On Putin’s “Victory Day,” A Warning To the West
SUBSCRIBER+ EXCLUSIVE REPORTING — It’s an unusually busy week in Moscow. Russian President Vladimir Putin has been inaugurated for a fifth term, the military is […] More
The democratization of intelligence is changing how espionage is done – and by whom. How can states best achieve their aims in an age of silo-spotting, open source sleuths and other “intelligence auxiliaries”?
EXPERT PERSPECTIVE — Late in the summer of 2021, researchers affiliated with the Federation of American Scientists (FAS) discovered evidence that China was upgrading its ballistic missile silo count in what they described as “the most significant expansion of the Chinese nuclear arsenal ever.” To reach this conclusion, the analysts relied on open source intelligence (OSINT) techniques, including commercial satellite imagery and unclassified knowledge about Chinese missile technology, that has become commonplace in recent years.
FAS’ research did not go unnoticed by the US government. In response to the findings, Admiral Charles Richard of USSTRATCOM used a press conference to rhetorically ask the researchers, “If you enjoy looking at commercial satellite imagery or stuff in China, can I suggest you keep looking?”
Admiral Richard’s deadpan aside, his comment raises interesting questions about the future of public-private partnerships in intelligence. What happens when sophisticated intelligence capabilities exist outside of government? What intelligence functions should only be performed by states – and which should be done by non-state actors? And most pressingly, what tools can we give leaders like Admiral Richard so that they can stop “suggesting” and start working effectively with outside groups to achieve common policy objectives?
Since Admiral Richard’s comment, we have seen yet more examples of how the “democratization of intelligence” is creating new opportunities for private sector and NGO groups to provide insight on important geopolitical questions. Today, as Russia marshals its forces to widen its existing invasion of Ukraine, OSINT practitioners are continually scanning for new troop movements, giving policymakers ways to discuss publicly what once would have been secret intelligence. More broadly, across government and the think tank world, there has been widespread recognition of the increasing sophistication of open source intelligence capabilities. Most recently, we have also seen intelligence leaders, including most prominently MI6 Chief Richard Moore, comment on the exciting possibilities of public-private partnerships founded in part on open source techniques.
But so far, we have seen few new ways of working designed to actually capture this potential. Typically, the conversation about open source centers on how government can do more – rather than on how the public sector can forge innovative partnerships. As a result, national security professionals who wish to work with a burgeoning non-state intelligence sector are often left with unclear guidance. There has been plenty of work on integrating OSINT tools into state arsenals; but less toward creating the new policies, procedures, and ways of working needed to actually leverage non-state OSINT capability.
This is a missed opportunity. The IC should articulate new ways of working that effectively leverage the activities of non-state “intelligence auxiliaries” to help achieve national priorities. Such auxiliaries, whether they are directly tasked, paid, or integrated into the IC’s structure or not, have proven that they can make vital contributions to important tasks in mission awareness and information operations.
Leveraging intelligence auxiliaries is not without risk, and should be engaged in with care and according to a transparent and understandable framework. But intelligence auxiliaries are not going away – the state’s option is not whether to engage with them, but instead how.
Intelligence Auxiliaries are not new – non-state intelligence activity has been a part of the world’s “second oldest profession” since the beginning.
Historically, the idea that non-state actors should work on the frontlines of intelligence would hardly have seemed out of place. Private individuals in ancient Rome were prolific practitioners of intelligence. European religious orders were famous collectors of intelligence – a long-standing tradition that continues today. Journalists have long been adjuncts, wittingly and unwittingly, to intelligence work – Napoleon was a famous consumer of British newspapers for information on troop movements, relying on them more than secret intelligence.
Moreover, states often collaborated with non-state intelligence gathering networks to supplement their own awareness. In the ancient Aztec empire, intelligence networks organized by merchants were often leveraged by the state. In the age of European expansion, commercial actors regularly engaged in espionage for private as well as state gain – with European commercial actors famously stealing the techniques for processing tea leaves and for making porcelain from China. The East India Company, itself a commercial actor, routinely made use of pre-existing espionage networks to inform its policy before the handover to the Crown in 1858.
For most of human history, states didn’t necessarily hold better espionage technology than did non-states – but they were still able to out-perform and effectively leverage non-state intelligence actors because, by virtue of being states, they possessed certain abilities that non-states could not hope to equal. These “enduring state characteristics” helped ensure that, even when non-states had superior information, states were still able to remain the most important players in the espionage market.
