The OSINT Library
On this page we collect academic and professional books, articles and papers that can be relevant or interesting to read on the (wider) topic of Open Source Intelligence. Some are already a bit older and maybe do not contain current content (anymore). Those remain on the list for historical purposes to show the development of OSINT within the intelligence studies discipline. Others may have a title in which the word OSINT does not appear, however, rest assured, all articles and books relate to the (historical) use of OSINT in some form or way.
You will also notice resources that focus more on intelligence analysis. These are added with a view to balance the predominant focus on the (technical) collection challenges as usually found in publications on OSINT.
Obviously, this page is never finished, so you may want to revisit sometimes (pro tip: use VisualPing or Versionista to monitor this page for changes). Suggestions for titles to include are welcome, especially from before the year 2000 when OSINT was still emerging and especially in languages other than English as the list (and the OSINT field) currently seems somewhat Anglocentric.
Where possible we will include a link to the original source and otherwise the articles / books are available via your (university) library or a proper search. If you really cannot find a specific article, feel free to contact me. [last updated: 15 September 2024]
- Angus-Anderson, W. (2015) ‘Authenticity and Admissibility of Social Media Website Printouts’, in Duke Law & Technology Review, Vol 14, pp 33-47.
- Akhgar, B., Bayerl, P. & F. Sampson (eds.) (2016) Open Source Intelligence Investigation: From Strategy to Implementation. Springer.
- Akın Ünver, H. (2018) Digital Open Source Intelligence and International Security: A Primer. Centre for Economics and Foreign Policy Studies.
- Appel, E. (2011). Internet Searches for Vetting, Investigations, and Open-Source Intelligence. CRC Press.
- Ashdown, N. (2022) Public Open Source Analysis and Intelligence: Practice, Terminology, and Ethical Considerations. Stanley Center for Peace and Security.
- Auger, C.P. (1998) Information Sources in Grey Literature. Fourth edition. Bowker Saur.
- Bagnall, J. (1958) ‘The Exploitation of Russian Scientific Literature for Intelligence Purposes‘, Studies in Intelligence, Vol 2(3): pp. 45-49.
- Bartlett, J. and C. Miller (2013) The State of the Art: A Literature Review of Social Media Intelligence Capabilities for Counter-Terrorism. London: Demos.
- Bayerl, P. and B. Akhar (2015) Surveillance and Falsification. Implications for Open Source Intelligence Investigations’, Communications of the ACM, vol 58(8): pp. 62-69.
- Bean, H. (2007) ‘The DNI’s Open Source Center: An Organizational Communication Perspective’, International Journal of Intelligence and CounterIntelligence, Vol. 20 (2): 240-257.
- Bean, H. (2011) No more secrets : open source information and the reshaping of U.S. intelligence. Praeger Security International.
- Bean, H. (2014) ‘The Paradox of Open Source: An Interview with Douglas J. Naquin’, in International Journal of Intelligence and CounterIntelligence, vol. 27: 42-57
- Becker, J. (1957) ‘Comparative Survey of Soviet and US Access to Published Information‘, Studies in Intelligence, Vol 1(4): pp. 35-46.
- Beek, H. van and S. Rietjens (2024) ‘Open-Source Intelligence in the Russia-Ukraine War’, in Rothman, M, L. Peperkamp and S. Rietjens (eds.) Reflections on the Russia-Ukraine War, Leiden University Press.
- Best, R. and A. Cumming (2007) Open Source Intelligence (OSINT): Issues for Congress. Congressional Research Service, Washington.
- Blancke, S. (2010) Private Intelligence : geheimdienstliche Aktivitäten nicht-staatlicher Akteure. Dissertation, Freie Universität Berlin.
- Block, L. (2021) GDPR essentials for OSINT research.
- Block, L. (2023) ‘The Long History of OSINT’, in Journal of Intelligence History
- Boerma, M (2020) Open Source Intelligence: De sleutel tot een (vrijwel) ongelimiteerde bron van informatie. Scriptie, Vrije Universiteit, Amsterdam.
- Böhm, I. and S. Lolagar (2021) ‘Open source intelligence. Introduction, legal, and ethical considerations‘, in International Cybersecurity Law Review, 2:317–337.
