CSIS - Center for Strategic and International Studies Inc.

09/16/2025 | Press release | Distributed by Public on 09/16/2025 08:45

Intelligence in a Transparent World

Intelligence in a Transparent World

Photo: DigitalGlobe via Getty Images via Getty Images

Commentary by Emily Harding

Published September 16, 2025

This commentary is part of a report from the CSIS Defense and Security Department entitled War and the Modern Battlefield: Insights from Ukraine and the Middle East.

Image

War and the Modern Battlefield: Insights from Ukraine and the Middle East

Digital Report by The CSIS Defense and Security Department - September 16, 2025

"I think I may have found the people who tried to kill you." - Bellingcat researcher Christo Grozev to Russian dissident Alexey Navalny, November 20201

Shortly after the Russian Federal Security Service (FSB) attempted to poison Alexey Navalny in August 2020, Bellingcat researchers identified not only the service responsible for the heinous attack, but the individuals.2 This intelligence feat was not the result of exquisite signals intelligence (SIGINT) or a highly placed human intelligence (HUMINT) source. It resulted from the in-depth sleuthing of an independent team of open-source intelligence (OSINT) experts. Bellingcat researcher Christo Grozev used leaked telephone metadata, flight records, and Navalny's own recollections of his travel to cross-reference which Russian agents appeared to be shadowing Navalny's movements. One unfortunate agent turned on his phone on the night of the poisoning, pinging off a cell tower just north of Navalny's hotel.3

This mystery's resolution was but one of many Bellingcat exposures over the last decade. Their achievements, which include finding the agents who poisoned Sergei and Yulia Skripal, proof of Syrian chemical attacks, the Russian missile that downed MH-17, evidence of EU mistreatment of refugees, and the identities of several men who stormed the U.S. Capitol on January 6, have repeatedly proved the power of OSINT to uncover some of the same secrets as a multibillion-dollar intelligence enterprise.

Along with the data capabilities required to carry out this kind of private intelligence, industry has delivered a slew of advancements that are reshaping other parts of the spy world. Quantum computing is already changing encryption standards, and ubiquitous technical surveillance is making traditional HUMINT tradecraft dangerously obsolete.

Hiding in the sea of data was once hard but doable, but the proliferation of AI processing tools and emerging quantum decryption capability mean that intelligence services will need to either create more extreme workarounds or accept the difficulty of hiding and learn to fight in the light.

Hiding in the sea of data was once hard but doable, but the proliferation of AI processing tools and emerging quantum decryption capability mean that intelligence services will need to either create more extreme workarounds or accept the difficulty of hiding and learn to fight in the light.

These trend lines combine to form a clear hallway for the future of intelligence work-on one side is the stretching expanse of open-source data, which can provide insights or sow confusion, depending on how states use it. On the other side, hemming in the capabilities of intelligence services worldwide, is the difficulty of operating in secret. Hiding in the sea of data was once hard but doable, but the proliferation of AI processing tools and emerging quantum decryption capability mean that intelligence services will need to either create more extreme workarounds or accept the difficulty of hiding and learn to fight in the light.

In the immediate post-Cold War era, information was hard to obtain, particularly from behind the Iron Curtain. Access was rare and precious, and extraordinary measures were worthwhile to get information, including putting lives of assets and operators in grave danger. Today, the inverse is true. Information is cheap. Processing it is expensive, and sense-making is exquisite. True secrets still exist, but they are far rarer, and the cost-benefit calculation for obtaining them has shifted.

This chapter explores these trend lines, particularly the challenges and opportunities of OSINT, and the efforts intelligence agencies will need to undertake to keep up with rapid developments in new dual-use technologies. It provides background on how intelligence is changing and then discusses how wars in Ukraine and the Middle East have brought these lessons into acute relief. Finally, it lays out the implications of these trend lines for national security leaders.

