Chapter 2: Technology, Intelligence and Security Assessments
Intelligence refers to discrete or secret information with currency and relevance, and the abstraction, evaluation, and understanding of such information for its accuracy and value. Sometimes called "active data" or "active intelligence", intelligence typically regards the current plans, decisions, and actions of people, as these may have urgency or may otherwise be considered "valuable" from the point of view of the intelligence-gathering entity. Active intelligence is treated as a constantly mutable component, or variable, within a larger equation of understanding the secret, covert, or otherwise private "intelligence" of an opponent, or competitor, to answer questions or obtain advance warning of events and movements deemed to be important or otherwise relevant.
"Intel" is in contrast with "data", which typically refers to precise or particular information, and "fact", which typically refers to verified information.
As used by intelligence agencies and related services, "intelligence" refers integrally to both active data as well as the process and the result of gathering and analysing such information, as these together form a cohesive network. In a sense, this usage of "intelligence" at the national level may be somewhat associated with the concept of social intelligence, albeit one, which is tied to, localised or nationalist tradition, politics, law, and the enforcement thereof.
2.1 Types of Intelligence
The types of intelligence listed below are principally based on the various modes used in the collection of intelligence. These reference the various means through which data collection is made. Human Intelligence (HUMINT) is the collection of information from people. Signals Intelligence (SIGINT) is the collection of electronic communications information such as phone conversations or communications data. Measurement and Signature Intelligence (MASINT) is information collected by sensors developed to record different characteristics of a target. Imagery Intelligence (IMINT) is information collected from photographs and imagery. Open Source Intelligence (OSINT) is information that is collected through channels and avenues that are available in the public domain. These go beyond that of the cyber and social media domain and include that of any and all means of open and available data. Surveillance is the activity of watching and following a target. Cyber Intelligence refers to the collection of information derived through ‘cyber’ intrusions, (i.e. computer hacking).
The following are 10 different types of Intelligence that can be gathered.
1 | HUMINT' (Human Intelligence) |
Gathered from a person on the ground. Through the means of:
|
2 | GEOINT (Geospatial Intelligence) |
Gathered from satellite, aerial photography, mapping/terrain data. Most often using the method of IMINT (Imagery Intelligence). |
3 | MASINT (Measurement and Signature Intelligence) |
Gathered from a host of alternative platforms:
|
4 | OSINT (Open Source Intelligence) |
Gathered from open sources. Can be further segmented by source type; Internet/General, Scientific/Technical and various HUMINT specialties (e.g. trade shows, association meetings, interviews, etc.). |
5 | SIGINT (Signals Intelligence) |
Gathered from interception of signals. |
6 | COMINT (Communications Intelligence) |
Gathered from the communications of individuals. These include communication across a variety of platforms including but not limited to telephone conversations, text messages and various types of online interactions. |
7 | ELINT (Electronic Intelligence) |
Gathered from non-communications electronic emission. These often include that of FISINT—Foreign Instrumentation Signals Intelligence and TELINT—Telemetry Intelligence: the collection and analysis of telemetry data from the target's missile or sometimes from aircraft tests. |
8 | TECHINT (Technical Intelligence) |
Gathered from analysis of weapons and equipment used by the armed forces of foreign nations, or environmental conditions. |
9 | MEDINT (Medical Intelligence) |
Gathered from analysis of medical records and/or actual physiological examinations to determine health and/or particular ailments/allergenic conditions for exploitation. |
10 | FININT (Financial Intelligence) |
Gathered from analysis of monetary transactions. |
2.2 Intelligence Cycle and Security Assessment
Intelligence as used here, when done properly, serves a function for organisations similar to that which intelligence (trait) serves for individual humans and animals. Intelligence collection is often controversial and seen as a threat to privacy. It additionally highlights the dominant challenge between the ideas of safety and security.
Intelligence is essential for government policy formation and operations and while usually associated with warfare, intelligence can also be used to preserve peace. The wrongful and inappropriate collection and use of intelligence sparks fears and discussions of impact on existing privacy laws of the state.
The intelligence cycle above is a means through which methods of collective dovetail within. At its crux, threat assessments are an in-depth, analytical analysis of existing or future threats. Threat Assessments are centred on the threat, risk and vulnerability assessment that are undertaken. Effective threat assessments help provide a level of protective intelligence to both strategic level where policy decision decisions are made and to the front line where active work is done to protect frontlines of defence of a state.
Do the objectives of the Intelligence Cycle change with businesses or the private sector?
When conducted by the private sector, it is important to consider the difference in the goals of security and safety. “Whereas government institutions are committed to the safety and security of citizens at virtually any cost, the core objectives of businesses revolve around profit. Security for personnel, assets, or the enterprise must be balanced against costs and revenue goals.” (Davydoff, 2017)

Discussion
Technology used in intelligence work can also and often does backfire. This is because criminals and terrorists often gain access to the same technology used by the intelligence community.
Why is this the case?