<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-19-065</article-id><article-id pub-id-type="doi">10.5604/01.3001.0012.1474</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>OPEN SOURCE INTELLIGENCE (OSINT) AS AN ELEMENT OF MILITARY RECON</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><name><surname>ZIÓŁKOWSKA</surname><given-names>Agata</given-names></name><degrees>MSc</degrees><email>info@aziolkowska.pl</email></contrib><aff id="aff1">Faculty of National Security War Studies University, Warsaw, Poland</aff></contrib-group><pub-date pub-type="epub"><day>30</day><month>06</month><year>2018</year></pub-date><volume>19</volume><issue>2</issue><fpage>65</fpage><lpage>77</lpage><permissions><copyright-statement>© 2018 Agata Ziółkowska, published by War Studies University, Poland</copyright-statement><copyright-year>2018</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.</license-p></license></permissions><abstract><p>One of the most basic functions of the state is to ensure the security to it and its citizens. Significant elements are: perseverance, political independence, territorial integrity and maintenance proper level of life quality. Today’s intelligence, which is part of the structures of security organs, belongs to the elite part of the special forces performing strategic goals. Therefore, acquiring the information by OSINT is important not only for the institution itself but also for citizens. OSINT is one of the means by which security is provided to the internal and external states. Open source information is one of the agents of economic, political, military, etc. Books, periodicals, statistical yearbooks, social networking sites and daily newspapers belong to the basic, verified sources. In globalized world, OSINT has particular importance because, due to the obtained information, the state can take defensive action. In this article, the author pointed out the use of OSINT in the military diagnosis.</p></abstract><kwd-group><kwd>Open Source Intelligence</kwd><kwd>Military Recon</kwd><kwd>government</kwd><kwd>special services</kwd></kwd-group></article-meta></front><body><disp-quote><p>“That, what we call an intelligence, is simply a disguised way of organising information about the surroundings by specialised institutions created for that purpose by the state.”</p><p>P. Wroński [<italic>Czas nielegałów</italic>, 2016]</p></disp-quote><sec id="S1" sec-type="intro"><title>Introduction</title><p>Due to the importance of the security of the country, each state owns and maintains designated intelligence services to collect and analyse information. All actions are secret and support the decisions of the state authorities. For security reasons, the ways in which actions, structures and effects are carried out limited in their public availability. In the 21st century, the Information Society is increasingly deepening its knowledge in the field of intelligence, with the consequence of breaking the limits and consciousness about the activities of the state, including special services. Computerisation and technological development changes the state’s security considerations and the evolution of security instruments (i.e., <italic>responsible entities for identifying threats and counteracting them</italic>). Intelligence is carried out by functional, operational and informational divisions, which perform a specific role at various stages of the information cycle, including military reconnaissance. Military identification, despite its specificity and character, is coincident with strategic intelligence, where the difference between them can be seen in the names and extended methods of collection and analysis of the information. As a secret tool for information gathering, it uses open source intelligence (OSINT), which does not disclose to the entity performing the verification and verification activities. OSINT is currently called an extra-informal form of collecting information i.e. on a military theme. In the past, during the Cold War, the importance of basic sources of information, such as books, magazines and the daily press, according to British intelligence, emphasised that “studying Soviet and daily newspapers and technical journals is very valuable as a source of intelligence and should be used at every opportunity” (<xref ref-type="bibr" rid="ref22">Więckiewicz 1974</xref>, p. 18). With the evolution and development of technology, the Internet is currently the primary source of OSINT (especially appreciated by the Federal Security Service of the Russian Federation -FSB).</p><p>Indication of the subject and purpose of the analysis of the available literature led to identification of the research problem in the form of a question: Does the use of Open Source Intelligence belong to the tools used for military reconnaissance?</p><p>The English-language nomenclature popularised the concept of Open Source Intelligence (OSINT), which includes two structured ways of acquiring and then analysing information. In this article, the open source formulation is identical to the terms “White Intelligence” and “Open Source Intelligence - OSINT”. The first formulation is used by government agencies responsible for state security, while the second is also in the private sector. In this article, the author discusses and pays special attention to the definitions of intelligence, successively referring to OSINT as a form of military intelligence, because the inseparable association of intelligence with secrecy is one of the fundamental elements that distinguishes it from freedom of expression and demerging views.