Modern Intelligence: Oceans of Accessible Data and Nowhere to Hide

Intelligence is more than information; it is insight that helps policymakers avert strategic surprise. The vehicle for that advantage is largely irrelevant. Indeed, it has evolved over time in at least four previous iterations, from when George Washington was the nation's first spy master, reading other gentlemen's mail; to an era of tactical warning and denial and deception operations in two world wars; to the covert action-heavy, spy-versus-spy world of the Cold War; to the age of counterterrorism, focused on identifying and unraveling low-tech but highly deadly networks.

Today, computers and data define modern intelligence, thanks to the estimated more than 400 million terabytes of data the world produces every day.4 That sea of information makes open-source analysis easier and more impactful than ever before, but it has made traditional intelligence collection far more challenging. Just as intelligence services can use this data to find secrets, rival services can use video data and a person's "digital dust" to reveal the true identity of an officer operating under cover. Intelligence services should capitalize on the insights available from enormous amounts of publicly available data, but they also must find new ways to obtain the information that states try to keep secret.

Image

Emily Harding

Vice President, Defense and Security Department; Director, Intelligence, National Security, and Technology Program

Programs & Projects

  • Intelligence, National Security, and Technology Program
  • Defense and Security
Remote Visualization

Human operations, once the bread and butter of spy work, changed dramatically in the last two decades, thanks to a proliferation of "smart city" technologies and biometric identity data.5 Back in 2010, the Emirati intelligence services were able to quickly identify the members of a Mossad operation that assassinated a senior member of Hamas in Dubai. Using surveillance camera footage, travel records, and phone records, they identified the Mossad operatives responsible for the attack within a month.6 Today, with AI-enabled facial recognition and Chinese companies selling security systems across the globe, it is too easy to connect dots and unravel an entire intelligence operation. Starting with an image of a suspected case officer meeting with an asset, an enterprising intelligence service can track that case officer's movements across the world over the last 10 years, using AI to identify everywhere they have been seen and whom they have been seen with. In 2018, a senior technology officer at the CIA said that in many places, "the level of surveillance was so mature that local security services no longer needed to follow the agency's officers in order to know where they were."7 Biometric passports make traveling under an assumed identity far more difficult, and false identities seem paper thin with no decades-long social media history to back them up. Plus, any border guard has the ability to fact-check backstories instantly. As The Economist points out: "A spy can be instantly quizzed on their assumed identity's childhood route to school by an enterprising immigration officer using Google Maps."8

OSINT has the potential to fill at least some of the gaps left by more challenging HUMINT. A multitude of industries have decided that data is the new oil and are mining every available source to create massive, useful datasets. According to the Office of the Director of National Intelligence's (ODNI) senior advisory group on commercially available information (CAI), "CAI includes information on nearly everyone that is of a type and level of sensitivity that historically could have been obtained, if at all, only through targeted (and predicated) collection, and that could be used to cause harm to an individual's reputation, emotional well-being, or physical safety."9 Beyond information on people, governments can obtain data on the health of shipyards based on soundscapes, the movements of submarines based on sonar designed to locate fish, or the location of tanks and troops based on commercial space assets.

Critical to open-source work will be recognizing the potential pitfalls of this relatively new discipline. First, the ubiquity of data means it can be selected or manipulated to fit nearly any narrative. Second, in an era where data is power, democracies must walk a tight corridor between harvesting information and protecting the rights of citizens. Finally, for every Bellingcat exposure of nefarious action, there are likely a handful of crises averted because of exquisite, highly classified intelligence collection. OSINT should be additive to the intelligence picture, even serving as the intelligence of first resort, but it cannot fully replace clandestine collection.

Lessons from Modern Wars

Ukraine's and Israel's recent conflicts have much to teach about the power of intelligence and where the discipline is headed. The conflict in Ukraine has been revolutionary on two fronts: First, it has been a truly open-source war, with crowd-sourced intelligence work making both a tactical and a strategic difference. Publicly and commercially available data has been pivotal to widespread sharing at a high level among allies and on a tactical level between units in the field. Second, the Biden administration's decision to declassify intelligence strongly indicating that Russia was about to invade teaches twin lessons-calling out Moscow's plans did not deter Russia from invading, but it did help pre-bunk ridiculous narratives and galvanize allies to assist Kyiv in blunting the Russian offensive.

