{"id":40343,"date":"2023-06-08T08:29:13","date_gmt":"2023-06-08T07:29:13","guid":{"rendered":"https:\/\/ihedn.fr\/?p=40343"},"modified":"2023-06-30T13:32:18","modified_gmt":"2023-06-30T12:32:18","slug":"aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre","status":"publish","type":"post","link":"https:\/\/ihedn.fr\/en\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/","title":{"rendered":"The opportunities and limits of OSINT, the new sinews of war"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"40343\" class=\"elementor elementor-40343\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-42573a3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42573a3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e92e22\" data-id=\"3e92e22\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b9fd3d elementor-widget elementor-widget-text-editor\" data-id=\"2b9fd3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On Monday 5 June, the Foch Amphitheatre at the \u00c9cole Militaire hosted an IHEDN Monday on the theme of \"OSINT: the new sinews of war?  Chaired by Julien Le Bot, journalist and writer-director (Arte, France Culture, RFI, Actes Sud), the meeting provided an opportunity to cross the views of three speakers who are both experts in and practitioners of OSINT: Alexandra Jousset, journalist, film-maker, winner of the Albert-London 2022 prize, producer of the 'Sources' programme on Arte; Fr\u00e9d\u00e9ric Lenfant, forensic expert in criminal analysis and digital investigations, fraud analysis, cyberthreats and OSINT; and Kevin Limonier, lecturer in geography and Slavic studies at the French Institute of Geopolitics (Paris 8 University) and deputy director of the French Institute of Geopolitics. <a href=\"https:\/\/geode.science\/\">GEODE<\/a>a centre specialising in the geopolitics of data.<\/p><p>OSINT is an acronym for \"open source intelligence\". But how do you define OSINT? For example, \"IHEDN Mondays are free open source intelligence\", as the Institute's director, Lieutenant General Beno\u00eet Durieux, points out in his introduction. This applies to all public information sources, \"sources used by intelligence services, journalists and activists\", as Julien Le Bot sums up.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-0b23ec0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b23ec0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e98039\" data-id=\"7e98039\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7464340 elementor-widget elementor-widget-heading\" data-id=\"7464340\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">A COMPLEMENTARY FIELD OF INVESTIGATION<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f997d9e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f997d9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fde152e elementor-widget elementor-widget-text-editor\" data-id=\"fde152e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\"OSINT starts with a simple Google search\", says Alexandra Jousset. Co-author (with Ksenia Bolchakova) of the award-winning documentary \"Wagner, l'arm\u00e9e de l'ombre de Poutine\" (France 5, 2022), she is delighted with the collaboration between journalists in the field, like herself, and journalists specialising in data research. In this case, for their documentary, those of<a href=\"https:\/\/openfacto.fr\/\">OpenFacto<\/a>a French-language platform for open-source investigation.<\/p><p>Their work \"enables us to find information that is difficult to obtain on the ground. On Wagner, we were able to verify information that we had thanks to open sources: satellite images, databases, lists of US sanctions, etc. This is essential to be more sure of what we publish, because in journalism, we have to check three times rather than once\". This enabled them to prove that several companies linked to Wagner were exchanging funds in Africa, and thus to detail the group's activities on the continent.<\/p><p>For Fr\u00e9d\u00e9ric Lenfant, \"there are a huge number of tools and resources, and each of them will offer a small part of the information\". Hence the importance, in OSINT, of the methodology for aggregating information. The aim of any investigation is to make connections and cross-checks,\" he explains. The professional field of this former gendarme, criminal analysis, is fully applicable to OSINT. In the case of the notorious training account SMS fraud, for example: \"We use a tool that enables us to find one piece of information, which leads us to find another, and then, through the modus operandi, we end up identifying a place and then a person\".<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-bd53762 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd53762\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-48b49b6\" data-id=\"48b49b6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0478f66 elementor-widget elementor-widget-heading\" data-id=\"0478f66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">THE READER CAN REDO THE SURVEY IN REVERSE<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ecb40f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4ecb40f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-146a10d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"146a10d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c71bde3\" data-id=\"c71bde3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c740159 elementor-widget elementor-widget-text-editor\" data-id=\"c740159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For his part, researcher Kevin Limonier talks about \"putting data to music\": the technical processes for extracting and representing this data, and then the whole methodology that will enable the information to be told. He has shown that the Russian army's priority is to reroute Internet networks eastwards as soon as it takes control of part of Ukrainian territory.