<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>İstihbarat Çalışmaları ve Araştırmaları Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2822-3349</issn>
                                        <issn pub-type="epub">2822-3357</issn>
                                                                                            <publisher>
                    <publisher-name>Terörizm ve Radikalleşme ile Mücadele Araştırma Merkezi Derneği</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                                                                                                                                            <title-group>
                                                                                                                        <article-title>21’nci Yüzyılda Açık Kaynak İstihbaratı</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>Open Source Intelligence in the 21th Century</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-6102-7704</contrib-id>
                                                                <name>
                                    <surname>Ökten</surname>
                                    <given-names>Tolga</given-names>
                                </name>
                                                                    <aff>MİLLİ SAVUNMA ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20230130">
                    <day>01</day>
                    <month>30</month>
                    <year>2023</year>
                </pub-date>
                                        <volume>2</volume>
                                        <issue>1</issue>
                                        <fpage>17</fpage>
                                        <lpage>38</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20221109">
                        <day>11</day>
                        <month>09</month>
                        <year>2022</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20221205">
                        <day>12</day>
                        <month>05</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2022, İstihbarat Çalışmaları ve Araştırmaları Dergisi</copyright-statement>
                    <copyright-year>2022</copyright-year>
                    <copyright-holder>İstihbarat Çalışmaları ve Araştırmaları Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Açık kaynaklar, günümüz istihbarat çalışmalarında yoğun olarak tartışılan bir konu başlığıdır. Birçok profesyonel, istihbaratın mutlaka gizli haber toplama faaliyetlerine dayanması gerektiğini ve bilgiye ulaşmanın kolay ve kısa bir yolu olmayacağını savunmaktadır. Diğerleri içinse açık kaynak istihbaratı yeni bir dönemi işaret etmektedir. Bu makalede, istihbarat çalışmaları literatüründe genelde teknoloji özelde ise açık kaynak başlığı altında yer alan bazı temel konu başlıklarının okuyuculara tanıtılması ve tartışılması amaçlanmıştır. Ayrıca, Türkçe terminoloji oluşturma sürecine de katkı sağlamak istenmektedir. Tartışma başlıkları; istihbaratın demokratikleşmesi, toplama-analiz ikiliği, görev ve kadro tanımlarındaki dönüşüm, açık kaynakların önleyici istihbarattaki güçlü ve zayıf yanları ile istihbarat zafiyeti olarak belirlenmiştir. Bu başlıklar etrafında istihbaratın 21. yüzyıldaki dönüşümü ve yol haritası tartışılmıştır.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>Open sources are an important topic of discussion in contemporary intelligence studies. Many professionals argue that intelligence should be based on covert intelligence collection methods and there is no easy way or shortcut to access information. For others, open-source intelligence indicates a new era in intelligence. Accordingly, in this study, some of the primary debates in the intelligence studies literature under technology generally and open source specifically are introduced and examined. Besides, it intends to contribute to the efforts of forming Turkish terminology. The main discussion topics are the democratization of intelligence, collection-analysis duality, transformation in job descriptions, strengths and weaknesses of open sources in warning intelligence, and intelligence failure. Around these topics, the transformation and the road map of intelligence are discussed.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Açık Kaynak</kwd>
                                                    <kwd>  Teknoloji</kwd>
                                                    <kwd>  Dönüşüm</kwd>
                                                    <kwd>  Toplama</kwd>
                                                    <kwd>  Analiz</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>Open-Source</kwd>
                                                    <kwd>  Technology</kwd>
                                                    <kwd>  Transformation</kwd>
                                                    <kwd>  Collection</kwd>
                                                    <kwd>  Analysis</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Ball, K. Webster, F. (2003) The intensification of surveillance. Ball, K. Webster, F. (Ed.). The intensification of surveillance: crime, terrorism and warfare in the information içinde (ss.1-15). Pluto Press.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Barnea, A. (2018). Challenging the “lone wolf” phenomenon in an era of informant. International Journal of Intelligence and Counterintelligence. 31(2). 217-234.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Barnea, A. (2019) Big data and counterintelligence in western countries. International Journal of Intelligence and counterintelligence. 32(3). 433-447.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Brynielsson, J. Horndahl, A. Johansson, F. Kaati, L. Mårtenson, C. ve Svenson, P. (2013) Harvesting and analysis of weak signals for detecting lone. Security Informatics. 2(11). 