</p><p>Historical traces of intelligence come from ancient Persia, Greece and Rome. The premise is that the oldest denunciation was formally written about 4,000 years ago, and was reported by the station commander to his master for mysterious light signals (<xref ref-type="bibr" rid="ref5">Faligot and Kauffer 2006</xref>, pp. 24-26). It is difficult to determine whether and to what extent the obtained data came from public sources in the past, but the message was sent to the recipient through a full conspiracy, which used various forms and methods of concealment, for example sewing them in the sandals of a messenger who did not even know what his mission was. Spartans even used encrypted messages with a device called a squid (<italic>it was a device consisting of a smooth roll and a shaft</italic>), which could be read on the stem of the apparently written text (<xref ref-type="bibr" rid="ref7">Korzeniewski and Pepłoński 2005</xref>, p.15).</p></sec><sec id="S2"><title>Intelligence and military recon</title><p>The definition of the term “intelligence” is explained according to the subjected matters and fields of study. The intelligence was defined as the knowledge that the state must have in order to ensure that the interests of the state will not be affected and the taken actions will not be doomed. This means that acquiring knowledge requires a functional organisation consisting of people and specific structures, who and which receive information products, which are made up of knowledge bases, information about current events and phenomena, and very valuable predictions and intelligence assessments (<xref ref-type="bibr" rid="ref16">Minkina 2014</xref>, p. 27). The meaning of the term “intelligence”, which refers both to the form of intelligence and recognition, is very important. That’s why the term military reconnaissance is interchangeable with the term “military intelligence” in this article.</p><p>Intelligence is an important factor in decision-making in foreign and internal policy, defence, international security, and often in the economy. Nowadays, it is very important to use properly open source information (OSINT). Much available data, after proper processing, verification and analysis, could become useful material in intelligence agencies. Therefore, public information is included in the form of military reconnaissance. Such information searches are also used by international institutions, i.e. the NATO Alliance and the European Union, which have appropriate intelligence departments (Dictionary of the NATO).</p><p>The term “military reconnaissance” of the Armed Forces in Poland is usually related to the acquisition, computation and use of information by their commanders. It has a documentary and observation character. In war intelligence methods (<italic>consisting of fighting with groupings of fighters</italic>), the boundary between tactical actions and strategic is flushed, while the goal of acquiring information is the same. The designation “intelligence information” is understood to be relevant for political and security policy purposes and for the prevention of threats. Military matters, such as military capabilities and plans for operations, have great importance. For operational activities, publicly available and published information is crucial, i.e. about diplomatic activity and political plans that can be acquired through tools such as OSINT. This category also includes information on internal, economic, social, scientific and technical policies as well as demographic issues. Despite its openness, it is in the secret services’ scope, because after proper processing and analysis, it becomes valuable information (Dictionary of NATO). At the data gathering stage in military reconnaissance, available sources of information may be collected by several people or by a group of specialists acting as linkers between the users and the forces assigned to them.</p><p>However, it is essential to have analytical skills that enable the user to process the data in relevant reconnaissance information. Once the data collection plan is completed, it is analysed in such a way that the compilation of all data is forwarded to the commander in order to promptly determine the scope of future activities (<xref ref-type="bibr" rid="ref18">Modrzejewski 2013</xref>, pp. 141-142).</p></sec><sec id="S3"><title>OSINT</title><p>The term “white intelligence” or “open source of information” is becoming more and more common. White intelligence mainly consists of acquiring information from public sources i.e. publicly available. The formulation of this term (“white intelligence”) is a Polish concept, as it usually uses the American acronym OSINT (Open Source INTelligence), which is literally translated as “open source” (<xref ref-type="bibr" rid="ref16">Minkina 2014</xref>, p. 41).