Different kinds of Intelligence Techniques

Different kinds of Intelligence Techniques

Different kinds of Intelligence Techniques

This article discussed Different kinds of Intelligence Techniques used in Intelligence Analysis.

Human Intelligence (HUMINT)

A collection of information from human sources. The collection may be done openly, as when the departments interview witnesses or subjects, or it may be done through clandestine or covert means. Although HUMINT is an important collection discipline it becomes more effective when used with other methods such as other methods, including SIGINT, MASINT, and OSINT.


This refers to electronic transmissions that can be collected by inter and intracompany communications. Communications Intelligence (COMINT) is a type of SIGINT and refers to the interception of communications between two parties.

Imagery Intelligence (IMINT)

This sometimes also referred to as photo intelligence (PHOTINT). One of the earliest forms of IMINT took place during the Civil War, when soldiers were sent up in balloons to gather intelligence about their surroundings. IMINT was practiced to a greater extent in global wars. This type can also be used in the commercial sector.

Geospatial Intelligence (GEOINT)is the analysis and visual representation of security related activities on the earth. It is produced through an integration of imagery, imagery intelligence, and geospatial information.

Open-Source Intelligence (OSINT)

It refers to a broad array of information and sources that are generally available, including information obtained from the media (newspapers, radio, television, etc.), professional and academic records (papers, conferences, professional associations, etc.), and public data (government reports, demographics, hearings, speeches, etc.).

Role of OSINT

In recent years, the relevance of open source intelligence (OSINT) has grown within the field of information management. In fact, open source intelligence provides a large amount of the information used by intelligence analysts and corporate security analysts to identify potential hidden risks or make strategic decisions in time.

OSINT Comparison


  • Cost Effective
  • Easy Access
  • Easy Collaboration

OSINT Disadvantages

  • Credibility Issues
  • Too Much ‘Noise’
  • Bias issues

Effective Use of OSINT

To get the most of OSINT requires a detailed analysis and understanding of the requirements for using it. Moreover, the choice of using OSINT should not be based on cost vs traditional intelligence, because OSINT doesn’t exclude the traditional intelligence gathered from classified sources. Combining OSINT and traditional intelligence sources is a powerful approach for business intelligence.

In other words, OSNIT doesn’t compete with other sources, but rather works with them.

Common OSINT Tools

  • Google Dorks
  • Searchcode
  • Maltego
  • Google Alerts

Importance of HUMIT

“Elicitation is the bread and butter of human intelligence −it’s the act of obtaining information.” – C. Carleson

There are some suggestions that with the rise of OSINT, the role of HUMINT is declining.

However, there are some strong academic and professional papers refuting this suggestion.

There is no complete eradication of this asset anywhere


How can HUMINT be beneficial in tax analyses and collection?

The Social Media and Intelligence

Social Media Intelligence

The term social media Intelligence Analysis was advanced in a 2012 paper written by SirDavid Omand,Jamie Bartlettand Carl Miller

Social media intelligence (SMI or SOCMINT) represents the stack of technology solutions and methods used to monitor social media including social conversations and emerging trends. This intelligence is then analyzed and used to create meaningful content and make business decisions across many disciplines.

Importance of Social Media

Social media intelligence takes a deeper dive into the ‘listening’ tools of social media, which go beyond the ‘retweets’, ‘likes’ and ‘shares’ and actually depict the real show of what consumers feel and think of brands. Organizations can leverage this information and take advantage of this. The key to making the most out of social media is ‘listening’ to what your audience, competitors or the market in general think.

Making Most of SMI

Companies pay billions of Dollars to social media platforms. In doing so, they also leave the footprints of their success.

This information can be used to quantify the size/scope of the business.

When usual calculation models (such as ROI methods) are used in combination SMI, some amazing results can be achieved to ascertain the financial health of a company.

Despite its availability at a massive scale, it still warrants a methodical approach for collection & processing.

‘First, that it rests on solid methodological bedrock of collection, evidence, verification, understanding and application. Second, that the moral hazard it entails can be legitimately managed. This article offers a framework for how this can be done.’ – Sir David Omand , Jamie Bartlett & Carl Miller

Leave a Reply

Your email address will not be published. Required fields are marked *