An Analysis of Cyber OSINT: Dimensions, Consequences, and Countermeasures Against Ambiguous and Unknown Threats

Document Type : Original Article

Authors

1 Ph.D, Department of Political sciences, Islamic Azad University, Shahreza, Isfahan, Iran. a.dolatabadi89@gmail.com

2 Corresponding author, Ph.D., Department of Future Studies Managment, Faculty of Strategic Management, University of Superme National Defence University, Tehran, Iran. E-mail: saeedsoltaninasab@gmail.com

3 Ph.D, Department of Social sciences and Sociology, Faculty of Literature, Humanities and Social Sciences, Science and Research Branch, Islamic Azad University, Tehran, Iran. E-mail: abdolah.dolatabadi@gmail.com

Abstract

In the contemporary era, publicly available data is generated and disseminated at an accelerating rate, making Open-Source Intelligence (OSINT) one of the most critical resources for security-related information collection and analysis. Although a substantial body of research has explored the applications of OSINT, its analysis within the framework of unknown threats has received comparatively less attention. This study aims to investigate the dimensions and implications of OSINT as an unknown threat, employing a descriptive-analytical research method and relying on library research and documentary analysis. The findings indicate that OSINT encompasses three key dimensions—operational, technological, and strategic—whose interplay can facilitate the emergence of unknown threats. At the operational level, challenges related to data collection, filtering, and validation may lead to the dissemination of inaccurate information. At the technological level, while the adoption of artificial intelligence and big data has enhanced analytical capabilities, it has also enabled large-scale misuse. At the strategic level, the absence of legal frameworks and analytical expertise can distort security decision-making processes. This study concludes that OSINT represents a security paradox, functioning both as an opportunity and a threat. The primary contribution of this research lies in proposing an integrated analytical framework that demonstrates how the inherent characteristics of OSINT—including its openness, velocity, and accessibility—can transform it into a breeding ground for unknown threats. Finally, practical strategies are suggested, including the development of legal frameworks, the enhancement of validation technologies, the training of specialized human resources, and the strengthening of inter-organizational cooperation.

Keywords

Main Subjects


 سلطانی‌نسب، ابراهیم(1403). «تهدیدات ناشناخته و مدل مفهومی استراتژی‌های مقابله با آنها». تهران: فصلنامه مدیریت نگرش راهبردی، دوره 1، ش 4، 151-129.
- ARENA(2022). A Beginner’s Guide to Cognitive Warfare. The Australian National University. https://arena.gov.au/assets/2022/03/A-Beginners-Guide-to-Cognitive-Warfare
- Brantly, A. F(2016). The decision to attack: military and intelligence cyber decision-making (Vol. 5). University of Georgia Press.
- Brown, T(2019). Strategic Decision-Making in the Digital Age: The Role of OSINT. Journal of Strategic Security, 12(4), 78-95.
- Carr, J(2012). Inside cyber warfare: Mapping the cyber underworld. " O'Reilly Media, Inc.".
- Clark, R. M(2020). Intelligence Analysis: A Target-Centric Approach (6th ed.). CQ Press.
- Clark, R., & Lewis, M(2021). Foresight and Policy Support through Open-Source Intelligence. International Journal of Intelligence and CounterIntelligence, 34(2), 210-230.
- Ford, M(2023). Ukraine, participation and the smartphone at war. Political Anthropological Research on International Social Sciences (PARISS), 4(2), 219-247.
- Garcia, L., Chen, H., & Patel, K(2022). Leveraging Artificial Intelligence for Big Data Analysis in Open-Source Intelligence. Journal of Advanced Security Research, 15(3), 45-62.
- Hobbs, C., & Moran, M(2021). Open Source Intelligence in the Twenty-First Century: New Approaches and Opportunities. Palgrave Macmillan.
- Hulnick, A. S(2006). Keeping Us Safe: Secret Intelligence and Homeland Security. Praeger Security International.
- Johnson, A., & Miller, B(2020). Validation Frameworks in Modern Intelligence Systems. International Security Review, 8(1), 112-130.
- Lowenthal, M. M(2016). Intelligence: From Secrets to Policy (7th ed.). CQ Press.
- NATO(2023). NATO Open Source Intelligence Handbook (Ed. 2.0). NATO Open Source Intelligence Working Group.
- Shearer, E., & Bird, C(2023). How Open-Source Intelligence is Changing the News Landscape. Pew Research Center. https://www.pewresearch.org/journalism/2023/09/21/how-open-source-intelligence-is-changing-the-news-landscape/
- Smith, J(2018). The Principles of Data Verification in Intelligence Cycles. Security and Intelligence Journal, 4(2), 22-39.
- Rahman, M. D(2025). The Art of Open Source Intelligence (OSINT): Addressing Cybercrime, Opportunities, and Challenges. The Art of Open Source Intelligence (OSINT): Addressing Cybercrime, Opportunities, and Challenges (May 01, 2025).
- RAND Corporation(2020). The Role of Open Source Intelligence in Modern Security Environments. Research Report. https://www.rand.org/pubs/research_reports/RR2700.html
- Rollins, J(2008). Fusion centers: Issues and options for Congress (No. CRSRL34070).
- Singapore Ministry of Home Affairs(2020). Singapore's National Security Priorities.: https://www.mha.gov.sg/
US Department of Defense. (2020). *Joint Publication 2-0: Joint Intelligence*.
- Van Puyvelde, D., & Rienzi, F. T(2025). The rise of open-source intelligence. European Journal of International Security, 1-15.
- Voigt, P., & Von dem Bussche, A(2017). The eu general data protection regulation (gdpr). A practical guide, 1st ed., Cham: Springer International Publishing, 10(3152676), 10-5555.
- Wardle, C., & Derakhshan, H(2017). Information Disorder: Toward an interdisciplinary framework for research and policymaking. Council of Europe. https://rm.coe.int/information-disorder-toward-an-interdisciplinary-framework-for-researc/168076277c
Volume 3, Issue 3 - Serial Number 11
December 2025
Pages 133-168
  • Receive Date: 09 July 2025
  • Revise Date: 04 September 2025
  • Accept Date: 25 September 2025
  • First Publish Date: 22 November 2025
  • Publish Date: 22 November 2025