<\/p><p>By definition, OSINT implies a high degree of transparency. \"There is a notion of reversibility of information\", notes Fr\u00e9d\u00e9ric Lenfant, since the reader \"can redo the investigation in reverse\". Alexandra Jousset notes that the public appreciate knowing the method used by journalists: \"It responds to a societal issue of mistrust of institutions. Her programme on Arte, Sources, shares the sources and methods of each programme, for example for <a href=\"https:\/\/www.arte.tv\/fr\/articles\/les-dossiers-de-prigojine-la-methode\">Prigojine's files<\/a>Wagner's boss.<\/p><p>The three speakers noted a recent trend: governments are themselves starting to communicate on sensitive subjects, elevating confidential information to OSINT status. This was the case when the US government warned the whole world of the imminent Russian attack on Ukraine in early 2022, even though it did not reveal the sources of this information. For Kevin Limonier, this represents a real break with the regalian relationship to information: \"Today, strategic intelligence is available to everyone.<\/p><p>Alexandra Jousset reports that in Mali, for the first time, the French army warned some journalists that its drones had filmed Wagner's militiamen making a fake mass grave that they intended to blame on him.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-bcfab32 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bcfab32\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f71c0d\" data-id=\"9f71c0d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f09322 elementor-widget elementor-widget-heading\" data-id=\"2f09322\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">RISKS AND ETHICAL LIMITS<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-167793d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"167793d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3c55167\" data-id=\"3c55167\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a09e8c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7a09e8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-f814d31 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f814d31\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b1ff2d6\" data-id=\"b1ff2d6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-533fbe3 elementor-widget elementor-widget-text-editor\" data-id=\"533fbe3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fr\u00e9d\u00e9ric Lenfant reminds us: \"Everyone is on the Internet, and everyone leaves traces\". For the former gendarme, \"the Internet is the equivalent of a digital crime scene. It's the principle of trace transfer: we look for traces, but we also leave traces\" by looking for them. Alexandra Jousset has realised this: \"It's very important to cover our tracks, and initially, journalists weren't trained in this at all. She herself was unaware of this need until she was introduced to it by her colleagues at OpenFacto: \"In just two clicks, the person we were investigating could find out who we are.<\/p><p>But this tagging of everyone's activities on the Internet is a godsend for researchers, journalists and spies, says Kevin Limonier: \"The great revolution in OSINT today is that digital traces make visible networks and power logics that weren't visible 20 or 30 years ago\". However, the academic also points out the ethical implications: \"OSINT is a lot like hacking, because it involves retrieving data from sites that weren't designed for that purpose: Tinder was not created to track down French soldiers in Benin\", as has been the case.<\/p><p>What's more, notes Fr\u00e9d\u00e9ric Lenfant, \"we have to weigh up the possible consequences of disseminating information to the general public, even if it's open source: in a gendarmerie investigation, I noticed the difference between what I saw in the media and the reality of the investigation, and what the consequences of this dissemination were for our work\". He also questions the notion of data leakage: \"Either it's voluntary, and therefore a whistleblower approach, or it's the result of hacking, in which case it's concealment and illegal\". So before using leaked information, you should always ask yourself: \"Am I dealing with open-source information, or information resulting from data theft?<\/p><p>In the future, more and more \"turnkey\" tools will be available for harvesting OSINT, and a growing number of people will be familiar with the methodologies. However, as Fr\u00e9d\u00e9ric Lenfant points out, \"there are always misappropriations of technological advances\". Kevin Limonier wonders: \"There may come a time when someone will create a false digital trail to trick someone using off-the-shelf tools. Another unknown factor is the development of IT tools and their accessibility, which will no doubt make it more difficult for government departments not to leave any traces. \"This is not an easy issue to manage,\" says Fr\u00e9d\u00e9ric Lenfant.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-30eba0f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"30eba0f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c6653ac\" data-id=\"c6653ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-787f296 elementor-widget elementor-widget-heading\" data-id=\"787f296\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">to see or replay the conference<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2cf1f07 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2cf1f07\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b68ef9f\" data-id=\"b68ef9f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b08f9b elementor-widget elementor-widget-video\" data-id=\"4b08f9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=SyLPl7n4bN0&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The age of the mass Internet has popularised open-source intelligence, accessible to everyone. Three experts in this field summarised the strategic issues at stake during the last IHEDN Monday.