1-15. Denécé, E. (2014). The revolution in intelligence affairs: 1989–2003, International Journal of Intelligence and Counterintelligence. 27(1): 27-41.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Field manuel 2-0 intelligence. (2007). United States Army Press.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Freedman, L. (1977). U.S. Intelligence and the soviet strategic threat. Princeton University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Gill P. ve Phythian M. (2018). Intelligence in an Insecure world. Polity Press Cambridge.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Goldman, A. (2016). Why didn’t the F.B.I. stop the New York bombing? Erişim tarihi: 24 Ekim 2018. https://www.nytimes.com/2016/09/22/us/fbi-terror-ahmad-khanrahami.html.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Herman, M. (1998). Diplomacy and intelligence, Diplomacy &amp; Statecraft, 9(2). 1-22. https://www.bellingcat.com/news/uk-and-europe/2018/10/09/full-reportskripal-poisoning-suspect-dr-alexander-mishkin-hero-russia/ Erişim tarihi: 24 Ekim 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">https://www.bellingcat.com/news/2022/08/25/socialite-widow-jeweller-spyhow-a-gru-agent-charmed-her-way-into-nato-circles-initaly/?s=03 Erişim tarihi: 24 Ekim 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">https://www.egm.gov.tr/02072020-tarihli-basin-aciklamasi Erişim tarihi: 24 Ekim 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">https://www.europarl.europa.eu/news/en/press-room/20220412IPR27112/epinquiry-committee-for-pegasus-and-other-spyware-launched Erişim tarihi: 20 Ekim 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">https://www.mevzuat.gov.tr/mevzuatmetin/1.5.6698.pdf Erişim tarihi: 14 Ekim 2022. https://www.i-scoop.eu/big-data-action-value-context/data-age-2025datasphere/#:~:text=In%20the%20announcement%20of%20the,a%20 yearly%20basis)%20by%202025. Erişim tarihi: 24 Ekim 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">https://www.statista.com/statistics/949144/worldwide-global-dataspherereal-time-data-annual-size/ Erişim tarihi: 24 Ekim 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Hulnick, A.S. (1999) Fixing the spy machine: Preparing American intelligence for the twenty-first century. Praeger.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">James J. Wirtz, ve Rosenwasser, J.J. (2010). From combined arms to combined intelligence: philosophy, doctrine and operations, Intelligence and National Security, 25(6). 725-743.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Johnson, L.K. (2009). Sketches for a theory of strategic intelligence. Gill, P. Marrin,S. ve Phythian, M. (Ed). Intelligence theory key questions and debates içinde. (ss.33-53). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Johnson, L.K. (2010). National security intelligence.  Johnson, K.L. (Ed). The oxford handbook of national security intelligence içinde. (ss.332). Oxford University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Johnson, L.K. (2014). The development of intelligence studies. Dover, R. Goodman, M. ve Hillebrand, C. (Ed). Routledge companion to intelligence studies içinde. (3-22). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Joint publication 3-25 countering threat networks. (2016).</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">United States Army Press. Krebs, V.E. (2002). Mapping networks of terrorist cells. Connections. 24(3): 43-52.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Lowenthal, M.  (2008). Intelligence: From secrets to policy. CQ Press.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Lahneman, W.J. (2006). The future of intelligence analysis volume I final report. University of Maryland.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Shulsky, A.N. ve Schmitt G.J. (2002). Silent warfare: Understanding the world of intelligence. Potomac Books.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Sparrow, M.K. (1991). Network vulnerabilities and strategic intelligence in law enforcement. International Journal of Intelligence and counterintelligence. 5(3). 255-274.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Steele, R.D. (2007). Open source intelligence. Johnson, K.L. (Ed). Handbook of intelligence studies içinde. (ss.129-147). Routledge</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Treverton, G.F. Jones, S.G. Boraz, S. Lipscy, P. (2006). Toward a theory of intelligence. RAND Corporation.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Treverton, G.F. C. Gabbard, B. (2008). Assessing the tradecraft of intelligence analysis. RAND Corporation.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Treverton, G.F. (2009). Intelligence for an age of terror. RAND Corporation. Cambridge University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Williams, P. (2001). Transnational criminal networks. Phil Arquilla, J. Ronfeldt, D.F. (Ed). Networks and netwars: The future of terror, crime, and militancy içinde. (ss.61-98). RAND Corporation.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Wheaton, K.J. (2019). How to teach 2500 years of intelligence history in about an hour. Erişim tarihi: 11 Ekim 2022.  https://sourcesandmethods.blogspot.com/2019/06/how-toteach-2500-years-of-intelligence.html.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Wohlstetter, R. (1962). Pearl harbor warning and decision. Stanford University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Woo, G. (2011). Interdiction of plots with multiple operatives.  Wiil, U.K. (Ed). Counterterrorism and open-source intelligence içinde. (ss.49-60) Springer-Verlag.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Younger A. MI6 &#039;C&#039; speech on fourth generation espionage, Erişim tarihi: 11 Mayıs 2022. https://www.gov.uk/government/speeches/mi6-c-speechon-fourth-generation-espionage.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
