期刊文献+

论开源情报的渊源、变革及其影响 被引量:8

On the Origin,Change and Impact of the Open Source Intelligence
下载PDF
导出
摘要 [研究目的]信息化时代,由于信息的载体形式和技术手段等方面因素的影响,传统的开源情报的地位和作用发生了巨大变化,深入研究开源情报对于理解新时代情报的变革意义重大。[研究方法]依据有关文献研究,采用定性研究方法探讨了开源情报的概念、起源发展、知识基础、技术动力和现实影响等问题。[研究结论]数据和信息作为情报的知识基础、基础来源和原始载体极大丰富,人工智能技术等信息化技术改变了传统的情报工作作业方式,开源情报价值得以提升。开源情报已经或将要在国家安全情报思想和理论、情报组织结构、情报工作机制、情报力量建设与资源配置、情报工作技术手段、反情报工作等诸多重大方面产生深刻影响。 [Research purpose]In the digital time,the open source intelligence(OSINT),which is used for a long time,is greatly changed due to the factors such as the carrier type of information and the new technology.Thus the study of OSINT has great implications for the change of intelligence in modern time.[Research method]This paper explores the issues such as the concept,the origin and development,the knowledge base,the technological stimulant,and the real impacts of OSINT based on relevant literature using the qualitative research method.[Research conclusion]This paper concludes while there are plenty of data and information which are the knowledge base,primitive source and carrier agent of intelligence,the artificial intelligence(AI)and other new information technologies are game changer for the traditional intelligence working style.In this context,the value of OSINT increases.The application of OSINT is changing or will change the conception and theory of national security intelligence,the structure of intelligence organization,the working mechanism of intelligence,the intelligence professional education and training,and the budget and technological resources allocation,and counterintelligence.
作者 梅建明 刘明辉 Mei Jianming;Liu Minghui(Shanghai University of Political Science and Law,Shanghai 201701;People's Public Security University of China, Beijing 100038)
出处 《情报杂志》 CSSCI 北大核心 2021年第12期1-7,102,共8页 Journal of Intelligence
基金 中央高校基本科研业务费重点项目“基于数据技术的恐怖活动人员、组织特征与演化模型构建研究”(编号:2021JKF216)。
关键词 情报 开源情报 人工智能 大数据 国家安全 国家安全情报 情报工作 定性研究方法 intelligence open source intelligence artificial intelligence big data national security national security intelligence intelligence work qualitative research methods
  • 相关文献

参考文献4

二级参考文献27

  • 1王飞跃.开源情报与网络时代的国家安全[J].科学新闻,2007(3):9-9. 被引量:16
  • 2梅建明.论反恐数据挖掘[J].中国人民公安大学学报(社会科学版),2007,23(2):24-29. 被引量:16
  • 3Aram Roston, Unwitting Sensors:How DoD is Exploiting Social Media[J].Defense News, 2012, (12-13).
  • 4Procedured governing the activities of DOD intelligence components that affect United States persons[EB/OL]. http://www.dtic.mil/whs/directives/corres/pdf/524001r.pdf, 1982.12.
  • 5Hamid Jahankhani.Handbook of electronic security and digital forensics[M].World Scientific Publishing Company, 2010:89-91.
  • 6Community Open Source Program Office, Community Open Source Strategic Plan[EB/OL]. http://www.oss.net/dynamaster/file_archive/040320/bc201247d9056a4f07e6f5e720be9823/OSS1997-02-34.pdf, 1995.
  • 7STEELE R D.Creating a smart nation:strategy, policy, intelligence, and information[J].Government Information Quarterly, 1996, 13:159-173.
  • 8National Commission on Terrorist Attacks.The 9.11 commission report:final report of the national commission on terrorist attacks upon the United States[M].New York:Norton & Company, Inc., 2004:413.
  • 9Intelligence reform and terrorism prevention ACT of 2004[EB/OL]. http://www.gpo.gov/fdsys/pkg/PLAW-108publ458/pdf/PLAW-108publ458.pdf, 2004.
  • 10Commission on the Intelligence Capabilities of the United States.Weapons of mass destruction:report to the president of the United States[EB/OL]. http://www.wmd.gov/report/wmd_report.pdf, 2008-12-31.

共引文献50

同被引文献76

引证文献8

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部