background preloader

Intelligence Collection

Facebook Twitter

What the CIA can teach your business about information gathering on Twitter. Spying….. sounds sneaky, doesn’t it? But no, we’re not talking about casual Facebook stalking to see what your ex has been up to, or peeking at your neighbours through your curtains, we’re talking about taking a leaf out of intelligence agencies’ books and using Twitter as a powerful information gathering tool. Intelligence agencies worldwide have been reported to be using social networking sites as sources of tactical intelligence to make social and political predictions.

This comes as no surprise considering the public nature of Twitter that allows organisations to listen in to millions of conversations daily. Understanding what’s happening in your industry and what your target audience think is key for any business. Now, you could hire a secret agent or place a mole in your competitor’s head office, but the much less expensive (and much more sane!) Option is to use the information available to you on Twitter. Here’s how…. Market Intelligence Finance Industry Film Industry Health Industry. Gather Competitive Intelligence on Your Competition. One fast way to hamstring your small business is to ignore your competition. While you're busy ignoring them, they may be chomping away at your market share. If you don't know what the competition is up to, you can't make the intelligent decisions that will keep the customers you have or entice new ones.

But as a small business person, how can you gather the competitive intelligence you need to keep or expand your market share? Here are six ways: 1) Pay attention to their ads. Of course you read the local newspapers, watch the news, listen to the radio, and spend time surfing for information about your industry. 2) Visit regularly. The best competitive intelligence is current intelligence. Does your competition have a website? 3) Ask your business colleagues. The next time you're with your networking group or socializing with some business colleagues, ask some of them individually what they know about your competitors by name. 4) Ask their customers/clients. 5) Be a customer. 6) Sign up. How to Gather and Organize Valuable Competitive Intelligence Information. Without good information, the organization can have no information advantage in its search for competitive intelligence, but what constitutes good information?

The following benchmarks enable you to answer that question for yourself. Volume The volume of information required varies according to the question you’re trying to answer or the problem you’re trying to solve. You can’t measure it in megabytes or gigabytes or pages worth of documentation. The only real gauge is subjective: Are you confident that you have enough information to move forward? The volume of available information is often determined by scope — how narrow or broad the question or problem is. If your scope is global, the volume of information needed is obviously much larger than if you’re focusing on a local or regional issue.

You really can’t have too much information, as long as the information can be sorted by date and other criteria. Time relevance Accuracy Not all information is relevant or even accurate. Quality Value. Gathering intelligence on the recruitment and use of informers. Stories about the controversial use of informers have hit the headlines recently, with the planting of police officers in environmental groups causing serious embarrassment when it was found they'd had relationships and fathered children with activists. Reports of MI5 repeatedly approaching people assumed to be Muslims at UK airports with inducements to inform on their friends and neighbours have also been disastrous for community relations. The dislike – hatred even – people feel for telltales reflects the trauma that is felt when trust is broken, says Dr Steve Hewitt, senior lecturer in the department of American and Canadian studies at the University of Birmingham, and author of Snitch!

A History of the Modern Intelligence Informer. When it's a matter of deeply felt belief, the trauma is magnified. "It involves betrayal, and it's a very powerful emotion, whereas technology used for surveillance is impersonal," he says. Sometimes an intelligence operation goes badly wrong. Information Gathering in Intelligence Agencies. US spy leaks: How intelligence is gathered. 17 January 2014Last updated at 05:01 ET Documents leaked by whistleblower Edward Snowden suggest the US government has undertaken mass surveillance operations across the globe - including eavesdropping on US allies. The claims have led US Senate's intelligence committee to pledge to review the way the country's biggest intelligence organisation - the National Security Agency (NSA) - undertakes surveillance.

According to the leaks, what are the key methods the spy agency uses? 1. Accessing internet company data In June, the leaked documents revealed how the NSA had backdoor access to major technology companies. The files showed the agency had access to the servers of nine internet firms, including Facebook, Google, Microsoft and Yahoo, in order to track online communication under a surveillance programme known as Prism. However, the companies denied they had offered the agency "direct access" to their servers. Some experts have also questioned Prism's real power. Continue reading the main story. Intelligence Gathering Techniques. By Stephen Northcutt Chapter 8 from Network Intrusion Detection: An Analyst's Handbook, published by New Riders Publishing In Chapter 3,"Architectural Issues," we raised the issue that CIRTs have to focus primarily on compromised systems. And they do! How would you feel if you were on the phone with your CIRT trying to get information you need to deal with the latest nasty Trojan horse code, and they said, "Sorry, we are devoting all our resources to a new intelligence gathering technique"?

The wise intrusion analyst will devote a lot of attention to the prevention, detection, and reporting of mapping techniques. The line between exploit/denial of service and recon probe couldn't be thinner. This chapter contains many traces showing information gathering techniques. On This Page Network and Host Mapping NetBIOS Specific Traces Stealth Attacks Summary Network and Host Mapping The goal of host mapping is simply to determine what hosts or services are available in a facility. Broadcast ICMP. Intelligence Techniques. Secrecy and Protection The Committee of Secret Correspondence insisted that matters pertaining to the funding and instruction of intelligence agents be held within the Committee. In calling for the Committee members to "lay their proceedings before Congress," the Congress, by resolution, authorized "withholding the names of the persons they have employed, or with whom they have corresponded.