- Brennan, S., S. Coulthart, and B. Nussbaum (2023) “The Brave New World of Third Party Location Data.” in Journal of Strategic Security 16 (2): 81-95. https://digitalcommons.usf.edu/jss/vol16/iss2/6
- Bureau of Intelligence and Research (2024) Open Source Intelligence Strategy. State Department, Washington D.C.
- Burke, C. (2007). Freeing knowledge, telling secrets: Open sourceintelligence and development. (Research paper series: Centre for East-West Cultural & Economic Studies; No. 13). Bond University.
- Calkins, L. (2011) ‘Patrolling the Ether: US–UK Open Source Intelligence Cooperation and the BBC’s Emergence as an Intelligence Agency, 1939–1948’, Intelligence and National Security Vol. 26(1): pp. 1–22.
- Canfield,C. T.Pedtke and J.Sawdy (1993) Open Source Activities’, in American Intelligence Journal, Vol. 14, No. 2/3 (Open Source Intelligence Special Edition), pp. 43-45.
- Carvalho de Sousa Rodrigues, P. (2019) An OSINT Approach to Automated Asset Discovery and Monitoring. Thesis, Universidade do Porto.
- CIA (1951) The role of ORR in Economic Intelligence. Central Intelligence Agency, Office of Research and Reports.
- Colquhoun, C. (2016) A Brief History of Open Source Intelligence. Bellingcat.
- Commissie van Toezicht op de Inlichtingen en Veiligheidsdiensten (2022) Automated OSINT: Tools en bronnen voor openbronnenonderzoek. CTIVD rapport 74.
- Croom, H. (1969) ‘The Exploitation of Foreign Open Sources’, Studies in Intelligence (Summer 1969-declassified article): 129–30.
- Crowder, Nicholas (2015) OSINT Glossary – Guide to keywords, phrases for improved internet search results – Volume I. Crowder Publications.
- Crowe, J. and T. Davidson (2008) ‘The „Grey” Intersection of Open Source Information and Intelligence’, Tenth International Conference on Grey Literature: Designing the Grey Grid for Information Society, 8-9 December 2008, Amsterdam.
- Cuijpers, C. (2013) ‘Legal aspects of open source intelligence’, The computer law and security report, Vol. 29(6): pp.642-653.
- Davitch, J.M. (2017) ‘Open Sources for the Information Age’, Joint Force Quarterly, Vol. 87(4): pp. 18-25.
- Dedijer, S. (1992). Open Sources Solutions, Intelligence and Secrecy, Open Source Solutions Symposium, December, 1-3, Washington, D.C.
- Department of Justice Cybersecurity Unit (2020) Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources. Washington, Computer Crime & Intellectual Property Section Criminal Division U.S. Department of Justice.
- Director of National Intelligence (2006) National Open Source Enterprise, Intelligence Community Directive 301.
- Director of National Intelligence (2015) Analytic Standards, Intelligence Community Directive 203.
- Dokman, T. and T. Ivanjko (2019) ‘Open Source Intelligence (OSINT) Issues and Trends‘, Review paper in 7th International ConferenceThe Future of Information Sciences INFuture2019: Knowledge in the Digital Age.
- Donnelley, M. (1995) Open Source Intelligence in the Information Age: Opportunities and Challenges. Thesis, Georgetown University.
- Donovan, W. (1946) ‘Intelligence’, in Life Magazine, 30 September 1946, page 108-121.
- Dover, R. (2020) ‘SOCMINT: A Shifting Balance of Opportunity’, in Intelligence and National Security 35, no. 2 (2020): 216-232.
- Dubberley, S., A. Koenig and D. Murray (eds) (2019) Digital Witness: Using Open Source Information for Human Rights Investigation, Documentation, and Accountability. Oxford Public International Law.
- Eijkman, Q. & D. Weggemans (2012) ‘Open source intelligence and privacy dilemma’s: it is time to reassess state accountability?’, in Security and Human Rights, 4, pp. 285-296.
- Eldridge, C., C. Hobbs & M. Moran (2018) ‘Fusing algorithms and analysts: open-source intelligence in the age of ‘Big Data’, Intelligence and National Security, 33(3): pp. 391-406.