Conversely, students of the practice of intelligence will study the tragedy of October 7, 2023, for decades. As a counterpoint, they will study Israel's astonishing victory over Hezbollah in the ensuing year, in which Israel systematically dismantled the group's fighting apparatus, for the opposite reason. Israel had all the information it needed to identify and preempt the Hamas attack, but cognitive bias prevented action. With Hezbollah, on the other hand, Israel took the threat from the group seriously and created in-depth, multiyear plans to strike, with devastating results when it eventually pulled the trigger.10 The failure-success juxtaposition of Gaza and Lebanon shows that a rigid mindset trumps even the most sophisticated intelligence, but the combination of detailed intelligence work and persistent attention to a threat can devastate even a talented adversary.

Ukraine: The First Open-Source War

Ukraine is the first truly open-source war. According to General Jim Hockenhull, commander of the United Kingdom's strategic command, OSINT has been instrumental in providing Ukrainian commanders with anticipatory intelligence.11 Commercial satellite imagery, tech data, and social media helped expose Russian deployments well ahead of the February 2022 invasion. A Russian submarine commander reportedly was killed after logging his daily run on the fitness tracking platform Strava.12

Every citizen with a cellphone became a sensor, taking videos and photos of Russian troop movements. At first, they uploaded the geotagged images to social media. Then Kyiv adapted the Diaa app, originally designed to help Ukrainians access social services, to create the e-Enemy platform.13 By one estimate, 260,000 Ukrainians reported Russian locations to the app in the first month of the invasion.14 Ukraine's Security Service also welcomes reports of sightings of "suspicious" activity via a Telegram chat function called @stop_Russian_War_bot.15 Stories abound of Ukrainian commanders needing to know what was happening at a certain location, finding a business on Google Maps that was near that location, then calling to ask the proprietor to look outside and report what they saw:

"We open a Google map, see a store, see its phone number, and dial it," said Shevchuk, who described a typical conversation: "Good evening, we are from Ukraine! Do you have any Katsaps [Ukrainian slur for Russians] in the village?" "Yes." "Where?" "Behind Grandma Hanna's house." "What house does Grandma Hanna have?" "Well, everyone knows her!" "So you talk to people a little bit and realize where everything is," Shevchuk added.16

Classic honey traps have evolved for the online space. Defense Mirror reported that a Ukrainian woman used several Tinder profiles to collect information on more than 70 Russian soldiers, which she promptly passed to Ukrainian troops to help with strikes.17 Similarly, MI-6 reportedly used Grindr to find Russian troops.18

Commercially available intelligence services have been a game changer in Ukraine. Kyiv has leaned into a relationship with space technology company Maxar, which provides fairly comprehensive satellite imagery on demand. The cyber war in Ukraine was also a proving ground for cyber defense firms. As a Microsoft intelligence report said, "The first shots [in the Ukraine war] were in fact fired hours before, when the calendar still said February 23. They involved a cyberweapon called 'Foxblade' that was launched against computers in Ukraine. Reflecting the technology of our time, those among the first to observe the attack were half a world away, working in the United States in Redmond, Washington."19

The fact that commercial intelligence is available to everyone is an asset as well: Sharing across borders is simpler if there is no declassification process, no calculation about revealing sources and methods. The United States does not need to protect Maxar's secrets. The easy availability of unclassified evidence probably helped prompt the Biden administration to go public with additional intelligence that indicated Russia was planning an imminent full-scale invasion. That effort galvanized Europe to overcome its own cognitive bias-a false sense of hope that Russia would leave Ukraine alone.

