China’s dominance in open-source intelligence

While acknowledging China’s lead in OSINT, the U.S. is taking crucial steps to improve its capabilities. Embracing innovative approaches, leveraging technology, and prioritizing active defence measures will be essential for the U.S. to secure its position in the ever-changing intelligence landscape.

The world of espionage is undergoing a quiet revolution. While cloaks and daggers still hold a certain mystique, the real game-changer lies in open-source intelligence (OSINT) and in this arena, China has emerged as a formidable player, leaving the U.S. scrambling to catch up.

For decades, China has prioritized collecting and analyzing publicly available data. This dedication is reflected in their staggering workforce of 100,000 dedicated OSINT specialists – analysts, collectors, and field operatives. This vast network gathers information on various aspects, including foreign science and technology advancements, giving China a crucial edge in its development goals.

Traditionally focused on classified information gathered through covert operations, the US intelligence community has been slow to embrace OSINT. This reluctance has been attributed to viewing OSINT as a “poor cousin” to traditional spycraft. However, the tide is slowly turning. Recognizing the gap in capabilities, the U.S. is taking steps to improve its OSINT game.

China’s commitment to OSINT is well-documented, with a dedicated workforce of 100,000 specialists gathering and analyzing publicly available information. This focus provides valuable insights into foreign advancements, including in critical infrastructure, which China aims to exploit for its strategic advantage.

Historically, the U.S. relied heavily on classified intelligence gathered through covert operations. However, recognizing the limitations of this approach, the U.S. government recently launched a counteroffensive against a pervasive Chinese hacking campaign known as the Volt Typhoon. This operation, authorized by the Department of Justice and FBI, involved remotely disabling key aspects of the Chinese hacking infrastructure.

This proactive approach reflects the Biden administration’s growing focus on cybersecurity, driven by concerns about election interference and ransomware attacks. Specifically, the Volt Typhoon targeted Western critical infrastructure, including naval ports and internet service providers, raising alarms about potential disruptions to U.S. military operations in the Indo-Pacific region.

Experts explain that China’s hacking strategy often involves compromising internet-connected devices near critical infrastructure, such as cameras or modems. These compromised devices then act as “proxies,” allowing hackers to mask their true location and launch intrusions with greater anonymity.

The U.S. government is actively seeking collaboration with the private technology sector to address these evolving threats. Recent meetings with telecommunications and cloud computing companies highlight the need for combined efforts in tracking and mitigating such sophisticated attacks.

While acknowledging China’s lead in OSINT, the U.S. is taking crucial steps to improve its capabilities. Embracing innovative approaches, leveraging technology, and prioritizing active defence measures will be essential for the U.S. to secure its position in the ever-changing intelligence landscape.