- European Open Source Intelligence Organisations Observatory (2023) Guidelines for Public Interest OSINT Investigations. Available at: https://obsint.eu/wp-content/uploads/2023/04/Guidelines-for-Open-Source-Intelligence-Organisations.pdf
- Evangelista, J. R. G., Sassi, R. J., Romero, M., & Napolitano, D. (2020) ‘Systematic Literature Review to Investigate the Application of Open Source Intelligence (OSINT) with Artificial Intelligence’, in Journal of Applied Security Research, 16(3), 345–369.
- Fanch, F. (2019) De la prédiction à la détection d’événements : l’analyse des mégadonnées au service du renseignement de sources ouvertes. Thèse de doctorat, Université de Lille.
- Fernandez, M., A. Millington, M. Monday and E. Sarpa (2019) Elementary… the Art and Science of Finding Information. BookLocker: St. Petersburg, USA.
- Flamer, N. (2023). ‘The enemy teaches us how to operate’: Palestinian Hamas use of open source intelligence (OSINT) inits intelligence warfare against Israel (1987-2012). Intelligence and National Security, 0(0), 1–18. https://doi.org/10.1080/02684527.2023.2212556
- Fressin, T. (2021) ‘Apports, enjeux et défis du renseignement d’origine sources ouvertes‘, in Revue Défense Nationale n° 842, pp. 72-77.
- Fuhlhage, M. (2019) Yankee Reporters and Southern Secrets. Journalism, Open Source Intelligence and the coming of the Civil War. Peter Lang: New York, USA.
- Ghoshal, S. (1983). Corporate Intelligence Gathering – Scanning for International Business Information Thesis, Massachusetts Institute of Technology.
- Gibson, S. (2004) ‘Open source intelligence. An Intelligence Lifeline‘, The RUSI Journal, 149(1): 16-22.
- Gibson, s. (2007) Open source intelligence (OSINT): a contemporary intelligence lifeline. PhD Thesis, Cranfield University.
- Glassman, M. and M. Ju Kang (2011) ‘Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT)’, Computers in Human Behaviour Vol. 28: pp. 673–682.
- Green, D. (1993) Monitoring Technology Proliferation. An open source methodology for generating proliferation technology. Thesis Naval Postgraduate School, Monterey, CA.
- Gonçalves Evangelista, J., R. Sassi, M. Romero and D. Napolitano (2020) ‘Systematic Literature Review to Investigate the Application of Open Source Intelligence (OSINT) with Artificial Intelligence’, Journal of Applied Security Research.
- Gradecki, J. and D. Curry (2017) ‘Crowd-Sourced Intelligence Agency: Prototyping countersurveillance’, in Big Data & Society, January-June 2017, pp. 1-7.
- Hamilton, R. (2018). User-Generated Evidence. The Columbia Journal of Transnational Law 57(1), pp. 1-61.
- Harper, M. (1961) ‘A New Profession to Aid Management’, Journal of Marketing, Vol. 25 (3): pp. 1-6.
- Hastedt, G. (2009) ‘Intelligence Estimates: NIEs vs. the Open Press in the 1958 China Strait Crisis’, in International Journal of Intelligence and CounterIntelligence, Vol. 23(1): 104–132.
- Hatfield, J.M. (2023) ‘There is No Such Thing as Open Source Intelligence’, in International Journal of Intelligence and CounterIntelligence.
- Hauter, J. (2022) A digital open source investigation of how war begins: Ukraine’s Donbas in 2014. Doctoral thesis, University College London.
- Hayes, D. and F. Cappa (2018) ‘Open-source intelligence for risk assessment’, Business Horizons, Vol. 61(5): pp. 689-697.
- Heuer, R. (2006) The Psychology of Intelligence Analysis.
- Hiatt, K. (2016). Open Source Evidence on Trial. The Yale Law Journal Forum.
- Hobbs, C., M. Moran and D. Salisbury (2014) Open Source Intelligence in the Twenty-First Century. London: Palgrave Macmillan.
- Holden-Rhodes, J. (1993) ‘Unlocking the Secrets: Open Source Intelligence in the War on Drugs’, in American Intelligence Journal, Spring/Summer 1993, pp. 67-71.
