Research Proposal Undergraduate 1,133 words Human Written

Analyzing Open Source Intelligence and Organized Crime

Last reviewed: ~6 min read Animals › Organized Crime
80% visible
Read full paper →
Paper Overview

Open Source Intelligence and Organized Crime In the words of Bell and Congram (2014), TOC-Transnational Organized Crime can be defined as a crime carried out by an enduring organization or structure created and primarily involved in pursuing profits through several illegal businesses. It shares certain traits with formal organizations: using rules and codes...

Full Paper Example 1,133 words · 80% shown · Sign up to read all

Open Source Intelligence and Organized Crime In the words of Bell and Congram (2014), TOC-Transnational Organized Crime can be defined as a crime carried out by an enduring organization or structure created and primarily involved in pursuing profits through several illegal businesses. It shares certain traits with formal organizations: using rules and codes to coordinate activities, division of labour, and allocating tasks with the aim of actualizing some given goals.

While it is appropriate to see TOC as being composed of several activities, it can be seen that some specified organized criminal activities fall into the same category. They include activities such as drug trafficking, money laundering, people smuggling, human/sex trafficking, endangered species trafficking, arms trafficking, and most significantly since the last decade, terrorism.

Structure of TOC Groups According to Bell and Congram (2014), the domestic and transnational groups that perpetrate crimes have succeeded in modifying their structures into flexible, lively though loosely structured networks, with high fluidity which have the ability to get access to important influences, created with the aim of confusing the authorities and protecting their organization. Five distinct TOC organizational structures exist: criminal network, core group, clustered hierarchy, regional hierarchy, and standard hierarchy.

However, some TOC groups do not fit into the confines of these five listed structures; nevertheless, the major frameworks (accessed through technologies) provide the needed basis to understand these structures. According to some arguments, the last three structures are believed nearest to conventional beliefs about organized crime, while the first two structures are nearest to organizations that emerge from the recent world environment.

Open Source Intelligence Intelligence can be defined as the product of data collection, processing, analysis, integration, evaluation, and proper interpretation about foreign nations or localities, equally the data and information concerning the enemy gathered by observing, investigating, analysing and understanding. Knowing something is not enough for one to be adjudged intelligent. Intelligence has to do with a creatable product; if it lacks packaging, analysis, and filtering, then it lacks value to the policy maker (Burke, 2007).

OSINT-Open Source Intelligence is the vital information extracted from systematically collecting, processing and analysing the information that is publicly available as a way of responding to the requirements for intelligence. Open Source can be defined as any individual or group of individuals that make the needed information available without expecting any sort of privacy, while information that are publicly available includes every information made freely available following a request from any individual; legally heard or seen by an observer; or provided at a public meeting (Hayes, 2010).

According to Burke (2007), OSINT can be useful to a significant extent, and has remained the only possible means of entering unknown stealthy networks. The entire process starts with OCD-open source data, the organic information from the main source, and needs to be assembled at this point through the process of editing with the aim of filtration and validation. The outcome from this is OSIF-open source information which can be circulated in the form of books, newspaper articles, radio and TV broadcasts, and online media.

Background of the Central Intelligence Agency The Central Intelligence Agency was instituted in 1947 with President Harry S. Truman signing the National Security Act. DCI- Director of Central Intelligence, was also created by the act to act as the head of the U.S. intelligence unit; play the role of the President's principal adviser on intelligence matters that relate to national security; and also serve as the head of the newly created Central Intelligence Agency. The U.S.

CIA carries out researches, development, and deploys high-leverage technology for the purpose of intelligence. As an independent agency, the CIA acts as an independent provider of evaluation on several topics of major concern and equally works hand-in-hand with all other intelligence agencies in the U.S. to make sure that the beneficiary of the intelligence reports receives the best possible intelligence (Central Intelligence Agency, 2016). The CIA's wide implementation of OSINT informed its choice as a case study in its current and former activities.

As a matter of fact, the CIA has been reported to declare that about 80% of its total intelligence is sourced from Google (Hayes, 2010). The role of the CIA is quite obvious in the battle against drugs and arms trafficking, the global war against terrorism, human trafficking and all forms of cybercrimes. According to Burke (2007), the CIA ventured into IT technology production when it created the In-Q-Tel, a non-profit private organization in 1999 to develop new IT for the benefit of national security.

In 2004 the CIA, launched what they called the CIA Wiki, and the Director of National Intelligence launched a wiki that touches every aspect of the intelligence community named Intellipedia in 2006. All these projects enable subject experts within the intelligence community to be able to edit old content and submit new ones with the aim of building a base of knowledge to be employed for the compilation of National Intelligence Estimates and national reports, with the aim of encouraging debate and producing better results.

OSINT as an Effective Solution OSINT creates awareness and context that is relevant for deeper understanding of the overall security goal. The ever-increasing interconnectedness and complexity of our world, and the reducing degree of predictability and certainty, have emphasized the relevance of long-term tactical intelligence evaluation and scanning of the horizon based on the knowledge gathered from a wide range of disciplines and sources (Pallaris, 2008). Gathering information through.

227 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
6 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Analyzing Open Source Intelligence And Organized Crime" (2016, May 20) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/analyzing-open-source-intelligence-and-organized-2155258

Always verify citation format against your institution's current style guide.

80% of this paper shown 227 words remaining