</p><p>Through “white intelligence”, we can understand that intelligence activities are conducted on the basis of open and widely available sources i.e. analysis of journalism or media coverage. Often this is referred to as legal, in accordance with the Vienna Convention on Diplomatic Relations, but it is worth pointing out that in intelligence activities, even the analysis of information from open sources is not and should not be public. This is a very common method used in intelligence agencies, which mainly consists in studying and analysing officially published materials. This method, also referred to as the non-subjective, apparent or public, is based on monitoring: daily news, political, business and technical press; reports on the actions and intentions of the government or the ruling party; radio and television broadcasting; geoinformation and many other open public databases (<xref ref-type="bibr" rid="ref8">Larecki 2007</xref>, pp. 749-750).</p><p>Open Source Intelligence’s (OSINT) blatant information, is also defined as the result of performing information acquisition activities. Information is searched, compared in content, and the most relevant for the recipient identified. OSINT is also defined as information analysis from a legal, blatant source. It is distinguished by a friendly and secure form of information and public access for every citizen (<xref ref-type="bibr" rid="ref19">Mroziewicz 2007</xref>, p. 334). As the source information, it includes data and its sequence from one or more sources (<xref ref-type="bibr" rid="ref11">Liedel 2004</xref>, pp. 48-50).</p><p>Of course, the main advantage of the open source intelligence is the speed of information acquisition, including quantity, quality and transparency, variety, ease of use and low cost of analysis. This is the result of the information technology revolution and the development of the Internet. With surveillance tools, such as mobile devices and broadband connections, tracking and analysing of entities is available from anywhere in the world. Sometimes, investigative journalists report more information than intelligence services. That is why monitoring information with OSINT is very important for the activities of the special services (<xref ref-type="bibr" rid="ref9">Leetaru 2010</xref>, p. 18).</p></sec><sec id="S4"><title>Metadata as a white intelligence (OSINT)</title><p>The tasks of military reconnaissance in which OSINT serves as a solution concern the broadly understood collection of information which allow a given object to be identified, in particular to acquire geospatial data used in map creation. Image recognition uses Open Source Intelligence. Information intelligence conducted with the use of Open Source Intelligence is aimed at providing information relevant for determining the strategic directions of the activity of other countries.</p><p>On the grounds of information obtained from open sources, political decisions are made as well as threats in the external environment are monitored. Image recognition (Imagery Intelligence - IMINT) involves obtaining information using imaging tools and photos. Not only optical tools, radar, reconnaissance aircraft and lasers are used for this task, but also public programmes for every Internet user. Depicture diagnosis is undoubtedly one of the most important and the most reliable disciplines of obtaining information (<xref ref-type="bibr" rid="ref17">Minkina 2011</xref>, p. 186).</p><p>Thanks to programmes containing databases, researchers can i.a. develop geographical protection by visualising the area. Military reconnaissance focuses on information including: terrain, hydrographic networks, transport networks, land cover and the type of land. All this data is needed to develop a military strategy that often determines the success or failure of security systems. Imaging diagnosis is constantly strengthening its position among other intelligence disciplines. Unfortunately, this technology, despite the obvious advantages of facilitating intelligence work and accelerating the decision-making process, also has technical limits which hinder its effects (<xref ref-type="bibr" rid="ref2">Clark 2013</xref>, p. 195). Because of the programmes, providing maps and their analysis, you get data on: routes and determining the passability of an area, visibility analysis, recognition of targets, and, thanks to shaded military bases on the map, you can also determine their location. An extremely useful source of information in the context of military reconnaissance are websites that contain maps with current positions of troops. They accept both the form of websites and applications integrated with social networking sites.</p><p>Geoinformation as the field of geography deals with the collection, processing, transmission, acquisition, interpretation and analysis of geospatial data. Due to the fact that this data is largely free of charge, the use of geoinformation studies may be one of the most important for OSINT techniques. The basic geoinformation tool is the Geographic Information System (GIS). It is an information system used to enter, collect, process and visualise geographical data, including that which supports the decision-making process. GIS consists of geographical databases, software and hardware. The group of GIS applications are i.a. land and building registry. Another group of GIS applications includes statistical data analysis. These systems can be a helpful tool for data processing on the technical infrastructure of the area, i.e. water, gas, energy or communication lines (<xref ref-type="bibr" rid="ref10">Liedel and Serafin 2011</xref>, pp. 69-71).