- Holden-Rhodes, J. (1997) Sharing the Secrets. Open Source Intelligence and the War on Drugs. Westport: Praeger.
- Holland, B. (2012) Enabling Open Source Intelligence (OSINT) in private social networks. Thesis, Iowa State University.
- Hribar, G., Podbregar, I., & Ivanuša, T. (2014). ‘OSINT: a “grey zone”?’ International Journal of Intelligence and CounterIntelligence, Vol. 27(3): pp. 529-549.
- Hulnick, A. (2002) ‘The Downside of Open Source Intelligence’, International Journal of Intelligence and CounterIntelligence, Vol. 15, pp. 565-579.
- Hulsen, L. Ten (2020) ‘Open Source evidence from the internet – the protection of privacy in civilian criminal investigations using OSINT’, Amsterdam Law Forum, Vol. 12 (2).
- Hutchinson, R. (1993) ‘Rumor of War An Information Vendor ‘s View of the Provision of Open -Source ·Data in an Unstable World’, American Intelligence Journal, Spring/Summer 1993, pp. 33-36.
- Irwin, D. and D. Mandel (2019) ‘Improving information evaluation for intelligence production’, Intelligence and National Security, Vol. 34(4): pp. 503-525.
- Janjeva, A., A. Harris and J. Byrne (2022) The Future of Open Source Intelligence for UK National Security. Royal United Services Institute (RUSI).
- Jardines, E.A. (2015) ‘Open Source Intelligence’, in M. Lowenthal and R. Clark, The Five Disciplines of Intelligence Collection, SAGE.
- Johnson, L.M. (2013) Establishing Broadcast Monitoring as Open Source Intelligence. The BBC Monitoring Service during the Second World War. Thesis submitted for the degree of Doctor of Philosophy Department of War Studies, King’s College London.
- Joint Military Intelligence Training center (1996) Open Source Intelligence: Professional Handbook. Department of Defense.
- Ju, Y. et al. (2020) ‘Study on application of open source intelligence from social media in the military’, Journal of Physics: Conference Series 1507.
- Kelley, W. (1965) ‘Marketing Intelligence for Top Management’, The Journal of Marketing, Vol. 29(4): pp. 19-24.
- Kidd, J. (2019) ‘Secret and ethically sensitive research’, The Routledge International Handbook of Universities, Security and Intelligence Studies, pp. 265-271. London: Routledge.
- Kivimäki, V. (2023) ‘Open-source information for intelligence purposes: The challenge of disinformation’, in Arcor, R., I. Chiru and C. Ivan (eds.) Routledge handbook of disinformation and national security. New York: Routledge.
- Kpozehouen et al (2020) ‘Using Open-Source Intelligence to Detect Early Signals of COVID-19 in China: Descriptive Study‘, JMIR Public Health and Surveillance, Vol. 6(3).
- Krejci, R. (2002) Open-source intelligence in the Czech military knowledge system and process design. Thesis, Naval Postgraduate School, Monterey, California.
- Lahmann, H. (2022) ‘Ukraine, Open-Source Investigations, and the Future of International Legal Discourse.’, in American Journal of International Law 116, no. 4: 810-820.
- Landman, W. and S. Groothuis (2022) Politiewerk op het web. Een verkennend onderzoek naar online gegevensvergaring door de politie. Politie & Wetenschap 126.
- Leetaru, K. (2010) ‘The Scope of FBIS and BBC Open-Source Media Coverage, 1979–2008‘, in Studies in Intelligence Vol. 54, No. 1 (Extracts, March 2010).
- Lepaja, A. (2017) ‘Le renseignement d’origine sources ouvertes pour les opérations militaires’, Revue Défense Nationale 2017/5 (N° 800): pp. 161-166.
- Lowenthal, M. (2001) ‘OSINT: The State of the Art, the Artless State‘, in Studies in Intelligence, 45(3), 61–66.
- Marlin, T. (2019) Detecting Fake News by Combining Cybersecurity, Open-Source Intelligence, and Data Science. Thesis, Utica College.
