The intelligence workflow is revealed

Brooke Liu

New Member
The term open source intelligence (OSINT) has become so popular and marketable now that there’s a good chance you’ve seen it somewhere. You may have come across it when comparing different data sources, when learning investigative techniques, or when choosing data collection and analysis tools.

While there are different ways to think about what OSINT means, at its core, OSINT is actually a specific intelligence gathering discipline used by the intelligence community. OSINT, HUMINT, SIGINT, and other intelligence disciplines are often referred to as “int,” where “int” is short for intelligence.

In this article, we’ll explain what these different intelligence disciplines are and how they’re used. But first, we’ll build a foundation by understanding what intelligence means.

Intelligence is considered to be the product of collecting, processing, and analyzing raw information. As a product, intelligence is developed and delivered through the intelligence lifecycle. In its most standard model, the intelligence lifecycle consists of five steps:

  1. Mission planning and reconnaissance direction determination (also known as demand orientation)
  2. Collection
  3. Processing
  4. Analysis and reporting
  5. Compilation and distribution
Although this model often appears in the literature related to government agencies, it describes a standard process that is applicable to missions in different application scenarios (whether civil, law enforcement, or military intelligence).

Once intelligence is generated, it is consumed by "intelligence customers" to support their decision-making. Typically, these customers are individuals responsible for or supporting ongoing operations, such as incident and emergency response, strategy and policy development, or even national security decision-making.

Different levels of intelligence

Because intelligence can serve different purposes and audiences, it is divided into three different levels: strategic, tactical, and operational. These levels are hierarchical in nature, with strategic intelligence at the top and operational intelligence at the bottom.

Strategic intelligence is forward-looking thinking that relies heavily on assessments and is used to observe long-term trends. As such, it is typically produced by analysts with deep subject matter expertise and a high degree of adaptability.

Tactical intelligence provides an assessment of the adversary's current capabilities, focusing on their strengths, weaknesses, and intentions. This type of intelligence allows for the effective allocation of resources, proper planning, and timely engagement of the adversary.

Operational intelligence requires the production of real-time or near real-time information as it is used for day-to-day operations and decision-making. As such, it is primarily derived from technical sources and has a short Time to Live (TTL).

While knowing what level of intelligence is needed will help make it more relevant and actionable to the end user, their hierarchical nature allows them to complement and influence each other. In fact, a comprehensive analysis will consist of intelligence from all levels.

Given that intelligence is used to drive decisions, and decisions are only as good as the data that supports them, collecting intelligence becomes one of the pillars of intelligence-led activities. Therefore, understanding the scope and capabilities of each intelligence collection technique is highly relevant.

Types of Intelligence Collection

As mentioned earlier, OSINT is just one of the existing intelligence collection techniques. It is worth mentioning that some of these intelligence techniques - or their sub-areas - are specific to government agencies, especially those in the military and special intelligence fields. There is no standard list of intelligence collection techniques, however, the US intelligence community agrees that there are five main types:

· OSINT

· HUMINT

· SIGINT

· GEOINT

· MASINT

Open Source Intelligence (OSINT)

OSINT is generated from publicly available information obtained through legal means such as official requests, observation and acquisition. Although OSINT gained popularity with the advent of the Internet and digital media, it can be generated from information in a variety of formats and sources, including the Internet, commercial or public databases, newspapers, radio, television, etc.

Social Media Intelligence (SOCMINT) is an industry term developed to further segment the product and can be considered a sub-discipline of OSINT. SOCMINT allows for the monitoring of social media platforms such as Facebook and Instagram. This includes the monitoring of content, messages and other relevant data.

If you wish to gain a deeper understanding of OSINT and its relationship to Web Intelligence (WEBINT), consider reading our dedicated article, which you can find here WEBINT: OSINT mainstream in the Internet age.

Human Intelligence (HUMINT)

Human Intelligence (HUMINT) is derived from human sources. The public perception of the term is often associated with clandestine activities - secret missions and spies come to mind. However, the reality is that most sources used today are less secretive and more public in nature. In fact, much of the raw information used to produce this intelligence is gathered through interviews with witnesses, suspects, and people of interest in an investigation.

Interestingly, HUMINT is one of the oldest forms of data collection. It was the primary source of intelligence for governments until the technological revolution of the late 20th century.

Signals Intelligence (SIGINT)

Signals intelligence is generated through the interception and exploitation of signals. It is important to note that signals intelligence can be obtained from different platforms, including ships, aircraft, and ground stations. These platforms or facilities can even monitor transmissions from ground facilities and satellites. SIGINT consists of three sub-techniques:

Communications intelligence (COMINT), which targets voice or text messages in different formats, as well as teletype and Morse code traffic. In other words, it intercepts device-to-device signal (possibly encrypted) transmissions.

Electronic intelligence (ELINT), which intercepts and analyzes non-communication transmissions emitted by radar and other electromagnetic radiation. The equipment used is almost entirely government-specific, making it a highly confidential and protected source.

Foreign instrumentation signals intelligence (FISINT), which can intercept telemetry information from weapon systems or space vehicles. The intelligence generated allows the end user to determine the status of said systems and vehicles.

Geospatial intelligence (GEOINT)

Geospatial intelligence (GEOINT) is generated by combining imagery intelligence and geospatial information. In other words, it is information obtained by analyzing imagery and data related to a specific location. It can be used not only for military purposes, but also for non-security applications to track geographic changes and features (soil erosion, agricultural land use, etc.).

Although the Office of the Director of National Intelligence identifies imagery intelligence (IMINT) as a separate intelligence technology, it is generally considered a branch of GEOINT. IMINT can be obtained from sources such as visual photography, infrared, radar sensors, lasers and electro-optical, and imagery collected through satellites.

Today, IMINT is available to more and more countries due to the proliferation of space-based imaging systems. However, quality is a common problem that can only be solved by using highly sophisticated techniques to combat the effects that natural phenomena such as adverse weather and lighting conditions can have on imagery products.

Measurement and Signature Intelligence (MASINT)

MASINT is obtained by analyzing the radiation from devices occurring within the electromagnetic spectrum. MASINT is used to detect information patterns that have not yet been exploited by other systems and it consists of five sub-techniques or sources:

RADINT, which stands for radar intelligence

IRINT, which stands for infrared intelligence

TELINT, which stands for telemetry intelligence

ACOUSTINT, which stands for acoustic intelligence

NUCINT, which stands for nuclear radiation intelligence
 
Top