<\/p>","protected":false},"author":7,"featured_media":40344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[208,171,210],"tags":[],"class_list":["post-40343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defense-nationale","category-notre-selection","category-securite-nationale"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale<\/title>\n<meta name=\"description\" content=\"L\u2019\u00e8re de l\u2019Internet de masse a popularis\u00e9 le renseignement en source ouverte, accessible \u00e0 tout un chacun. Trois connaisseurs de ce domaine en ont r\u00e9sum\u00e9 les enjeux strat\u00e9giques lors du dernier Lundi de l\u2019IHEDN.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ihedn.fr\/en\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre\" \/>\n<meta property=\"og:description\" content=\"L\u2019\u00e8re de l\u2019Internet de masse a popularis\u00e9 le renseignement en source ouverte, accessible \u00e0 tout un chacun. Trois connaisseurs de ce domaine en ont r\u00e9sum\u00e9 les enjeux strat\u00e9giques lors du dernier Lundi de l\u2019IHEDN.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ihedn.fr\/en\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/\" \/>\n<meta property=\"og:site_name\" content=\"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ihedn\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-08T07:29:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-30T12:32:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/06\/VISUEL-OSINT-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"alexia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre\" \/>\n<meta name=\"twitter:description\" content=\"L\u2019\u00e8re de l\u2019Internet de masse a popularis\u00e9 le renseignement en source ouverte, accessible \u00e0 tout un chacun. Trois connaisseurs de ce domaine en ont r\u00e9sum\u00e9 les enjeux strat\u00e9giques lors du dernier Lundi de l\u2019IHEDN.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/06\/VISUEL-OSINT-scaled.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:site\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"alexia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/\"},\"author\":{\"name\":\"alexia\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/f5fdd32c2827287accbcbc33f74121b5\"},\"headline\":\"Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre\",\"datePublished\":\"2023-06-08T07:29:13+00:00\",\"dateModified\":\"2023-06-30T12:32:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/\"},\"wordCount\":1385,\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/VISUEL-OSINT-scaled.jpg\",\"articleSection\":[\"d\u00e9fense nationale\",\"Notre s\u00e9lection\",\"s\u00e9curit\u00e9 nationale\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/\",\"name\":\"Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/VISUEL-OSINT-scaled.jpg\",\"datePublished\":\"2023-06-08T07:29:13+00:00\",\"dateModified\":\"2023-06-30T12:32:18+00:00\",\"description\":\"L\u2019\u00e8re de l\u2019Internet de masse a popularis\u00e9 le renseignement en source ouverte, accessible \u00e0 tout un chacun. Trois connaisseurs de ce domaine en ont r\u00e9sum\u00e9 les enjeux strat\u00e9giques lors du dernier Lundi de l\u2019IHEDN.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/VISUEL-OSINT-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/VISUEL-OSINT-scaled.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/notre-selection\\\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/ihedn.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"name\":\"IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale |\",\"description\":\"Site officiel de l&#039;IHEDN plac\u00e9 sous la tutelle du Premier ministre.\",\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ihedn.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\",\"name\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"width\":500,\"height\":237,\"caption\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ihedn\\\/\",\"https:\\\/\\\/x.com\\\/IHEDN\",\"https:\\\/\\\/www.instagram.com\\\/ihedn\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/ihedn\\\/\",\"https:\\\/\\\/fr.wikipedia.org\\\/wiki\\\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/f5fdd32c2827287accbcbc33f74121b5\",\"name\":\"alexia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85eb8ccdb2990af9e1d5b99962700286b212c6b84c155ade95bbe0703f9c9001?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85eb8ccdb2990af9e1d5b99962700286b212c6b84c155ade95bbe0703f9c9001?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85eb8ccdb2990af9e1d5b99962700286b212c6b84c155ade95bbe0703f9c9001?s=96&d=mm&r=g\",\"caption\":\"alexia\"},\"url\":\"https:\\\/\\\/ihedn.fr\\\/en\\\/author\\\/alexia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Opportunities and limits of OSINT, the new sinews of war - L'IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","description":"The age of the mass Internet has popularised open-source intelligence, accessible to everyone. Three experts in this field summarised the strategic issues at stake during the last IHEDN Monday.