Imagine yourself as the manager of a classified test, making decisions about the location, participants, and purpose. But before embarking on this endeavor, the crucial question to answer is, “Why is this trip necessary?” As security professionals, we must understand the immense threats posed by foreign espionage, domestic threats, and competitors’ capabilities. However, there is a vast and often overlooked realm of intelligence collection called Open-Source Collection that demands our attention.

The Evolving Landscape of Surveillance and Security

Years ago, maintaining secrecy in testing areas allowed for unimpeded exercises, with access to the region kept under wraps until shortly before the operation. This ensured that activities remained unknown to adversaries. However, the landscape dramatically changed with the exponential increase in available data. Today, even the most carefully planned movements can be exposed through the vast amount of online information.

Bellingcat, often dubbed an “intelligence agency for the people,” utilized amateur researchers to identify the Russian unit responsible for shooting down Malaysia Airlines MH 17. By analyzing personal photographs taken by soldiers in a specific anti-aircraft unit and tracing their movements through online data, undeniable proof was obtained. This highlights the need for increased caution and strict measures, such as prohibiting personal camera devices among project participants, as it has become common knowledge that using personal cell phones on the battlefield could inadvertently reveal critical information to enemies, potentially attracting hostile attacks.

Recently, the Russians have accused the U.S. Navy, along with Norwegian collaboration, of sabotaging the pipeline that delivered Russian gas to Europe. According to their claim, highly trained divers from NATO ships planted explosives during a joint exercise, causing the sub-Baltic pipelines to explode. However, a private research team conducted an investigation that revealed a different story. By leveraging open-source data, they identified the only ships present in the area and meticulously tracked their movements during the alleged exercise period. Their findings contradicted the Russian assertions, as none of the accused NATO ships were anywhere near the pipeline locations at the time of the explosions, nor had they been in proximity before the incidents. It is crucial for us, defenders against such claims by adversaries, to be aware of their potential accusations and equipped to effectively challenge them.

Navigating the Modern Information Age

In the realm of classified projects, maintaining secrecy during our movements to, within, and from testing locations should only be deemed necessary if circumstances dictate. While this may raise eyebrows, it is crucial to question the need for secrecy. If a classified project can be seamlessly integrated into routine activities, why unnecessarily draw attention to it? A valuable lesson can be learned from the trench warfare of World War I. By diverting focus away from planned actions and relying on human nature’s curiosity towards areas of perceived action, one can minimize the need for overt secrecy.

However, the landscape has significantly changed since World War II. With the availability of aerial and space-based photographs, the detection of large tank columns and even the identification of specific units through captured cell phone activity has become a reality. Open-source information is now ubiquitous and cannot be overcome, necessitating a strategic approach to counter its impact. Advise your teams on protecting against inadvertently exposing true intentions, ensuring strict control or absence of cell phone usage. Collaboration with government counter-cyber, espionage, and security teams is vital to identify potential pitfalls and stay ahead of emerging threats. As the world evolves at an unprecedented pace, adapting to the changing environment becomes paramount to maintaining operational security. Keep current. Train your people on the newest threats. Stay alert. Stay alive.

Related News

John William Davis was commissioned an artillery officer and served as a counterintelligence officer and linguist. Thereafter he was counterintelligence officer for Space and Missile Defense Command, instructing the threat portion of the Department of the Army's Operations Security Course. Upon retirement, he wrote of his experiences in Rainy Street Stories.