흥신소
Intelligence gathering involves the observation of foreign activities that could impact the security of the state. It encompasses disciplines like human intelligence (HUMINT), signals intelligence (SIGINT), and imagery intelligence (IMINT).
흥신소HUMINT is the primary source of information for most governments. Many government employees, such as diplomats and military attaches, collect HUMINT as part of their jobs.
Definition
The intelligence gathering process involves identifying and prioritizing information requirements, translating those requirements into observables, preparing collection activities, executing the collections and providing them to the processing and production elements. The process is iterative; finished intelligence often generates new information requirements, which then feeds back into the planning and direction phase.
The collection phase includes both open sources and clandestine methods. The former encompasses publicly available information, including the internet and media reports. The latter typically employs a network of agents, often infiltrators who operate under cover. The CIA has a prominent role in this type of HUMINT; other organizations may use this method as well. Queen Elizabeth I maintained a notable intelligence organization during her reign, and the British spymaster Sir Francis Walsingham is credited with developing espionage techniques that led to the formation of modern spy agencies.
The analytical review phase transforms raw data into finished intelligence. Using subject-matter experts, analysts evaluate the reliability, validity and timeliness of the data, integrate it into a coherent whole and prepare intelligence products that provide consumers with an understanding of an area of concern. Analysts also consider the context of the events and issues presented in the data. Intelligence products can range from strategic intelligence for policymakers to tactical information for law enforcement. They can include written reports, images and databases.
Sources
There are various sources of intelligence gathering, some covert and others overt. Overt sources include open-source information, such as online resumes and job postings, public records like credit reports and social media accounts, and government Web sites. There are also HUMINT, or human intelligence sources, which include interviews and attendance at industry events and trade shows. SIGINT, or signals intelligence, includes electronic eavesdropping and code breaking. Finally, there are MASINT, or measurement and signature intelligence, sources, which use a variety of sensors and platforms to gather quantitative data on physical attributes that characterize targets and events.
Some of the most valuable sources of intelligence are those that cannot be easily replicated by adversaries. These covert methods of collection are categorized as “hard” or “soft” intelligence흥신소 , with the former being more reliable. Examples of hard intelligence include photographs and satellite imagery, while soft intelligence is more speculative and subjective, such as a secret agent’s report.
Intelligence gathering for penetration testing focuses on identifying entry points into the target system, either physical or virtual. This is accomplished through passive reconnaissance, where the researcher does not interact with the target at all, or active reconnaissance, which involves interacting to learn specific weaknesses. For example, a penetration tester might perform a vulnerability scan to identify the target’s IP addresses and then use a tool like grep to identify common passwords on the server.
Methods
The collection process is one of the most important and challenging aspects of intelligence-led operations. The intelligence professionals that work in the field must be able to adapt their tools and techniques to meet the needs of different consumers, including policymakers, executives, investigators and patrol officers. These consumers have varying intelligence requirements, which are often communicated through intelligence requirement statements or requests known as “taskeding.”
The specific techniques used to collect intelligence vary by discipline. Generally, intelligence is derived from open sources such as radio and television programs, newspapers and commercial databases, as well as through the military and satellites. However, certain intelligence gathering methods require more intrusive measures. These include eavesdropping from ships, planes and listening stations in embassies and military installations; observing foreign targets through large fishing trawlers; and measuring physical phenomena intrinsic to a target or event (e.g., its signature).
Intelligence disciplines also focus on analyzing intercepted information to gain insights into what it is telling the agency. For example, the NSA’s SIGINT, or signals intelligence, looks at information from intercepted telephone and fax communications. The CIA’s HUMINT, or human intelligence, focuses on collecting information about people through interviews and other overt means. These interviews may take place in person, over the phone or via the Internet. In some cases, the intelligence professionals may combine all of these methods in a single investigation.
Results
The intelligence community (IC) today has more ways to collect information of national interest in more places and at greater speeds than ever before. But generating timely, accurate, and insightful intelligence for U.S. national security leaders continues to require the expertise of spies and human sources.
Adversary intelligence organizations are innovating rapidly to develop, field, and exploit technologies to degrade and disrupt IC collection. To stay ahead, the IC must accelerate technology acquisition and integration, adapt its human (HUMINT) and technical intelligence professionals’ skillsets and missions, and adopt over-the-horizon technologies to transform how it collects geospatial (GEOINT), signals (SIGINT), and human (HUMINT) intelligence.
A key challenge for intelligence gathering is prioritization. Having a clear set of end goals and supporting elements will help to make sure the intelligence gathering process delivers on those priorities. This will also ensure that non-relevant information is de-prioritized so it does not interfere with the analysis process.
A strong, strategic framework will help to guide the gathering of open source intelligence. It is not recommended to simply go after everything that might be useful, as the volume of open source data far exceeds analysts’ ability to process it. Instead, it is best to start with a clear goal in mind, for example, to identify the most critical weaknesses in an organization’s network.