Israel: High-Tech Collection and Cognitive Bias

In the run-up to October 7, Israel's high-tech intelligence collection against Hamas worked; it was only the interpretation of that information that failed. At least a year before the attack, Israeli intelligence collected a copy of Hamas's attack plan, called "Jericho Wall." The plan showed how Hamas planned to take apart automated security measures, including cameras and sensors built into perimeter fences.20 Months before the attack, a young female analyst wrote a report flagging that a Hamas day-long training exercise matched the stolen plan. Separately, Israel's red team unit, looking at largely the same information, issued four warnings that Hamas was planning for a confrontation.21 Around the same time, Egypt's intelligence service told its Israeli counterpart that "something big" was in the works.22 And the night before the attack, security services saw dozens of Israeli SIM cards activated.23

Despite all these signs, Hamas managed to send hundreds of fighters into Israel, causing at least 1,200 casualties. The "why" of this failure will haunt Israel for decades, but early analysis boils down to a mental block, in the form of anchor bias and confirmation bias.24 Humans tend to anchor their beliefs to certain information. They then use new information to "confirm" those perhaps erroneous beliefs. Unless officers work to identify and break these biases, disaster can strike even the most sophisticated intelligence service.

Israel's war on its northern border, however, was a highly effective-and lethal-combination of intelligence and warfighting. Israel pulled off a clever, tailored covert-action operation that caused more than 3,000 Hezbollah pagers to explode simultaneously, disabling the bulk of Hezbollah's fighting force and severing its communications network. Over the course of nearly 20 years, Israel had developed targeting packages against the totality of Hezbollah leadership and frontline positions. When the fight turned kinetic, the Israel Defense Forces destroyed more than 1,600 Hezbollah facilities and weapons sites. Those strikes killed four Hezbollah senior leaders, including Secretary General Hassan Nasrallah. In six weeks, Hezbollah went from the most capable terrorist group in the world to a shell of its former strength, thanks to the strength of Israeli intelligence gathering.

Both of these conflicts are instructive for an era of great power competition. China and Russia have learned lessons from the Ukraine war, including the importance of information warfare and how to capitalize on, or undermine, an engaged population serving as a network of sensors. On a larger scale, China in particular has perfected the art of staying below the threshold of antagonizing the United States while aggressively collecting its own intelligence. It also has fully committed to technological competition, pushing ahead with the next generation of technologies that will provide an immense intelligence edge.

Implications for the Future of Intelligence

The wars in Ukraine and Israel and the accelerating competition between the United States and China underscore several implications for the future of intelligence work. Information is plentiful and can be used responsibly or selectively to serve a particular viewpoint. The wars of the future will be fought in conditions of near transparency, and intelligence collection efforts will be similarly exposed to scrutiny. But just because facts are available does not mean interpreting them will be straightforward. Intelligence professionals will need to be humble about what they do not know, and they will need an extensive rolodex to find someone to help, and help quickly. The sections below explore these factors in more depth.

Dueling Facts

The oft-repeated quote "there are lies, damn lies, and statistics," popularly attributed to Mark Twain or Benjamin Disraeli, will apply in force to the modern environment featuring oceans of data. With so much available information, a person can find data to support any point of view. To use a popular example, data shows that shark attacks rise in lockstep with ice cream sales; bad data science could lead a person to assess that sharks prefer people who taste like ice cream. Intelligence assessments drawing on a seemingly endless sea of data must be rigorous in both logic and collection to avoid mistakes like mixing up correlation and causation (ice cream sales and shark attacks both go up when people spend time at the beach) or something far more serious, like deciding whether a pattern of data indicates a country is preparing for war. Decisionmakers must be discerning, work with intelligence analysts to interrogate the data, ask for confidence levels, and investigate whether contradictory evidence exists to ensure strong outcomes. Patience will also be required-solid tradecraft takes time, and the first answers are almost never the right ones. An internet sleuth could be first to the scoop-and very wrong.

AI-Enabled Insights

AI and cloud computing are empowering those in and outside government to learn more, know more, and find more. If a curious individual can ask good questions, AI can find the data and sort the results as requested. Inside intelligence services, the good questions are the easy part. The hard part is ensuring the security of the AI systems and the integrity of its answers. The even harder part is the cultural change necessary to make best use of the revolutionary technology. Fear of change is a serious friction point, and using AI as a copilot is a big change.25 The U.S. intelligence community is already incorporating AI and machine learning in processing huge amounts of video and imagery. MI-6 has reportedly used AI to summarize information and sift through the ever-growing sea of data, while China's Ministry of State Security developed an AI system capable of tracking U.S. spies and other foreign agents.26 The next frontier will be using AI to process and summarize quantities of text in a dependable way, with a system capable of showing its sources and protecting classified information in a high-side environment. An AI system that hallucinates preparations for a coup is exceedingly dangerous, but an AI system that can summarize 10 years of speeches in 10 minutes to analyze the decisionmaking style of a world leader is invaluable. As AI systems progress beyond data processing toward agentic decisionmaking, intelligence services will be able to send autonomous systems into hostile environments for long-dwell intelligence collection, with the system able to "decide" when it should emerge and report home.

