Intelligence Base & Knowledge Base

OSINT and Other Category (Intelligence Base)

  1. OSINT

Open Source Intelligence. In point one, OSINT search and Collection of information through open sources or the public internet. In contrast to intelligence obtained through secret methods or hidden, OSINT utilizes information available to general.

  1. MASINT

Signature Measurement and Intelligence focuses on collection and analysis of data from various forms of temperature measurements and changes or climate. In contrast to intelligence which is based on visual reconnaissance or communications, MASINT relies on technology to detect and analyzing signals that cannot be detected directly by human senses.

  1. GEOINT

Geospatial Intelligence focuses on geographic or system analysis geographic information (GIS) to collect and analyze geography or satellite imagery. Usually used for military or Speakers for analyzing information from satellite images, information a region and place

  1. IMINT

Image Intelligence focuses on analyzing images or footage media such as videos or photos, visual analysis from various sources examples of satellite images, airplanes, building structures and cities. In process This an analyst will extract information from an image, for example in a mountainous area identifying the height of a plains, terrain and determining coordinates

  1. DARKINT

Darkweb Intelligence focuses on the darkweb. Collection information and digital traces contained in darkwb (Dark Site) Usually used to track cyber threat actors, buying and selling illegal, human trafficking and monitoring crimes on the internet

  1. SOCMINT

Social Media Intelligence focuses on gathering information through social media platforms such as Facebook, Instagram, Twitter and others. This collection of information can be used to view activity as well as monitoring on social media, the information collected various things such as usernames, posts, trending, dates and other things which can be used to track information

  1. SIGINT

Signals intelligence is intelligence derived from signals and electronic systems used by foreign targets, such as communications systems, radars, and weapons systems to determine the capabilities, actions, and intentions of foreign enemies

  1. ELINT

Electronic Intelligence focuses its attention on the Radar Systems and to the analysis of their characteristics. Usually used in military applications, information collected generally does not include personal communications. The sensors used to collect data may be active or passive. A particular signal is analyzed and compared with data recorded for a known signal type

  1. HUMINT

Human Intelligence focuses collecting information or intelligence from humans and provided by human resources. For example interrogations and conversations, interviews, surveys, espionage with people who have access to information. Surveillance of targets, uncovering people with potential access to information, approaches to targets

  1. OPSEC (Operational security)

Operational Security is a risk management and security process and strategy used to classify and protect sensitive information and prevent it from falling into unauthorized hands or people. In implementing OPSEC, information will be classified and steps will be taken to identify potential threats and vulnerabilities that may occur in that sensitive information. The approach involves analyzing an organization's systems and operations from the perspective of those who could potentially attack and retrieve sensitive information. Several applications in practice such as monitoring behavior, social media, and implementing best security practices will reduce the risk of exposure of sensitive information.

  1. FISINT

Foreign instrumentation signals intelligence involves collecting information from foreign nationals who are testing or using aerospace, surface, or sub-surface systems. Foreign instrumentation signals intelligence involves the collection of information from foreign nationals who are testing or using aerospace, surface, or subsurface systems, related to the testing and operational deployment of foreign aerospace, surface, and subsurface systems. FISINT is not in ordinary human language, but in machine-to-machine (instrumentation) language or in a combination of ordinary human language and instrumentation language. FISINT is also considered a subset of MASINT (intelligence measurement and signature)

  1. COMINT

Communications intelligence focuses information gathered from the communications between individuals or groups of individuals, including telephone conversations, text messages, email conversations, radio calls, and online interactions on the analysis of signals containing speech or text. Tapping voice, text or signal channels is aimed at finding information about voice, text and signal transmissions. That can lead to determining a number of intelligence considerations about the communications, such as signal bandwidth and protocol, modulation type and rate, and the radio frequency used

  1. CSINT

CSINT is Cyber ​​Security Intelligence In the world of intelligence, CSINT refers to and analysis related to cyber security which is used to protect computer systems, networks and data from threat information and cyber attacks. CSINT can also involve the use of classified information sources, such as intercepted communications or data from surveillance systems, typically used by authorized investigators. Examples include specialist analytical and forensic tools, secret geolocation service, A collection of confidential data provided by law enforcement agencies, subscription and special tools

Also

CSINT stands for “Closed-Source Intelligence”. This is information that is not publicly available, such as law enforcement data, education records, banking records, or medical records, this come from closed source like informan or other things

  1. Espionage

Espionage is the illegal or unauthorized collection of confidential or sensitive information. Espionage is usually carried out to obtain data of strategic or tactical value, such as military, technical, business or political information. These activities often include infiltrating organizations, monitoring their activities, or using obfuscation techniques to access protected information

