The potential for “open source” leaks has expanded exponentially with the development of the internet. Should anyone be interested, the following book provides some good examples of the original techniques and methods employed to deduce sensitive information from unclassified or open sources.
Spying on the Bomb by Jeffery T. Richelson
most if the relevant information is in the first third of the book.
YS