From Toiling in the Shadows to Fighting in the Light

In the early days of the U.S. intelligence community, the National Security Agency (NSA) was referred to as "No Such Agency." The National Reconnaissance Office did not exist. Today, CIA has an account on X, formerly known as Twitter; its famous first post was rather tongue-in-cheek (see below).

Remote Visualization

But far less humorous intelligence issues have spilled out into the public realm. A poorly informed debate about the intelligence community's authorities under Section 702 of the Foreign Intelligence Surveillance Act took place surrounding the last two renewal battles, with privacy advocates making unfounded assertions about the intelligence community's overreaching collection and intelligence agencies largely unable to publicly explain why that information was incorrect out of an obligation to protect sources and methods. Similarly, in 2013, Edward Snowden stole an estimated 1 million pages of documents from NSA, which revealed some facts but also fed misconceptions about the checks on intelligence collection. Once again, the intelligence community was largely unable to defend itself.

There is an inherent tension between democracy and intelligence work. Democracy is synonymous with accountability, and direct accountability is impossible if most work is classified. The U.S. government and other democracies have resolved this tension with indirect accountability: robust legal checks on the power of intelligence agencies and intensive oversight by specialized committees in Congress. The Church Committee created the intelligence committees in the House and Senate for exactly this purpose-even though every American citizen cannot inquire about the activities of their intelligence agencies, their elected representatives can conduct that oversight on their behalf.

Still, the explosion of new technologies and the advent of robust open-source capabilities provide intelligence services more opportunities to step into the light. They can share more information than ever before with their own public and allied governments without fear of exposing hard-won secrets. Chances are good that the same information exists somewhere in the open-source realm, provided by a highly sensitive source or an exquisite satellite capability. Intelligence services should also do more to explain their processes to the American people, if not the outcomes of those processes. Leaders serious about preserving the power of intelligence services should work hard to explain the checks on that power.

Boldly Going into New Intelligence Domains

Intelligence has always been a team sport, but the team needs to become bigger, more fluid, and more agile.

As technical and military advancements further intertwine, intelligence officers will hustle to keep up with both traditional topics and an increasing range of nontraditional topics. Operators will chase adversaries' developments in bioengineering; quantum computing, sensing, and communications; AI; 3D printing and additive manufacturing; autonomous systems; and critical minerals mining. Further, with global supply chains and intertwined economies, societal dynamics far abroad will have impacts on U.S. national interests. In a post-Covid-19 environment, intelligence services will be asked to anticipate developments in public health, human migration, economic shocks, and other societal issues that are less secrets to steal than mysteries to unravel. Intelligence officers will need to think differently about collection and analysis, and they will especially need to reconceptualize expertise. Having deep experts on each of these topics as full-time employees will be a waste of time and resources; rather, the intelligence community will need to find people who can temporarily consult on a niche topic, like what a particular subcomponent of a quantum system might do, or how economic shocks shape human migration. Intelligence has always been a team sport, but the team needs to become bigger, more fluid, and more agile.

Conclusion

At the intersection of intelligence work, massive data creation, and tech developments like AI and quantum computing, the world of spycraft changed. In some ways, the craft got easier, because data is easy to come by, but it also got harder because new information calls for new tradecraft. Further, traditional intelligence collection became nearly impossible without extraordinary precautions. This new world is one in which intelligence services will need to "fight in the light."

