CSINT12 refers to "Closed-Source Intelligence." It is the process of collecting and analyzing information from non-public, restricted, or confidential sources. These sources can include classified government documents, proprietary corporate data, internal communications, or data obtained through confidential agreements or intelligence networks. CSINT is used in investigations where sensitive or confidential information is critical, such as in law enforcement, intelligence organizations, corporate security, and private investigations.
CSINT access is typically regulated legally, requiring court orders, warrants, or special permissions, and it involves a structured process of accessing, collecting, and analyzing this restricted information safely and ethically. It provides insights that are often unavailable through public or open sources, making it valuable in cases like criminal investigations, national security, and corporate fraud. Its use is bound by strict legal and ethical considerations to protect privacy and avoid misuse.
CSINT may also fall under the term Classified Information (CI) which can be Classified Critical Information (CII) and the term is typically used as information regarding protection from access from unauthorized disclosure for security and the defense of national or foreign relations, may also be for domestic/legal use. Each is donated by the classified levels of Top, Secret or Confidential. These can fall in line with critical information (CI) and indicators (CII).
"Information sources are categorized as open, closed, and classified. Open source (OSINT) includes publicly available materials like reports, theses, and newsletters, but may be unreliable or biased. Closed source information is restricted data in databases containing personal records or intelligence, with limited access. Classified information, gathered through covert human or technical intelligence, is highly accurate but has strict dissemination controls that can limit practical use" (United Nations, 2011, p. 12).2
"Closed source data, because of its origin, is often considered more accurate and reliable" (Pennsylvania State University, n.d.)1.
"Throughout history, military, religious and community leaders have actively sought individuals with information-gathering skills, basing decisions on intelligence obtained this way. The earliest recognized text on this subject is 'The Art of War, The Art of Strategy' by Sun Tzu, a 5th century BC Chinese warlord and mercenary. He was acclaimed for commanding successful military operations through effective intelligence gathering and decision-making. This work remains essential reading for military and corporate strategists and intelligence operatives worldwide, demonstrating that deploying information gatherers for military operations is commonplace" (United Nations, 2011, p. 3).2
"All warfare is based on deception" and "As a result, only an enlightened ruler and a wise general will use the army's highest intelligence for spying purposes, achieving great success. Spies are a critical element in water (warfare) because they determine an army's ability to move."(Sun-Tzu 3-62)3
Meaning that HUMINT is also CSINT, both historically and in the modern world.
In summary:
- CSINT involves collecting confidential, non-public information through methods that may be legal (with proper authority) or illegal (such as hacking), depending on the context.
- CSINT may derive from human sources, such as interrogations, interviews, or insider reporting. This includes both government and civilian contexts—for example, corporate due diligence, employee vetting, or business negotiations.
- HUMINT and CSINT overlap, but can be separate; it again all depends on the context. Was it a secret operation or an interview? Was this from a closed source document?
See HUMINT and Breached Data for related examples. Analysts should be cautious: while closed sources are often more reliable, they are not immune to rumor or bias. As the CIA notes, restricted information
“typically involves confidential personnel decisions, upcoming policy announcements relevant to staff, or compelling rumors” (CIA para. 22)4.
Rumors can undermine or compromise the credibility of a human source, a risk particularly relevant when HUMINT and CSINT intersect.
Breach.vip is considered open source and viewable unless if the data was removed by a request from the user, however there is HIBP which is also open source and viewable for breached data. For this, it isn't classified information as looking into a hackers phonebook and yellow pages.
Cornell Law - 18 U.S. Code § 798 - Disclosure of classified information
Classified Information - Department Of Energy (Jul 23, 1993)
Footnotes
-
Pennsylvania State University, et al. (n.d.). L3.09: Closed Source Data. www.e-education.psu.edu/geointmooc/node/2016 ↩ ↩2
-
United Nations. (2011). Criminal intelligence: Manual for analysts. United Nations Office on Drugs and Crime. https://www.unodc.org/documents/organized-crime/Law-Enforcement/Criminal_Intelligence_for_Analysts.pdf ↩ ↩2 ↩3
-
孫子, and Lionel Giles. Sun-Tzu on the Art of War: The Oldest Military Treatise in the World. 1910. Leicester, United Kingdom, United Kingdom of Great Britain and Northern Ireland, Allandale Online Publishing, 2000, sites.ualberta.ca/~enoch/Readings/The_Art_Of_War.pdf. ↩
-
Sunzi. The Art of Strategy: A New Translation of Sun Tzu’s Classic The Art of War. 1988. ↩