Innovation

Professionalizing Open Source Intelligence

Written by Fed Gov Today | Oct 2, 2025 11:43:00 AM

Original broadcast 10/7/25

 

Presented by Carahsoft

Open-source intelligence, or OSINT, has become one of the most critical tools in today’s intelligence environment. What was once dismissed as little more than browsing publicly available information is now recognized as a professional discipline requiring rigorous training, certification, and strategy. At the AFCEA and INSA Intelligence and National Security Summit, Dennis Eger, Senior Open Source Intelligence Advisor for the U.S. Army, described how his organization is transforming its approach to OSINT, positioning it as the “intelligence of first resort.”

Eger explained that a common misconception still lingers in parts of the intelligence community—that anyone who looks at publicly available information is practicing OSINT. That view, he argued, diminishes the complexity and tradecraft involved. “There is specific training and certification that allows you to go after this as a true intelligence discipline,” he said. For the Army, OSINT is not an add-on to other intelligence work but a foundational capability in its own right.

Over the past three years, the Army has taken significant steps to professionalize its OSINT force. Dedicated teams now conduct specialized collection across the service, and training pipelines have been formalized. But Eger stressed that training alone is not enough. Equipping analysts with the right tools, ensuring the proper dissemination of intelligence, and embedding OSINT in operational planning are equally important. “We had a discipline focused almost entirely on training three or four years ago,” he said. “We needed to change the culture and provide real capabilities to support our collectors.”

That cultural shift required a strategy. In 2022, the Army published its first OSINT strategy, charting a course through 2030. Eger believes it was the first such strategy in the intelligence community, and it has already proven transformative. The document provided clear milestones, aligning resources and priorities while driving organizational buy-in. Today, the Army has achieved roughly 80 percent of the goals outlined in the strategy—far ahead of schedule.

The strategy reflects a broader recognition within Army Intelligence that OSINT is not just complementary to other disciplines, but essential to them. By going to open sources first, analysts can access vast amounts of information quickly and cheaply. That information, in turn, can guide and synchronize more specialized intelligence collection, from signals intelligence to human intelligence. “If you went to OSINT first and got the information, you could use it to inform other disciplines,” Eger said. “It’s a culture shift inside Army Intel, and we’re still working on it, but it’s gaining traction.”

The driving force behind this change is the information environment itself. Social media, digital platforms, and open data repositories now contain an extraordinary amount of valuable information. Adversaries use the same environment to spread misinformation and disinformation, creating both opportunities and threats. “There’s a lot out here in the information space,” Eger observed. “If you can harness it and collect against it, you gain real advantage. But you have to do it professionally.”

Technology is accelerating this transformation. Five years ago, most intelligence vendors at major conferences showcased traditional collection platforms like aircraft and satellites. Today, the floor is crowded with software providers offering AI-enabled, cloud-based tools for OSINT collection and analysis. Eger noted how quickly the market has shifted to meet the demands of operating in the information domain. Agile, adaptable, and software-driven solutions are replacing the slower, hardware-heavy systems of the past.

At the same time, adversaries are exploiting the same space. State and non-state actors are leveraging OSINT to monitor U.S. activities, spread propaganda, and influence public sentiment. This makes it even more urgent for the Army to professionalize its discipline, both to harness opportunities and to counter threats. The strategy has positioned Army Intelligence to do just that, but Eger acknowledged that the work is ongoing. The next version of the OSINT strategy is already in development, aimed at building on lessons learned and setting more ambitious goals for the decade ahead.

Eger’s remarks highlight a fundamental truth about modern intelligence: the line between open and closed sources is blurring, and the ability to rapidly analyze open information often determines who gains advantage in a crisis. The Army’s embrace of OSINT as a professional discipline, guided by a clear strategy, positions it to lead the broader intelligence community in adapting to this new reality.

What was once an afterthought has become a cornerstone. The transformation of OSINT within Army Intelligence reflects not only changes in technology and the information environment, but also a cultural willingness to rethink priorities. As Eger put it, the Army is no longer treating OSINT as a secondary discipline—it is the discipline of first resort.

Key Takeaways

  • OSINT is now recognized by the Army as a professional discipline requiring tradecraft, training, and certification.

  • The Army’s 2022–2030 OSINT strategy has already delivered roughly 80 percent of its objectives, driving cultural and operational change.

  • Harnessing vast amounts of open information provides speed and breadth, informing and synchronizing other intelligence disciplines.