</p><p>In addition to the advanced tools provided by GIS, there are also many portals which provide maps and satellite images. In Polish cyberspace, the largest and most useful of these is undoubtedly the <italic>Geoportal</italic> (Geoportal.gov.pl). It allows access to many geographical databases, including agriculture, forestry, construction, state administration, activity of private entities, current and accurate spatial information, including geographical environment data, and objects and phenomena in the entire geographic space (<italic>geportal</italic>). Other useful services that give access to maps and satellite images are, among others, maps.google.pl, bing. com/maps and targeo.pl. <italic>Targeo</italic> is extremely useful for locating buildings quickly. Google Street is a useful service, especially for <italic>ad hoc</italic> operational planning. The program provides photos of streets made from the car’s perspective and the database contains most of the metropolises and cities in the world (OSGeo).</p><p>The big advantage of IMINT is that it covers a wide range of technical devices and methods of obtaining information, using photography and optics. Image data, especially from satellite systems, allows observation of large areas, including those that cannot be reached by other intelligence disciplines. The information obtained through white intelligence includes: information about the potential opponent and terrain, the ability to operate in the group over areas of interest, the recognition of large areas of interest and the high accuracy of the location of objects and their display.</p></sec><sec id="S5"><title>OSINT in military intelligence</title><p>Many institutions have for a long time appreciated the usefulness and value of information obtained from open sources, despite the fact that in the past, information from human sources (HUMINT, agents) or technical means (IMINT, SIGINT) was considered as the most valuable. Nowadays, the view has changed radically and it is appreciated that information is acquired in an open way, so that agents are not at risk of losing their health or life.</p><p>Moreover, the data set and analytical look may result in the addition of information value. Nowadays, most of the information is available online so you can easily reach it. You cannot, however, bypass open sources with limited availability. Some portals and databases belong to these. Intelligence agencies are devoting more and more resources to obtaining information from the public. Unlimited access to content and a powerful amount of data requires appropriate selection in terms of topics and needs. Therefore, this type of operation uses specialised information technology. Searching for information using OSINT requires different forms of activity, for example: intelligence services review journals and publications from different disciplines, and intelligence officers participate in scientific conferences and debates, where views on specific topics are exchanged. Proponents of obtaining information from open sources point out the unlimited possibilities of rapid and violent change in the direction of intelligence, where in comparison to human intelligence, there is no risk of personal disclosure. Thanks to the conspiratorial nature, OSINT is an effective instrument for fighting terrorism and is probably the most effective way of obtaining information about an attack (<xref ref-type="bibr" rid="ref16">Minkina 2014</xref>, pp. 191-195).</p><p>From the point of view of the intelligence services, the primary advantage that cannot be overestimated is the negligible risk of counterfeiting, so that there are no consequences for this intelligence activity. Accordingly, this method was and is most often used by Western intelligence services (<xref ref-type="bibr" rid="ref14">Mercado 2017</xref>). Another advantage is the ability to use a wide distribution of reports, which were developed using open source intelligence. Due to the fact that the procedures for the protection of classified information are omitted, there is the possibility of exchanging data between allied services, thus increasing the efficiency of intelligence work (<xref ref-type="bibr" rid="ref15">Minas 2010</xref>, pp. 34-35).