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ihedn.fr\/en\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/","og_locale":"en_GB","og_type":"article","og_title":"Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre","og_description":"L\u2019\u00e8re de l\u2019Internet de masse a popularis\u00e9 le renseignement en source ouverte, accessible \u00e0 tout un chacun. Trois connaisseurs de ce domaine en ont r\u00e9sum\u00e9 les enjeux strat\u00e9giques lors du dernier Lundi de l\u2019IHEDN.","og_url":"https:\/\/ihedn.fr\/en\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/","og_site_name":"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","article_publisher":"https:\/\/www.facebook.com\/ihedn\/","article_published_time":"2023-06-08T07:29:13+00:00","article_modified_time":"2023-06-30T12:32:18+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/06\/VISUEL-OSINT-scaled.jpg","type":"image\/jpeg"}],"author":"alexia","twitter_card":"summary_large_image","twitter_title":"Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre","twitter_description":"L\u2019\u00e8re de l\u2019Internet de masse a popularis\u00e9 le renseignement en source ouverte, accessible \u00e0 tout un chacun. Trois connaisseurs de ce domaine en ont r\u00e9sum\u00e9 les enjeux strat\u00e9giques lors du dernier Lundi de l\u2019IHEDN.","twitter_image":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/06\/VISUEL-OSINT-scaled.jpg","twitter_creator":"@IHEDN","twitter_site":"@IHEDN","twitter_misc":{"Written by":"alexia","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/#article","isPartOf":{"@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/"},"author":{"name":"alexia","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/f5fdd32c2827287accbcbc33f74121b5"},"headline":"Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre","datePublished":"2023-06-08T07:29:13+00:00","dateModified":"2023-06-30T12:32:18+00:00","mainEntityOfPage":{"@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/"},"wordCount":1385,"publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"image":{"@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/06\/VISUEL-OSINT-scaled.jpg","articleSection":["d\u00e9fense nationale","Notre s\u00e9lection","s\u00e9curit\u00e9 nationale"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/","url":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/","name":"Opportunities and limits of OSINT, the new sinews of war - L'IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","isPartOf":{"@id":"https:\/\/ihedn.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/#primaryimage"},"image":{"@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/06\/VISUEL-OSINT-scaled.jpg","datePublished":"2023-06-08T07:29:13+00:00","dateModified":"2023-06-30T12:32:18+00:00","description":"The age of the mass Internet has popularised open-source intelligence, accessible to everyone. Three experts in this field summarised the strategic issues at stake during the last IHEDN Monday.","breadcrumb":{"@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/#primaryimage","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/06\/VISUEL-OSINT-scaled.jpg","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/06\/VISUEL-OSINT-scaled.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/ihedn.fr\/notre-selection\/aubaines-et-limites-de-losint-le-nouveau-nerf-de-la-guerre\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ihedn.fr\/"},{"@type":"ListItem","position":2,"name":"Aubaines et limites de l\u2019OSINT, le nouveau nerf de la guerre"}]},{"@type":"WebSite","@id":"https:\/\/ihedn.fr\/#website","url":"https:\/\/ihedn.fr\/","name":"IHEDN: Institut des hautes \u00e9tudes de d\u00e9fense nationale (Institute for Higher National Defence Studies)","description":"Official website of the IHEDN under the supervision of the Prime Minister.","publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ihedn.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ihedn.fr\/#organization","name":"IHEDN - Institute for Higher National Defence Studies","url":"https:\/\/ihedn.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","width":500,"height":237,"caption":"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale"},"image":{"@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ihedn\/","https:\/\/x.com\/IHEDN","https:\/\/www.instagram.com\/ihedn\/","https:\/\/www.linkedin.com\/school\/ihedn\/","https:\/\/fr.wikipedia.org\/wiki\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale"]},{"@type":"Person","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/f5fdd32c2827287accbcbc33f74121b5","name":"alexia","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/85eb8ccdb2990af9e1d5b99962700286b212c6b84c155ade95bbe0703f9c9001?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/85eb8ccdb2990af9e1d5b99962700286b212c6b84c155ade95bbe0703f9c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85eb8ccdb2990af9e1d5b99962700286b212c6b84c155ade95bbe0703f9c9001?s=96&d=mm&r=g","caption":"alexia"},"url":"https:\/\/ihedn.fr\/en\/author\/alexia\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-25 19:08:28","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/40343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/comments?post=40343"}],"version-history":[{"count":6,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/40343\/revisions"}],"predecessor-version":[{"id":40429,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/40343\/revisions\/40429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media\/40344"}],"wp:attachment":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media?parent=40343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/categories?post=40343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/tags?post=40343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}