ship, challenges its player to solve the mystery of what happened to the crew onboard by piecing together scraps of information from journal entries and related documents. Learn more about your ad choices. Visit megaphone.fm/adchoices

Avsnitt(712)

The Cambridge Five

The Cambridge Five

In the 1930s, five young Cambridge University students were recruited by Soviet intelligence to penetrate the British intelligence community. In the course of their decade-long espionage career, the Five did enormous damage to Western security. British intelligence author Nigel West examines their motivations and activities, and reveals new evidence he has unearthed in Soviet intelligence archives. Learn more about your ad choices. Visit megaphone.fm/adchoices

15 Aug 200926min

Cold War Radio

Cold War Radio

Richard H. Cummings served for fifteen years as Director of Security for Radio Free Europe/Radio Liberty (RFE/RL). He reviews the propaganda activities of RFE/RL during the Cold War and describes Soviet bloc operations against the stations, including the 1978 murder of RFE scriptwriter Georgi Markov in London, and the 1981 bombing of RFE/RL headquarters in Munich by the terrorist Carlos the Jackal. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Aug 200928min

Intelligence on Pakistan

Intelligence on Pakistan

"Pakistan is the most dangerous country in the world today," asserts Bruce Riedel, a 30-year CIA veteran and currently a senior fellow at the Saban Center for Middle East Policy at the Brookings Institution. Bruce discusses the various threats emanating from Pakistan, including the rise of the Taliban, the security of the country’s nuclear weapons, the murky role of its Inter-Services Intelligence agency (ISI), and the precarious relationship with neighboring India. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Juli 200928min

Intelligence in Cyberspace

Intelligence in Cyberspace

Cyber threats, information warfare, and internet espionage are growing challenges for business companies, private individuals, and the intelligence community alike. A former CIA operations officer and current president of the cyber intelligence company Cyveillance, Dr. Terry Gudaitis discusses specific examples of cyber threats as well as techniques to counter them. Learn more about your ad choices. Visit megaphone.fm/adchoices

15 Juni 200927min

Inside the National Security Agency

Inside the National Security Agency

The National Security Agency (NSA), America’s premier cryptanalytic organization, is the largest and most secretive member of the American intelligence community. Discussing NSA’s mission, capabilities, and past exploits, former NSA Chief of Information Policy Mike Levin reveals some of the mysterious agency’s secrets. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Juni 200921min

U.S. Military Intelligence—Past and Present

U.S. Military Intelligence—Past and Present

A West Point graduate, Brian G. Shellum was U.S. Army attaché in Germany, served in the armed forces during the first Gulf War, and worked for over a decade as historian for the Defense Intelligence Agency (DIA). Today, Brian discusses the history and purpose of American military intelligence, describing the DIA and the role of the military attachés posted abroad. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Maj 200926min

U.S. Naval Intelligence in World War II

U.S. Naval Intelligence in World War II

Rear-Admiral Donald Mac Showers joined the U.S. Navy’s codebreakers at Pearl Harbor in 1942 and went on to serve three decades in the American intelligence community. Today, he talks about the contribution of codebreaking to the defeat of Japanese naval forces at Midway in 1942, and he reveals how cryptanalysts helped U.S. forces locate and kill Admiral Isoroku Yamamoto, the mastermind of the Japanese attack on Pearl Harbor. Learn more about your ad choices. Visit megaphone.fm/adchoices

14 Apr 200930min

Intelligence and Conspiracy Theories II

Intelligence and Conspiracy Theories II

During the Cold War, Soviet intelligence used disinformation to malign the United States, for example, by spreading the rumor that AIDS resulted from U.S. Army bacteriological warfare experiments. U.S. State Department Counter-Misinformation officer Todd Leventhal discusses some of the most notorious Soviet-inspired conspiracy theories and explains how the United States sought to counter them. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Apr 200930min

Populärt inom Politik & nyheter

svenska-fall
p3-krim
rss-krimstad
rss-viva-fotboll
fordomspodden
flashback-forever
rss-vad-fan-hande
aftonbladet-daily
rss-sanning-konsekvens
olyckan-inifran
dagens-eko
rss-frandfors-horna
krimmagasinet
rss-krimreportrarna
motiv
svd-dokumentara-berattelser-2
svd-nyhetsartiklar
rss-expressen-dok
blenda-2
spotlight