" On May 20, 1776, when the Committee's proceedings-with the sensitive names removed-were finally read in the Congress, it was "under the injunction of secrecy. " The Continental Congress, recognizing the need for secrecy in regard to foreign intelligence, foreign alliances and military matters, maintained "Secret Journals," apart from its public journals, to record its decisions in such matters. On November 9, 1775. the Continental Congress adopted its own oath of secrecy, one more stringent than the oaths of secrecy it would require of others in sensitive employment: Cover Disguise Secret Writing Dr.

How to run your own NSA spy program. Opinion June 22, 2013 07:01 AM ET Computerworld - Everybody's talking about PRISM, the U.S. government's electronic surveillance program. We don't know all the details about PRISM (also called US-984XN). But we learned enough from a badly designed PowerPoint presentation leaked by NSA contractor Edward Snowden to feel outraged by its reach and audacity. In a nutshell, PRISM (and related telephone surveillance programs) take a big data approach to spying on foreign terrorists using American servers. PRISM and related programs may harvest metadata of every phone call, every email, every Internet search, every Facebook post -- everything -- and use algorithmic filtering to find suspicious communication. Metadata is not the content of the phone call or email, but the information about them: Who contacted whom, when, from where and for how long.

PRISM inspires shock and awe. PRISM works. In fact, the ideas behind PRISM are built into a wide variety of tools available to everybody. 1. Www.unodc.org/documents/human-trafficking/Toolkit-files/08-58296_tool_5-12.pdf. A Private Detective's Approach to Intelligence Gathering. In today’s information age, the clichéd old-school private detective has dropped their fedora and library card and turned to the Internet and investigative databases to gather intelligence. Although this approach has tremendous value for its speed, cost effectiveness and ability to broadly search a wide variety of records, relying on the Internet and database records has exposed inconsistent and erroneous information. We have found the most effective and thorough way to gather intelligence is to utilize a multi-pronged investigative approach. The key to this investigative approach is to identify mutually supporting information from various disparate sources to gather a more accurate, comprehensive and complete picture.

Three-Pronged Approach As noted in the diagram above (printable version), we utilize three distinct approaches to gather information: Examples of This Investigative Approach Uncovering Critical Information. List of intelligence gathering disciplines. Intelligence Gathering Disciplines HUMINT [ edit ] Human Intelligence—gathered from a person on the ground. GEOINT [ edit ] Geospatial Intelligence—gathered from satellite, aerial photography, mapping/terrain data IMINT —Imagery Intelligence: gathered from satellite and aerial photography MASINT [ edit ] Measurement and Signature Intelligence OSINT [ edit ] Open Source Intelligence —gathered from open sources.

Can be further segmented by source type; Internet/General, Scientific/Technical and various HUMINT specialties (e.g. trade shows, association meetings, interviews, etc.) SIGINT [ edit ] Signals Intelligence—gathered from interception of signals COMINT —Communications Intelligence ELINT —Electronic Intelligence: gathered from non-communications electronic emissions FISINT —Foreign Instrumentation Signals Intelligence TELINT —Telemetry Intelligence: the collection and analysis of telemetry data from the target's missile or sometimes from aircraft tests. TECHINT [ edit ] CYBINT [ edit ] Category:Intelligence (information gathering) Intelligence.gov. Gathering Intelligence | MI5 - The Security Service. The collection of intelligence is at the heart of the Security Service's work. By gathering secret intelligence, we seek to obtain detailed knowledge of target organisations, their key personalities, infrastructure, intentions, plans, and capabilities.

We obtain intelligence through a number of means. The principal techniques for gathering intelligence are: Covert Human Intelligence Sources (i.e. agents). All of the techniques are used in accordance with the legal requirements established by the Regulation of Investigatory Powers Act 2000 (RIPA) and the associated Codes of Practice. The Security Service Act 1989 makes the Director General responsible for ensuring that there are effective arrangements within the Service to control when and how we obtain and disclose information. These arrangements, which are fully compliant with RIPA, are also designed to allow fast-moving investigations to proceed swiftly without being hampered by unnecessary bureaucracy. Intelligence Collection Disciplines.

Various kinds of intelligence—military, political, economic, social, environmental, health, and cultural—provide important information for policy decisions. Many people view intelligence as gathered through secret or covert means. While some intelligence is indeed collected through clandestine operations and known only at the highest levels of government, other intelligence consists of information that is widely available. There are five main ways of collecting intelligence that are often collectively referred to as "intelligence collection disciplines" or the "INTs.

" Human Intelligence (HUMINT) is the collection of information from human sources. The collection may be done openly, as when FBI agents interview witnesses or suspects, or it may be done through clandestine or covert means (espionage). Signals Intelligence (SIGINT) refers to electronic transmissions that can be collected by ships, planes, ground sites, or satellites.