- Maybir, J. and Chapman, B. (2021) ‘Web scraping of ecstasy user reports as a novel tool for detecting drug market trends’, in Forensic Science International: Digital Investigation, Vol 37.
- McDermott, Y. A Koenig and D. Murray (2021) ‘Open Source Information’s Blind Spot Human and Machine Bias in International Criminal Investigations‘, in Journal of International Criminal Justice Vol 19, 85–105.
- Murray, D., McDermott, Y., and Koenig, K. A. (2022) ‘Mapping the Use of Open Source Research in UN Human Rights Investigations’, in Journal of Human Rights Practice 14, no.2: 554-581.
- McGill, G. (1195) ‘OSCINT and the Private Information Sector’, in International Journal of Intelligence and CounterIntelligence, Vol. 7(4): 435–443.
- McPhedran, N. (2024) Avoiding the incrementalist trap: the case for institutionalising open source intelligence as a joint capability. Canadian Forces College.
- Mercado, S. (2001) ‘OSINT from the Airwaves: FBIS Against the Axis, 1941-1945’, Studies in Intelligence, Vol 11: pp 33-43.
- Mercado, S. (2004) ‘Sailing the Sea of OSINT in the Information Age‘, Studies in Intelligence, Vol. 48(3): pp. 45-55.
- Mercado, S. (2005) ‘Reexamining the Distinction Between Open Information and Secrets’, in Studies in Intelligence, Vol. 49(2).
- Miller, B.H. (2018). ‘Open source intelligence (OSINT): An oxymoron?’, International Journal of Intelligence and Counterintelligence, Vol. 31(4), pp. 702-719.
- Minas, H. (2010) Can the Open Source Intelligence emerge as an indispensable discipline for the Intelligence Community in the 21st Century? RIEAS Research Paper 139.
- Monaghan, R. (2019) ‘Loyalist supergrass trials: an opportunity for open source intelligence?’, Intelligence and National Security, Vol. 34(7): pp. 1014-1026.
- Murray, D., Y. McDermott and K. Alexa Koenig (2022) ‘Mapping the Use of Open Source Research in UN Human Rights Investigations‘, in Journal of Human Rights Practices, 2022, 1-28.
- Nance, M. (1994) The Generation Gap: Open-Source Information, Intelligence, and the Government. National War College.
- NATO (2002) Open Source Intelligence Handbook.
- NATO (2002) Open Source Intelligence Reader.
- NATO (2002) Intelligence Exploitation of the Internet.
- NATO (2018) ‘Communicating Uncertainty, Assessing Information Quality and Risk, and Using Structured Techniques in Intelligence Analysis’, proceedings of the SAS-114 Workshop held from 5-7 December 2016 in Copenhagen, Denmark.
- Naquin, D. (2007) Remarks by Doug Naquin. CIRA Newsletter, XXXII(4), 3–9.
- Noble, D.F. (2004) Assessing the Reliability of Open Source Information. Proceedings of the 7th International Conference on Information Fusion.
- Noël, R. (2014) Contribution à la veille stratégique : DOWSER, un système de découverte de sources Web d’intérêt opérationnel. Thèse de doctorat. Institut National des Sciences Appliquées de Rouen.
- Norman, D. (2001) How to Identify Credible Sources on the web. Thesis, Faculty of the Joint Military Intelligence College.
- Oakley, D. P. and J. Rogg (2024) ‘Spreading the “smog of war”: the impact of propaganda, social media, and OSINT on U.S. civil-intelligence relations’, in Journal of Intelligence and National Security https://doi.org/10.1080/02684527.2024.2322803
- Oerlemans, J. and S. Langenhuijzen (2024) ‘Balancing National Security and Privacy: Examining the Use of Commercially Available Information in OSINT Practices’, in International Journal of Intelligence and CounterIntelligence.
- Ogar, S. (2019) Covert Networks – A comparative study of Intelligence Techniques used by Foreign Intelligence Agencies to Weaponize Social Media. MA Thesis Johns Hopskins University, USA.
- Olcott, A. (2012) Open Source Intelligente in a Networked World.
- Omand, D., J. Bartlett and C. Miller (2012) ‘Introducing Social Media Intelligence (SOCMINT)’, Intelligence and National Security Vol. 27(6): pp. 801–823.