During the Cold War, states could rely on qualitatively better information than non-states. As this advantage recedes, “intelligence auxiliaries” are coming back on the scene.
The Cold War saw the technological gap between states and non-state “intelligence auxiliaries” widen. During this period of rapid advances in technology, states added a new intelligence advantage vis a vis non-states – the simple ability to reliably access and exploit information that far outclassed in quantity and type that available to non-states. As this advantage erodes in the modern day, the difference between the classified and non-classified worlds is diminishing – and with it a way of working based on information overmatch.
Access The Us is Engaging in a Strategy to Share Intelligence on Russia more broadly. Is it Worth the Risk? This is content reserved for Subscriber+ Members
Upgrade your access to Subscriber+ today
Today’s premier intelligence bureaucracies were largely formed during the “long” 20th century. This was an era when states increasingly came to enjoy privileged access to intelligence based on capabilities that non-states could not match, at least not reliably. During the long 20th century, as war and intelligence-gathering became more mechanized and technological, militaries and intelligence agencies became increasingly invested in industrial development and production as a way of securing the necessary materials to win wars. With the private sector unlikely to support the cost of expensive investments in military and intelligence technology on its own, “the role of the state [became] vital because it was the state that provided the critical financial resources required to take embryonic technologies and develop them at a speed unlikely to be matched by the civilian market.”
This sponsorship gave rise to sophisticated intelligence technologies such as computers, satellites, maritime domain awareness tools, unmanned aerial vehicles, and more. With sponsorship came control, and for most of the long 20th century states were the only entities with access to sophisticated espionage technology. Groups outside of government were largely restricted to low-grade versions of the same technology, or to classic “first generation” OSINT sources such as media and grey literature collection. While some non-state groups had significant impact on events throughout the Cold War, top-tier intelligence activities were largely restricted to states.
This state monopoly on access to top-tier information began to break down at the beginning of the 21st century. As the price of computing continued to fall, the state’s role as the principal investor in military and intelligence technology became less important. As a result, private companies increasingly took the lead in creating, and funding, technologies that transformed the practice of intelligence, such as the internet, social media, and artificial intelligence.
In place of the government monopoly on espionage technology, today there is a boisterous bazaar of information and data vendors. These companies sell a wide variety of social media intelligence tools, earth observation capabilities, large-scale information storage and processing, mobile phone location data, global HUMINT platforms, and sophisticated telemetry intelligence capabilities. This private market has changed the game. Today, with enough money and focus, a small group of dedicated individuals can leverage private sector capability to rival a well-funded intelligence agency. For example, the following capabilities are all within easy, legal reach for any government or non-governmental organization (so long as the budget is right):
This only scratches the surface of the tools available. New low and no-cost OSINT platforms are consistently replicating capabilities once held only by top-tier spy agencies – for anyone to use. From NGOs to private companies to non-state terrorist groups and hacker collectives, the increasing sophistication and scope of OSINT capabilities has meant that states no longer have reliable information overmatch vis a vis non-states.
During the Cold War, it simply wasn’t possible for, say, the Bacardi corporation to charter U2 overflights of Cuba to provide snapshots of ongoing missile deployments, or for a group of disaffected Soviet emigres to conduct large-scale online surveys on food availability in supermarkets. Today, similar groups routinely use capabilities such as the tools highlighted above to produce impactful reporting on global issues of crime, corruption, and conflict around the world.
While profit is part of the equation, for many of these organizations, a dedication to mission is a key motivation. This new generation of intelligence auxiliaries combines the mission-motivation of a non-profit with the nimble structure of a startup and the technological reach of an intelligence agency. These groups rapidly collect, analyze, and disseminate research products to audiences both inside and outside of government. Because they often work almost entirely with publicly available information (PAI), such groups frequently have more flexibility than government bodies in whom they hire, how they work, what tools they use, and how they leverage their research, giving them the ability to move faster than any state actor.
States can leverage this energy by recognizing the existence of intelligence auxiliaries aligned with their goals, and looking at how they can enable these groups. Loosely speaking, state responses to the capability of intelligence auxiliaries can be arrayed on a spectrum control, borrowed from principles of agency law. On the “loosest” end of the spectrum, states can engage in Admiral Richard’s “opportunistic enlistment” of an intelligence auxiliary. He (presumably) was not aware of FAS’ research before it was published, learned about it in the news, and was pleased that it happened to align well with his mission priorities. He chose to amplify the research through independent, uncoordinated strategic communications. The defining feature of this model is a total absence of control and coordination.