AI will affect intelligence as much as it will warfare. Within five years, agentic AI will be able to task collection systems, get an answer, analyze how the new information changes the operational picture, and send updated targeting information to a weapon system, all without a human in the loop. Bias and bad data in these systems can poison the entire kill chain, so defense of data will be critical, and efforts to throw off the enemy's systems will become a priority. There is only so much classified data available for training, so manufactured data will fill the gap for many intelligence services. This is inherently dangerous-errors are magnified and natural variations in real life wash out of synthetic data. Manufactured data also provides opportunities for enterprising intelligence services to attempt to poison it. A supply chain attack on a large synthetic dataset could have widespread ramifications.

As much as a sea of available data has made warfighting far more transparent than ever before, quantum decryption could remove the last veils of secrecy. It could decrypt communications and weapons telemetry in real time, giving a technologically advanced state a critical edge in battlefield awareness.

Lines between intelligence agencies, academia, and industry may become increasingly blurry. Because so many of these technological advancements are exquisite and outside the realm of the knowledge of a generalist, intelligence services will need to develop close ties to a range of experts in order to understand new developments-in particular, to understand their significance. For authoritarian regimes, quick conscription and threats of retaliation for lack of cooperation come easy. Democracies, on the other hand, need to communicate the importance of collaboration and recruit a team. Similarly, alliances will prove even more valuable. The chances of one intelligence service having the right expert on hand is smaller than the chance of, say, someone in the Five Eyes having a PhD in the right aspect of synthetic biology. This closer cooperation with allies, along with a proliferation of private sector "intelligence" organizations, could open the aperture of targets in a conflict. Russia is already making extensive use of groups like Wagner for information gathering and operations. China views businesses as a useful extension of state power when asked to serve. Both are likely to view U.S. businesses as legitimate targets in a conflict, under certain circumstances.27

Finally, OSINT is the genie that cannot go back in the bottle. Nations can effectively opt out of OSINT, bypassing the challenges of grappling with an ocean of data. But they do so at their peril. In a conflict, it is impossible to know which piece of information-which intelligence insight-will open an opportunity or provide crucial warning, and nations that are behind in OSINT risk willful blindness.

Imagine that the investigation described at the beginning of the chapter is happening five years hence. The Bellingcat researcher has at their fingertips a powerful computer and an AI assistant. The assassin is far less able to hide his digital dust-his biometric passport pings off two airports, and a near-continuous train of security cameras in transit stations, on streets, in shops, and in taxis can easily piece together his movements. The would-be victim has a bioengineered compound in his pocket: a bio agent designed to change color when exposed to poison. As he drips his tea on the compound, it turned a shocking shade of blue. He takes a photo, posts it on social media, and calls on all the internet sleuths to "find the assassin-he must be nearby!" Our researcher would have reams of data to draw on, the computing power to sort through it, and the ability to call the local authorities before the assassin could leave the city.

Intelligence professionals should embrace the technology, the sleuths, and the speed. They should continue to lead the world in intelligence tradecraft, and a big part of that tradecraft training should be ethics, civics, and a mandate to lean into cooperation.

Please consult the PDFfor references.

Emily Harding is director of the Intelligence, National Security, and Technology Program and vice president of the Defense and Security Department at the Center for International and Security Studies in Washington, D.C.

Commentary is produced by the Center for Strategic and International Studies (CSIS), a private, tax-exempt institution focusing on international public policy issues. Its research is nonpartisan and nonproprietary. CSIS does not take specific policy positions. Accordingly, all views, positions, and conclusions expressed in this publication should be understood to be solely those of the author(s).

© 2025 by the Center for Strategic and International Studies. All rights reserved.

Tags

Europe, Russia and Eurasia, Middle East, Intelligence, Transnational Threats, Defense and Security, Geopolitics and International Security, Ukraine War, Technology, and Artificial Intelligence
CSIS - Center for Strategic and International Studies Inc. published this content on September 16, 2025, and is solely responsible for the information contained herein. Distributed via Public Technologies (PUBT), unedited and unaltered, on September 16, 2025 at 14:45 UTC. If you believe the information included in the content is inaccurate or outdated and requires editing or removal, please contact us at [email protected]