- Omand, D. (2020) How Spies Think: Ten Lessons in Intelligence.
- Pallaris, C. (2008) Open Source Intelligence: A Strategic Enabler of National Security. CSS Analyses in Security, Vol.3, No. 32. ETH, Zurich.
- Pastor-Galindo, J., P. Nespoli, F. Gomez Marmo, and G. Martinez Perez (2020) ‘The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends‘, IEEE Access, Vol. 8: pp. 10282-10304.
- Pedersen, T. and P. Jansen (2019) ‘Seduced by secrecy – perplexed by complexity: effects of secret vs open-source on intelligence credibility and analytic confidence’, Intelligence and National Security, Vol. 34(6): pp. 881-898
- Perito, D., C. Castelluccia, M. Kaafar and P. Manils (2011) How Unique and Traceable are Usernames? Conference paper ArXiv.
- Pherson R. and R. Heuer (2020) Structured Analytic Techniques. Sage, London.
- Politi, A. (2000) The birth of OSINT in Italy. International conference OSS 21, Information-Sharing Scenarios Panel, Washington DC.
- Pouchard, L., J. Dobson and J. Trien (2007) A Framework for the Systematic Collection of Open Source Intelligence. Oak Ridge National Laboratory.
- Pringle, Robert W. (2003) ‘The Limits of OSINT: Diagnosing the Soviet Media, 1985-1989’, International Journal of Intelligence and Counterintelligence, Vol. 16(2): pp. 280-289.
- Putter, D. and S. Henrico (2021) ‘Social media intelligence: The national security-privacy nexus‘, in Scientia Militaria, South African Journal of Military Studies, Vol. 49(2): pp. 19-44.
- Pythian M., (Ed.) (2013) Understanding the Intelligence Cycle. London: Routledge.
- Quick, D. and K. Choo (2018) ‘Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix’, Future Generation Computer Systems, Vol. 78(2): pp. 558-567.
- Rasak, M.J. (2021) ‘Event Barraging and the Death of Tactical Level Open-Source Intelligence’, in Military review, Vol.101 (1), p.48-57.
- Renault, C., P. Charon and F. Laurençon (2022) ‘Renseigner autrement ? Trajectoires de l’Osint dans les services de renseignement’, in Hérodote, n° 186.
- Reuser, A.H.P. (2017) ‘The RIS Open Source Intelligence Cycle’, Journal of Mediterranean and Balkan Intelligence, Vol. 10(2): pp. 29-44.
- Richey, M. and M. Binz (2015) ‘Open Source Collection Methods for Identifying Radical Extremists Using Social Media’, International Journal of Intelligence and CounterIntelligence, 28:2, 347-364.
- Rønn, K. and S. Søe (2019) ‘Is social media intelligence private? Privacy in public and the nature of social media intelligence’, Intelligence and National security, Vol 34(3): pp. 362-378.
- Roop, J. (1969) Foreign Broadcast Information Service. History, Part I: 1941-1947. CIA.
- Rovner, J. (2013) ‘Intelligence in the Twitter Age’, in International Journal of Intelligence and CounterIntelligence, Vol.26(2), pp.260-271.
- Sampson, F (2017) ‘Intelligent evidence: Using open source intelligence (OSINT) in criminal proceedings’, in The Police Journal: Theory, Practice and Principles, Voil 90(1), pp. 55-69.
- Saugmann, R. (2019) ‘The civilian’s visual security paradox: how open source intelligence practices create insecurity for civilians in warzones’, Intelligence and National Security, 34(3): pp. 344-361.
- Saunders, K. (2000) Open source information: A true collection discipline. Thesis, Royal Military College of Canada.
- Schaurer, F. And J. Storger (2010) The Evolution of Open Source Intelligence. International Relations and Security Network (ISN), ETH Zurich.
- Schnittker, L (1995) ‘Use of open sources in the criminal investigations branche of the Royal Canadian Mounted Police’, Fourth International Symposium Global Security and Global Competitiveness: Open Source Solutions, Washington DC.