On the “tightest” side of the spectrum, states can exercise a “direct control” style tasking of auxiliaries, as one might do with a traditional defense contractor. Under this model, a state actor directly contracts with an outside organization to conduct an activity on the state’s behalf, subject to conditions which the state imposes. Different degrees of control over working methods, personnel, timelines, and requirements may be imposed by the state under this model, but its defining feature is a high degree of control over methods and tools of work.
Between these two ends of the spectrum, however, are a variety of ways of interacting with intelligence auxiliaries. These ways of working aren’t based on information overmatch, but instead on long-term, enduring capabilities that states have had throughout history. A hypothetical spectrum of options based on these “enduring state functions” might look something like this:
The above are not new ways of working – in nearly every case, there are examples of government leveraging similar models to achieve important goals. But thinking of intelligence auxiliaries and the ways of working with them together as part of a single toolkit can help clarify the operational and legal issues at play. Rather than try to be overly prescriptive with how states can engage with non-state intelligence auxiliaries, policymakers should focus on creating a playbook of workable collaboration frameworks that can be relied on by intelligence professionals at different levels in government to engage with outside organizations. Without such models, commanders are likely to improvise – which may lead to good outcomes in some cases and bad ones in others.
These are far from the only models possible – and which model is appropriate will depend on the specifics of a given situation. Just as there is no one-size fits all approach to a given intelligence question, so there will not be an appropriate universal model for collaboration between state actors and non-state intelligence auxiliaries.
Read also Open Source Intelligence and Uncovering Secrets Hidden in Plain Sight in The Cipher Brief
Ultimately, the method of interacting with an intelligence auxiliary will be situation-dependent. Should it be covert or overt? Paid or unpaid? Public or private? Short-term or long-term? Policymakers will have to negotiate these questions with reference to specific facts.
But they should not have to negotiate them without functioning models. Admiral Richard is far from the only policymaker who has identified an outside capability that he has no tools to use. We must give intelligence officials, policymakers, and commanders flexible, clear, and transparent ways of working with intelligence auxiliaries. A failure to define the rules of engagement will not deter interaction, but instead leave it less clear and more likely to lead to uncontrollable outcomes. Without clear rules, a government actor could collaborate with an intelligence auxiliary in ways that endanger civil liberties or even lives.
But doing nothing is also a strategy. Policymakers do not get to negotiate the existence of intelligence auxiliaries. Intelligence technology is likely to continue to develop outside the walls of government, and private groups will continue to leverage this technology either in pursuit of a self-defined charitable mission, or for private gain. For non-authoritarian countries with strong civil societies and robust data governance regimes, the rise of intelligence auxiliaries is likely to be a significant force-multiplier vis a vis authoritarian rivals. The question for states is not whether they engage with outside intelligence capability, but how.
Read additional expert perspectives on open source intelligence in The Cipher Brief
Read more expert-driven national security insights, perspective and analysis in The Cipher Brief
The Cipher Brief may receive a small commission for products purchased via links
Related Articles
SUBSCRIBER+ EXCLUSIVE REPORTING — It’s an unusually busy week in Moscow. Russian President Vladimir Putin has been inaugurated for a fifth term, the military is […] More
SUBSCRIBER+ EXCLUSIVE REPORTING — In late March, hunkered in his sandbag-lined compound with visiting Washington Post columnist David Ignatius, Ukrainian President Volodymyr Zelensky pleaded for […] More
SUBSCRIBER+EXCLUSIVE ANALYSIS — While top cybersecurity officials sound the alarm over intrusions by Russia, China and individual hackers into U.S. critical infrastructure, they’ve noticed another […] More
SUBSCRIBER+EXCLUSIVE REPORTING — The last Afghan head of intelligence before the 2021 Taliban takeover of Afghanistan believes terrorist groups have regained a foothold in the […] More
SUBSCRIBER+EXCLUSIVE INTERVIEW — Russia’s relentless assault on Ukraine has forced a revival of Ukraine’s domestic defense industry. Ukraine tripled defense production in 2023, the first full […] More
SUBSCRIBER+ EXCLUSIVE REPORTING — As Russia and China put on a show of force in the Arctic, security officials are voicing concerns over NATO’s readiness […] More
Search