</p><p>In Poland, special services do not exist as in other countries. It has separate specialist analytical teams which deal exclusively with open source intelligence. The obtained information is often verified by compiling it in secret databases or gained information by operational teams (<xref ref-type="bibr" rid="ref3">Dupont 2008</xref>, p. 26). However, it also has specialists responsible for the analysis of information derived from OSINT. The organisational model in Poland’s intelligence services is not homogenous. In individual departments, the structures responsible for obtaining information from open sources are: Foreign Intelligence Agency - Bureau of Information and Analyses (Zarządzenie Nr 74 Prezesa Rady Ministrów z dnia 26 czerwca 2002 r <italic>. w sprawie nadania statutu Agencji Wywiadu</italic> (M.P. 2011 nr 26 poz. 433), 3 § ust. 1), Internal Security Agency - Office of Records and Analysis (Office E) (Zarządzenie Nr 73 Prezesa Rady Ministrów z dnia 26 czerwca 2002 r <italic>. w sprawie nadania statutu Agencji Bezpieczeństwa Wewnętrznego</italic> (M.P. 2002 nr 26 poz. 432), 3 § ust. 1), Central Anti-Corruption Bureau - Analysis Department (Zarządzenie Prezesa Rady Ministrów z dnia 6 października 2010 r. <italic>w sprawie nadania statutu Centralnemu Biuru Antykorupcyjnemu</italic> (M.P. z 2010 r. Nr 76, poz. 953), § 3 ust. 1). In the case of military special services, i.e. Counterintelligence Service Military (SKW), tasks are currently carried out by individual boards i.e. Operational, Economic Protection of Interests of Armed Forces and Protection of Armed Forces. According to SKW executives, the implementation of Open Source Intelligence activities has made it time-consuming to implement analytical and informational activities (<xref ref-type="bibr" rid="ref6">Hoc 2012</xref>, p. 313).</p></sec><sec id="S6"><title>Information war in military recognition</title><p>Due to easier access (via the Internet and mobile telephony) to the majority of information, texts and images (practically from anywhere in the world), intelligence faces new challenges and its functionality is influenced by conditions and phenomena created in civilisation processes, i.e. development information technology, transparency of the modern world and non-state actors. Commercial media, which communicates messages globally with the use of satellite platforms, has moved some away from mainstream information. On the other hand, democratic states publish a large amount of information about their politics and about the activities undertaken. Important information officially published for the military sector is information about general supplies and stock of weapons, which are designed to reduce the probable outbreak of an unexpected war. Often, such information is not necessarily true and needs to be analysed for geopolitical reasons. By means of these measures, trust and the misperception of reality and the uncertainty of citizens are reduced (<xref ref-type="bibr" rid="ref13">Mearsheimer 1994/1995</xref>).</p><p>Global access to a large amount of information found in public sources brings with it specific consequences and problems for intelligence. Access to official forecasts and analytical reports, state publications and non-governmental organisations does not mean that military intelligence has the necessary information. Wide access to information poses the most problems for analytical divisions, because the amount of information hinders its correct assessment (<xref ref-type="bibr" rid="ref12">Lord 2007</xref>, p. 186). Military operations are notable for their highly mobile activities. Adequate acquisition, processing and transmission of information has become a challenge that significantly affects the process of command. The right decision depends on what information the commander has. Erroneous decisions are often made due to underestimating or missing information. However, those prepared in a methodically correct manner and based on reliable information are most often effective (<xref ref-type="bibr" rid="ref21">Penc 2000</xref>, p.158).</p><p>Military reconnaissance is currently perceived through the prism “information war” as a context for the information preparation of the battlefield. The task of military reconnaissance also includes conducting information fights. The essence of this informational preparation is to maximise the effects of data acquisition and to transform them in the process of analysing the information. Disinformation projects are used to disrupt and circulate information in command systems. They exert pressure on the psyche of soldiers and commanders and mask their own forces and resources. Therefore, the “credibility” of all these undertakings should be maximised, because such actions can be introduced by an opponent in error and provide an advantage. Information fight is treated not only as an electronic fight with psychological activities but also as a theoretical development of the problem of military reconnaissance with possessed forces and means operating in information spaces (<xref ref-type="bibr" rid="ref1">Ciborowski 2000</xref>).</p></sec><sec id="S7" sec-type="conclusions"><title>Conclusions</title><p>The intelligence of the armed forces is mainly driven by the information needs of the staff and the armed forces, the commanders and the defence ministry. It involves recognising air, sea and land forces, as well as potential warfare, cyberspace and space. Interest mainly concerns the defence potential of any opponent, strategies, possibilities of using the armed forces, doctrines and administration of the defence system. For military intelligence, the social support of the armed forces and their actions is important. This information can be obtained from Open Source Information (OSINT).