Executive Summary
Open Source Intelligence Center: 40 analysts systematically exploiting open sources for military intelligence. Functions: social media monitoring (Telegram, VK, military forums), commercial satellite analysis, transportation tracking (rail, road), disinformation early warning, geolocation analysis. Output: 500+ intelligence reports annually, 2-hour breaking event analysis, daily situation updates, integration with classified intelligence.
In short: 40 trained OSINT analysts; 500+ intelligence reports annually; 2-hour breaking event response
The Problem
Ukrainian OSINT revolution: open sources transformed intelligence. Bellingcat investigators geolocated Russian military units, Oryx tracked equipment losses, anonymous analysts identified troop buildups before classified sources. Ukrainian intelligence officer: 'Our best early warning came from a Swedish think tank watching Russian railway traffic on Telegram.' OSINT advantage: 90% of useful intelligence is open source. Lithuanian capability: fragmented, no dedicated center, relies on ad-hoc efforts. Russian/Belarusian military activity: constantly documented on social media, satellite imagery, transportation data. Without dedicated OSINT, Lithuania ignores free intelligence worth billions.