|
Three days left till Ray White's Trust Equation live Zoom Workshop (8 April, 18:00 CET/ 12:00 PM EST / 09:00 PT) register here and if you can't make it we will send you the recording. Dear Decision Maker Five days. That is the gap between a Chinese engineer posting a detailed video tutorial on how to shoot down an F-35 stealth fighter and Iran claiming it did exactly that. I want to walk you through what is happening right now. Because it changes everything about how intelligence works. And I am going to frame this through two disciplines I have spent my career operating in: HUMINT and OSINT. Because this story is about what happens when those two worlds collide in ways nobody planned for. A Tutorial That Went Viral in Two LanguagesOn 14 March 2026, an account called "Laohu Talks World" posted a video on Chinese social media. The creator is an alumnus of Northwestern Polytechnical University in Xi'an. One of China's "Seven Sons of National Defence." A university under US sanctions. According to a source close to the creator: "many of his batchmates work in the defence industry." His video explained, step by step, how Iran could use:
to intercept F-35s without triggering their radar warning receivers. The kicker: it was subtitled in Persian. Tens of millions of views. Five days later, Iran's IRGC claimed it struck a US F-35 using its "Majid" air defence system. The US confirmed an F-35 made an emergency landing. It did not confirm the cause. Let me be precise. There is no evidence that the tutorial caused the strike. Correlation is not causation. But the tutorial was not an isolated incident. It was a signal. The Full Spectrum of Chinese SupportWhat is happening is not one person making videos for fun. It is a five-layered system operating simultaneously. Let me walk you through the layers. Layer 1: State Media and PLA Content
"a revelation of what they're thinking."
Is this grassroots? Or is this is the state? Layer 2: Commercial Intelligence Companies
"something comparable to a Bloomberg terminal for the intelligence sector."
"almost certainly exaggerated." Layer 3: Hardware and Technology Transfer
"Iranian missiles are much more accurate since the switch."
Layer 4: Academic Research, Amplified
Layer 5: Five Million Engineers with Keyboards
And here is the intelligence signal that matters most. China's censorship apparatus removes Tiananmen, Xinjiang, and Hong Kong content within hours. It has not removed a single piece of this pro-Iran military content. That silence is not an accident. "The fact that this company deemed it a safe space to brandish its wares tells you that military-civil fusion is becoming openly accepted inside China."
David Lin, former US State Department official
The West Did the Same Thing. For Ukraine.Here is where this story gets uncomfortable. Because if you are looking at Chinese civilians crowdsourcing intelligence support for Iran and thinking "that is outrageous," you need to ask yourself an honest question. What did the West do for Ukraine? NAFO raised real money for real weapons.
That is not memes. That is logistics. Western OSINT analysts fed the targeting cycle.
"There are growing incidents where geolocation work is resulting in kinetic action... sites are destroyed 24 hours later."
Governments endorsed and enabled it.
"Instead of trying to have things cleared or worry about classification issues, you could just reference Bellingcat's work." No Western OSINT analyst was investigated, warned, or prosecuted. No government issued a caution. The Uncomfortable ComparisonSo here it is. Side by side. What the West did for Ukraine:
What China is doing for Iran:
The mechanism is the same. The direction is different. When Western civilians did this for Ukraine, we called it solidarity. When Chinese civilians do it for Iran, we call it a threat. I am not saying they are morally equivalent. I am saying the structure is identical. And if you work in intelligence, you need to understand what that means. "Ukraine's armed forces have outsourced parts of the kill chain to civilians."
Dr. Matthew Ford, Swedish Defence University
If that was true for Ukraine, what stops it from being true for Iran? Where OSINT Ends and HUMINT BeginsHere is the part that matters for your career. OSINT has become the "INT of first resort." The CIA's Open Source Enterprise Director stated it can address 60 to 70 percent of intelligence requirements. DIA estimates 80 percent of its intelligence comes from open sources. But look at what OSINT could not answer in this story:
Every one of those questions requires a human source. A satellite can map every US base in the Middle East. An AI startup can track carrier positions in real time. Five million engineers can simulate every conceivable attack scenario. But only a human source inside the decision-making circle can tell you whether Beijing authorised the transfer. Whether Tehran is reading the tutorials. Whether the next strike is a patrol or an escalation. That is the gap. And that is where professionals who understand both OSINT and HUMINT become irreplaceable. What I Would Suggest as Your Next StepIf this newsletter made you think about where OSINT ends and HUMINT begins, I want to hear from you. We teach both at Grey Dynamics Intelligence School.
The professionals who understand both sides of this equation are the ones organisations cannot afford to lose. Reply to this email with "FIVE MILLION" I will personally review your background and tell you, honestly, which programme fits where you are trying to go. No pressure. No scripts. Just one intelligence professional talking to another. Ahmed Hassan PS: If you are looking for a HUMINT or OSINT solution for your team or organisation please respond with "Ground Truth" |
Our mission is to provide comprehensive and actionable intelligence to businesses, government agencies, and private clients. With a team of experienced intelligence collectors and analysts, many with backgrounds in intelligence services, military, law enforcement, and academia, we are committed to delivering insights that drive informed decision-making.
Free Live Workshop WEDNESDAY 8 APRIL | 18:00 CET | 12:00 EST | 09:00 PT | ZOOM | FREE REGISTER Dear Reader Tomorrow at 18:00 CET | 12:00 EST | 09:00 PT, Ray White is going live on Zoom for The Trust Equation workshop. Here is how to get the most out of it: Have a pen and paper ready. Ray will walk through a self-assessment framework and you will want to score yourself in real time. Think of one professional relationship where trust is critical. Bring it to mind during the session. The...
Free Live Workshop WEDNESDAY 8 APRIL | 18:00 CET | 12:00 EST | 09:00 PT | ZOOM | FREE REGISTER Dear Reader Quick reminder. Wednesday's free Zoom workshop on The Trust Equation is 48 hours away. Ray White, a retired CIA Senior Operations Officer, is breaking down the formula intelligence professionals use to build trust. Here is what you will walk away with: A clear understanding of the four variables that determine whether someone trusts you. The single biggest mistake people make when trying...
Free Live Webinar WEDNESDAY 8 APRIL | 18:00 CET | 12:00 EST | 09:00 PT | ZOOM | FREE REGISTER FOR THE FREE WEBINAR Dear Reader I get this question a lot. "Is this for intelligence professionals only?" No. The Trust Equation was not invented by an intelligence agency. It was developed by David Maister, Charles Green, and Robert Galford for their book The Trusted Advisor. It is a universal framework for understanding how trust works in any professional relationship. We teach it in our HUMINT...