- Senekal, B. and E. Kotzé (2019) ‘Open source intelligence (OSINT) for conflict monitoring in contemporary South Africa: Challenges and opportunities in a big data context’, African Security Review, 28:1, 19-37.
- Setzekorn, E. (2014) ‘Open Source Information and the Office of Naval Intelligence in Japan’, 1905–1920′, in International Journal of Intelligence and CounterIntelligence, vol 27(2): 368-386.
- Sibbet, D. (1993) ‘Commercial Remote -Sensing: Open Source Imagery Intelligence’, in American Intelligence Journal, Spring/Summer 1993, pp. 37-40.
- Sigurdson J. and P. Nelson (1991) ‘Intelligence Gathering and Japan: The Elusive Role of Grey Intelligence’, International Journal of Intelligence and CounterIntelligence, Vol. 5(1): pp. 17-34.
- Simmons, R.M. (1995) Open Source Intelligence: An Examination of Its Exploitation in the Defense Intelligence Community. Department of Defense, Joint Military Intelligence College, Master Thesis.
- Steele, R. (1990) ‘Intelligence in the 1990’s: Recasting National Security in a Changing World’, in American Intelligence Journal, Summer/Fall 1990, p. 29-36.
- Steele, R. (1993) ‘National Intelligence and Open Source: From School House to White House‘, American Intelligence Journal, Spring/Summer 1993, pp. 29-33.
- Steele, R. (1993) ‘A Critical Evaluation of U.S. National Intelligence’, in International Journal of Intelligence and CounterIntelligence, Vol. 6(2): 173–193.
- Steele, R. (1995) ‘Private enterprise intelligence: Its potential contribution to national security”, Intelligence and National Security, Vol. 10(4): 212-228.
- Steele, R. (1995) The Importance of Open Source Intelligence to the Military’, in International Journal of Intelligence and CounterIntelligence, vol. 8(4): 457-470.
- Steele, R. (2004) Special Operations Forces Open Source Intelligence (OSINT) Handbook. OSS International Press, Oakton.
- Steele, R. (2008) ‘The Open Source Program: Missing in Action’, International Journal of Intelligence and CounterIntelligence, 21:3, 609-619.
- Steele, R. (2009) ‘Open Source Intelligence’, in L. Johnson (ed.) Handbook of Intelligence Studies. London: Routledge.
- Störger, J (2008) ‘Die Rolle von Open Source Intelligence im Rahmen deutscher Sicherheitsinteressen.’ Master thesis Ecole nationale d’Administration, Paris, France.
- Stottlemyre, S. (2015) HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence’, in International Journal of Intelligence and CounterIntelligence, 28:3, pp 578-589.
- Studeman, W. (1993) ‘Teaching the Giant to Dance: Contradictions and Opportunities in Open Source Information within the Intelligence Community‘, American Intelligence Journal, Spring/Summer 1993, pp. 11-18.
- Townsend, R. (1993) ‘Deception and Irony: Soviet Arms and Arms Control’, in American Intelligence Journal, Spring/Summer 1993, pp. 47-53.
- Travers, M., L. van Boven and C. Judd (2013) ‘The Secrecy Heuristic: Inferring Quality from Secrecy in Foreign Policy Contexts’, Political Psychology, Vol. 35(1): 97-111.
- Trottier, D. (2015) ‘Open source intelligence, social media and law enforcement: Visions, constraints and critiques’, in European Journal of Cultural Studies, Vol 18 (4-5), pp. 530-547.
- United Nations (2020) Berkeley Protocol on Digital Open Source Investigations. A Practical Guide on the Effective Use of Digital Open Source Information in Investigating Violations of International Criminal, Human Rights and Humanitarian Law.
- U.S. Army (2006) Open Source Intelligence. Field Manual Interim No. 2-22.9. Washington, DC.
- U.S. Army (2012) ATP 2-22.9 Open-Source Intelligence. Headquarters, Department of the Army.
- U.S. Army (2013) JP 2-0 Joint Intelligence. Chiefs of Staff, United States Army.
- U.S. Department of Defence (2021) Dictionary of Military and Associated Terms. Washington, DC.
- Umphress, D. (2005) ‘Diving the Digital Dumpster: The Impact of the Internet on Collecting Open-Source Intelligence’, Air & Space Power Journal, Vol. 19 (4): pp. 82-91.