</p><p>Mankind has learned not only the acquisition of information over the years, but also the means of intelligence and the identification of channels for secret information. Through publicly available sources without infringing on the law, all the world’s services have accessed them in recognisable ways. Often, official publications, exhibitions, advertising conferences, and ordinary people have provided missing information that complements the acquired knowledge through intelligence.</p><p>The OSINT functions properly at all levels of intelligence activities in almost every subjected area, so there are many actors that use it not only for military issues, but also in the private sector. Effective information retrieval using Open Source Intelligence has found its application at strategic, operational and tactical levels. In the age of technological development, the use of “white intelligence”/ OSINT offers many new opportunities for special services. Although the source of intelligence in Polish services is practised to a lesser degree than in the West, its potential is being increasingly recognised.</p></sec></body><back><ref-list><title>References</title><ref id="ref1"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Ciborowski</surname>, <given-names>L</given-names></string-name></person-group>., <year>2000</year>. <chapter-title><italic>Planowanie, organizowanie i prowadzenie walki informacyjnej na szczeblach taktycznych wojsk lądowych</italic></chapter-title>. <publisher-name>Warsaw</publisher-name>.</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Clark</surname>, <given-names>R.M</given-names></string-name></person-group>., <year>2013</year>. <chapter-title><italic>Intelligence Collection</italic></chapter-title>. <publisher-name>Sage</publisher-name>, <publisher-loc>Los Angeles</publisher-loc>.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Dupont</surname>, <given-names>A</given-names></string-name></person-group>., <year>2008</year>. <chapter-title>Intelligence for the Twenty-First Century</chapter-title>. In <person-group person-group-type="editor"><string-name><given-names>W.K.</given-names><surname>Wark</surname></string-name></person-group> (ed.), <source>Twenty-First Century Intelligence</source>. <publisher-name>Routledge</publisher-name>, <publisher-loc>London</publisher-loc>.</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="web">Geoportal.gov.pl [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://www.geoportal.gov.pl">http:/www.geoportal.gov.pl</ext-link> [Accessed <date-in-citation content-type="access-date">26 Mar 2018</date-in-citation>].</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Faligot</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Kauffer</surname>, <given-names>R</given-names></string-name></person-group>., <year>2006</year>. <chapter-title><italic>Służby specjalne. Historia wywiadu i kontrwywiadu na świecie</italic></chapter-title>. <publisher-loc>Iskry, Warsaw</publisher-loc>.</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Hoc</surname>, <given-names>S</given-names></string-name></person-group>., <year>2012</year>. <chapter-title>Analiza informacji kontrwywiadowczej</chapter-title>. In <person-group person-group-type="editor"><string-name><given-names>J.</given-names><surname>Konieczny</surname></string-name></person-group> (ed.), <source>Analiza informacji w służbach policyjnych i specjalnych. Wydawnictwo</source> <publisher-name>C. H. Beck</publisher-name>, <publisher-loc>Warsaw</publisher-loc>.</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Korzeniewski</surname>, <given-names>L</given-names></string-name>. and <string-name><surname>Pepłoński</surname>, <given-names>A</given-names></string-name></person-group>., <year>2005</year>. <chapter-title><italic>Wywiad gospodarczy. Historia i współczesność</italic></chapter-title>. <publisher-loc>Kraków</publisher-loc>.</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Larecki</surname>, <given-names>J</given-names></string-name></person-group>., <year>2007</year>. <chapter-title><italic>Wielki leksykon służb specjalnych świata: organizacje wywiadu, kontrwywiadu i policji politycznych świata, terminologia profesjonalna i żargon operacyjny</italic></chapter-title>. <publisher-name>Książka i Wiedza</publisher-name>, <publisher-loc>Warsaw</publisher-loc>.</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Leetaru</surname>, <given-names>K</given-names></string-name></person-group>., <year>2010</year>. <article-title>The Scope of FBIS and BBC Open-Source Media Coverage, Studies</article-title>. <source>Intelligence</source><volume>54</volume> (<issue>1</issue>).</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Liedel</surname>, <given-names>K</given-names></string-name>. and <string-name><surname>Serafin</surname>, <given-names>T</given-names></string-name></person-group>., <year>2011</year>. <chapter-title><italic>Otwarte źródła informacji w działalności wywiadowczej</italic></chapter-title>. <publisher-loc>Dyfin, Warsaw</publisher-loc>.