EXPERT PERSPECTIVE — As retirees of the Clandestine Service on the CIA, we labored for many years within the shadows world wide, comfy in that house the place we quietly served. Just lately, we discovered ourselves in an uncomfortable public house, compelled to be vocal on social media concerning knowledge and the necessity for the U.S. authorities to embrace commercially sourced intelligence, CSINT, as a foundational and demanding part of nationwide safety.  

Knowledge is ubiquitous, dynamic, and has the potential to tell evaluation and decision-making on points starting from local weather change to terrorism to vital nationwide infrastructure, and every part in between. CSINT is a complement to HUMINT (human intelligence) and different nationwide technical technique of assortment, not a substitute. CSINT plus these different assortment instruments is the equation for fulfillment in gaining strategic benefit. 

CSINT isn’t OSINT (open supply intelligence). Whereas OSINT is a reference to any info that may be legally gathered from free, public sources, CSINT is knowledge that’s produced by folks all through the world and is collected and bought by a wide range of corporations to others to make knowledgeable choices.  Examples of CSINT embody; pharmaceutical gross sales within the period of Covid, car telematics knowledge, geospatial insights, climate developments, and web site cookies that inform retailer methods for concentrating on shoppers for commercials primarily based on their web looking historical past. 

And sure, we see the irony of HUMINT-ers extolling the virtues of CSINT – a brand new INT. 

We’re within the midst of the fourth industrial revolution. And knowledge – that knowledge that we, as residents, generate each day – is the commodity of worth. We’d liken it to the worth of oil and oil’s function within the third industrial revolution, however oil is a finite useful resource and knowledge isn’t. The truth is, industrial knowledge is rising at an exponential charge via our each day private {and professional} interactions. Many companies leverage this knowledge to enhance their backside traces and develop their companies. Likewise, some governments are exploiting commercially sourced knowledge to realize their goals as nicely.

Take the Folks’s Republic of China (PRC) for instance. Open supply articles doc the investments the PRC continues to make to construct knowledge facilities and develop their synthetic intelligence (AI) and machine studying (ML) fashions to permit them to extra rapidly derive worth from knowledge. The PRC authorities put into place legal guidelines that require Chinese language firms, even when working exterior of China, to funnel knowledge they gather by advantage of doing enterprise, again to Chinese language knowledge facilities. A brand new legislation within the PRC additionally requires international corporations doing enterprise in China to show over their knowledge to the PRC authorities. The PRC is concurrently locking down knowledge from its residents as a defensive measure.

The PRC has a knowledge technique to aim to win supremacy within the fourth industrial revolution. The important thing elements to their technique are all kinds of commercially sourced knowledge, AI/ML fashions and computing energy that pace the time from knowledge to worth/insights. The standard of the AI/ML fashions and the pace of compute energy are vital elements of this daisy chain, however the knowledge is arguably essentially the most vital.


Cipher Temporary Subscriber+ Members obtain unique knowledgeable briefings from members of our knowledgeable community.  Upgrade to Subscriber+ today.


This paradigm doesn’t stop to exist on the gates of intelligence companies. We imagine that commercially sourced knowledge is a cornerstone to the way forward for intelligence. CSINT is the unconventional innovation that can launch intelligence companies and companies alike forward of their adversaries, leapfrogging in essence, the established order to determine a brand new order. Categorised knowledge units and data that’s clandestinely acquired, stay extraordinarily helpful and can’t be changed. CSINT doesn’t search to interchange labeled knowledge; it seeks to reinforce and complement it.

The paradigm of valuing labeled knowledge above all else is archaic and have to be modernized in an effort to adapt to the data-driven world. If the US authorities continues to worth labeled knowledge on the expense of embracing commercially sourced knowledge, we run the danger of the USA dropping floor to its adversaries. 

And that begs the query, what’s the USG’s Knowledge Technique? Whereas that’s not readily clear, what is evident is that there’s a massive function for CSINT to play.

There is no such thing as a rules-based order on the taking part in subject of the fourth industrial revolution on the subject of knowledge. In our techno-democracy, there’s a whole lot of concern round privateness – and appropriately so. This complicates the event of a nationwide knowledge technique akin to the PRC mannequin.  Whereas many grapple with how you can optimize commercially sourced knowledge and steadiness privateness issues, we might suggest that the USA and likeminded techno-democracies impose our values in defining how knowledge can be utilized sooner or later.

If we cede the taking part in subject to our adversaries to outline the principles, relaxation assured they won’t meet our democratic values. We should lean into this troublesome dialog, discover frequent trigger with our likeminded techno-democratic companions, and create a framework that balances creating worth from commercially sourced knowledge on one hand and privateness issues on the opposite.   

It’s time for the U.S. to embrace commercially sourced knowledge, modernize our legal guidelines to permit for the efficient storing and computing of knowledge, and spend money on AI and ML instruments and fashions to derive worth at scale and at pace of mission. It’s time for the U.S. to embrace CSINT.

Learn extra expert-driven nationwide safety insights, perspective and evaluation in The Cipher Brief