- Varzhanskyi, I. (2023) ‘Reflexive Control as a Risk Factor for Using OSINT: Insights from the Russia–Ukraine Conflict’ in International Journal of Intelligence and CounterIntelligence.
- Wallner, P. (1993) Open Sources and the Intelligence Community: Myths and Realities’, in American Intelligence Journal, Spring/Summer 1993, pp. 19-24.
- Waltz, E. (2003) Knowledge Management in the Intelligence Enterprise. Artech House.
- Watson, D. (2007) ‘Stealing corporate secrets using open source intelligence (the practitioner’s view)’, International Journal of Electronic Security and Digital Forensics (IJESDF), 1(1).
- Watson, D. (2010) ‘Open Source Intelligence’, Handbook of Electronic Security and Digital Forensics, pp. 263-277.
- Wells, D. and H. Gibson (2017) ‘OSINT from a UK perspective: considerations from the law enforcement and military domains‘, in Proceedings Estonian Academy of Security Sciences, 16 : From Research to Security Union. Estonian Academy of Security Sciences, pp. 84-113.
- Westcott, C. (2019) ‘Open source intelligence Academic research, journalism or spying?’, in The Routledge International Handbook of Universities, Security and Intelligence Studies, pp. 383-393. London: Routledge.
- Wetzling, T & C. Dietrich (2022) Disproportionate use of commercially and publicly available data: Europe’s next frontier for intelligence reform? Berlin: Stiftung Neue Verantwortung.
- Wheatley, B. (2017) British Intelligence and Hitler’s Empire in the Soviet Union 1941-1945. London: Bloomsbury Academic.
- Wheatley, B. (2018) ‘British open source intelligence (OSINT) and the Holocaust in the Soviet Union: persecution, extermination and partisan warfare’, Intelligence and National Security, Vol. 33(3): pp. 422-438.
- Williams, H. and I. Blum (2018) Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise. RAND Research report.
- Wilson, H., O. Samuel and . Plesh (2024) Open Source Investigations in the Age of Google. World Scientific.
- Wirtz J. and J. Rosenwasser (2010) ‘From Combined Arms to Combined Intelligence: Philosophy, Doctrine and Operations’, Intelligence and National Security, Vol. 25(6): pp. 725–743.
- Yates, A. and N. Zvegintzov (1999) ‘A Siberian reality check on open source information’, Aslib Proceedings, Vol. 51(6): pp. 175-186.
- Zaff, C. (2023) Automatic compilation and summarization of documented Russian equipment losses in Ukraine – A method development. Thesis Swedish Defense University.
- Zhang, Y., R. Frank, N. Warkentin and N. Zakimi (2022) ‘Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure‘, in Journal of Cybersecurity,8(1): pp. 1–15.
- Ziolkowska, A. (2018) ‘Open Source Intelligence (OSINT) as an element of Military recon’, in Security and Defence Quarterly, 19(2).
Techniques
This section contains the publications which are focussed more on collection techniques, often with an overlap into digital forensics.
- Bazzell, M. (2020) Extreme Privacy. What it takes to Disappear. (2nd edition. NB: 3rd edition coming soon, already available via Amazon US).
- Bazzell, M. (2022) Open Source Intelligence Techniques. Resources for Searching and Analysing Online Information (9th edition).
- Chauhan, S. and N. Panda (2015) Hacking Web Intelligence – Open Source Intelligence and Web Reconnaissance Concepts and Techniques. Syngress.
- Cuesta Martín, C. (2019) Fuentes de Información OSINT para la Clasificación y Selección de Perfiles sobre Repositorios. Thesis, Universidad Politécnica de Valencia.
- Hassan, N. and R. Hijazi (2018) Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence. Apress.
- Lallie, H and D. Benford (2011) ‘Challenging the Reliability of iPhone Geo-tags’, The International Journal of Forensic Computer Science, Vol. 1: pp. 59-67.
- Shamaeva, I. and Galley, D.M. (2021) Custom Search – Discover more:: A Complete Guide to Google Programmable Search Engines. Taylor & Francis Ltd.