</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Liedel</surname><given-names>K</given-names></string-name>. and <string-name><surname>Piasecka</surname><given-names>P</given-names></string-name></person-group>., <chapter-title>Współpraca międzynarodowa w zwalczaniu terroryzmu, „Adam”</chapter-title>, <publisher-loc>Warszawa</publisher-loc><year>2004</year></mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Lord</surname>, <given-names>K.M</given-names></string-name></person-group>., <year>2007</year>. <chapter-title>National Intelligence in the Age of Transparency</chapter-title>. In <person-group person-group-type="editor"><string-name><given-names>L.K.</given-names><surname>Johnson</surname></string-name></person-group> (ed.), <source>Strategic Intelligence, vol. 1: Understanding the Hidden Side of Government</source>. <publisher-loc>Westport</publisher-loc>.</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Mearsheimer</surname>, <given-names>J</given-names></string-name></person-group>., <year>1994/1995</year>. <chapter-title><italic>The False Promise of International Institutions</italic></chapter-title>. <publisher-name>International Security</publisher-name>, <publisher-loc>Winter</publisher-loc>.</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Mercado</surname>, <given-names>S.C</given-names></string-name></person-group>., <year>2017</year>. <chapter-title><italic>Sailing the Sea of OSINT in the Information Age: A Venerable Source in a New Era</italic></chapter-title> [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.cia.gov/library/center-for-study-of-intelligence/csipublications/csistudies/vol48no3/article05.html">https://www.cia.gov/library/center-for-study-of-intelligence/csipublications/csistudies/vol48no3/article05.html</ext-link> [Accessed <date-in-citation content-type="access-date">8 Oct 2017</date-in-citation>].</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Minas</surname>, <given-names>H</given-names></string-name></person-group>., <year>2010</year>. <chapter-title><italic>Can the Open Source Intelligence Emerge as an Indispensable Discipline for the Intelligence Community in the 21st Centrury?</italic></chapter-title> RIEAS: Research Paper, no. 139.</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Minkina</surname>, <given-names>M</given-names></string-name></person-group>., <year>2014</year>. <chapter-title><italic>Sztuka wywiadu w państwie współczesnym</italic></chapter-title>. <publisher-name>Rytm</publisher-name>, <publisher-loc>Warsaw</publisher-loc>.</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Minkina</surname>, <given-names>M</given-names></string-name></person-group>., <year>2011</year>. <chapter-title><italic>Wywiad w państwie współczesnym. Rozprawa habilitacyjna</italic></chapter-title>. <publisher-name>Zeszyty Naukowe AON</publisher-name>, <publisher-loc>dodatek</publisher-loc>.</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Modrzejewski</surname>, <given-names>Z</given-names></string-name></person-group>., <year>2013</year>. <chapter-title><italic>Rozpoznawcze wsparcie operacji informacyjnych</italic></chapter-title>. <source>Zeszyty naukowe AON</source><volume>90</volume> (<issue>1</issue>).</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Mroziewicz</surname>, <given-names>K</given-names></string-name></person-group>., <year>2007</year>. <chapter-title><italic>Czas pluskiew</italic></chapter-title>. <publisher-name>Sensacje XX wieku</publisher-name>, <publisher-loc>Warsaw</publisher-loc>.</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="web"><article-title>OSGeo</article-title> [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://www.osgeo.org">http://www.osgeo.org</ext-link> [Accessed <date-in-citation content-type="access-date">26 Mar 2018</date-in-citation>].</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Penc</surname>, <given-names>J</given-names></string-name></person-group>., <year>2000</year>. <chapter-title><italic>Menedżer w uczącej się organizacji</italic></chapter-title>. <publisher-loc>Wydawnictwo</publisher-loc>: <publisher-name>Menadżer, Łódź</publisher-name>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Więckiewicz</surname>, <given-names>Z</given-names></string-name></person-group>., <year>1974</year>. <chapter-title><italic>Niektóre formy i metody działalności wywiadowczej. Publikacje i międzynarodowy ruch osobowy</italic></chapter-title>. <publisher-loc>Warsaw, MSW</publisher-loc>.</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>Zarządzenie Nr 73 Prezesa Rady Ministrów z dnia 26 czerwca 2002 r</collab></person-group>. <chapter-title>w sprawie nadania statutu Agencji Bezpieczeństwa Wewnętrznego (M. P. 2002 nr 26 poz.432)</chapter-title>.</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>Zarządzenie Nr 74 Prezesa Rady Ministrów z dnia 26 czerwca 2002 r</collab></person-group>. <chapter-title>w sprawie nadania statutu Agencji Wywiadu (M. P. 2011 nr 26 poz. 433)</chapter-title>.</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>Zarządzenie Prezesa Rady Ministrów z dnia 6 października 2010 r</collab></person-group>. <chapter-title>w sprawie nadania statutu Centralnemu Biuru Antykorupcyjnemu (M. P. z 2010 r. Nr 76, poz. 953)</chapter-title>.</mixed-citation></ref></ref-list></back></article>