  1. Satellite Imagery

Satellite Imagery focuses on the collection of GIS, Earth imagery, space operated by governments and companies around the world. Useful for analyzing changes on Earth, maps and images, detection of climate change and weather, disasters, fires or leaks, air and maritime use. Satellite types include Visible Imagery, Infrared Imagery. It can be utilized for monitoring especially such as national security, war, natural resources, disasters, maritime, academic research, and other things. There are many satellite providers such as Google, Bing, Maxar, Planet, Himawari, NASA, Sentinel etc

  1. Interrogation

Interrogation focuses on the examination of a person through verbal questioning by an authorized or public person. Interrogation is the main task in the investigation process. The goal is to obtain information about information, true information, so that it can help solve the case. It contains the 5W+1H (What, When, Who, Why, Where, and How)

  1. Forensics

Forensics focuses on the science used to assist the process of justice through the application of science. Proving the existence of a crime or offense, forensics can be done in Medical, IT (Digital), Chemistry and Biology, Psychology. Examples include Digital Forensics, Forensic Pathology, Mobile Forensics

  1. Sockpuppet

Sockpuppet focuses on identity in the internet world. The goal is to obscure identity. Sockpuppets can also be used as research accounts to hide the identity of OSINT investigators. With this account, investigators can access information that requires an account to access

  1. Astronomy

Astronomy focuses on the study of celestial bodies, the phenomena of the universe and the processes that occur in space. It is also known as star science or phalactic science. Why is OSINT or investigation necessary? It can be utilized to determine time, Know the distribution and movement of celestial bodies, Clues to natural phenomena, Weather prediction

  1. Cryptography

Cryptography focuses on the study of mathematical techniques to keep information secure. Cryptography uses codes, hashes, and signature algorithms to protect information, for example like RSA, DSA

  1. Reconstruction

Reconstruction focuses on cases that can provide a picture of how events really happened. Although not necessarily also the suspects, related, who provide explanations are telling the truth. In the reenactment there are several methods such as Interview, Interrogation, Confrontation, Reconstruction. Why is it necessary? Reconstruction is carried out by investigators to complete case files, develop investigations, and get a picture of how the incident occurred

  1. CIA Triad

The CIA Triad is a model used as a guide in information security that consists of three aspects, namely Confidentiality, Integrity, Availability the most important concept in information security is adequately protecting those assets

  1. Text Intelligence

Focusing on text analysis or text mining, this is useful for analyzing whether the text is generated by AI, Plagiarism, Clustering and other things, this is used for social media analysis, such as word repetition, mentions, similar text and words to be selected and processed (clsutering) along with time and other things

  1. Propaganda

Propaganda is a type of communication that seeks to influence views and reactions, without regard to the true or false value of the message conveyed

  1. Wiretapping

Wiretapping is an activity to listen to, record, alter, distort, or record the transmission of electronic information or electronic documents. Tapping can be done through wired communication networks or wireless networks

  1. 5W + 1H

5W 1H is a question-and-answer and problem-solving method that consists of 6 questions, namely what, who, when, where, why, and how. 5W 1H can be used in various situations, such as: News writing 5W 1H is a standardized guide for composing news texts. The answers to the 5W 1H questions will help the writer organize the news information well. Problem solving 5W 1H can help look at ideas and issues from multiple perspectives, helping to understand the problem and find its root causes. 5W 1H process improvement can be used as a continuous process improvement technique in an organization

  1. Sociology

Social studies is the study of humans as individuals, communities and societies, and their interactions with each other and the environment. It also studies how humans organize themselves, international relations, and wealth. Social sciences include various fields of study, such as: Anthropology, Economics, Political science, Psychology, Sociology

  1. BIAS

Bias is a tendency or preference that influences the way a person thinks, acts or makes decisions. Biases can arise in a variety of contexts, such as in decision-making, judgment of others, or interpretation of information. Biases can be positive or negative, and are often unconscious (a prejudiced presentation of material) It should be emphasized that everyone has BIAS, our role is to study so as not to get carried away with our own BIAS, there are factors such as environment, point of view and other things. We should not be complacent about being stupid or anything with the BIAS we have

  1. FININT

Financial intelligence is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Generally the term applies in the context of law enforcement and related activities. One of the main purposes of financial intelligence is to identify financial transactions that may involve tax evasion, money laundering or some other criminal activity

  1. VOIP

VoIP stands for Voice over Internet Protocol, a technology that allows users to make voice and video calls over the internet e.g WhatsApp, Discord

  1. Linguistics

Linguistics is the study of language in general, including local languages, Indonesian languages, or foreign languages. Linguistics is also called general linguistics. In linguistics, language is studied with its various aspects, such as Language sounds (phonology), Word forms (morphology), Sentences (syntax), Word meanings (semantics), Language context

  1. Chronolocation

Chronolocation refers to a way of mapping or relating an event or occurrence to the time and place where it happened. To describe an event or phenomenon that happened in a certain place and time

  1. Facade

Facade is the outer part of a building, usually referring to the front, but the facade can also refer to the sides and back. The facade includes elements such as walls, windows, doors, decorations, and materials used, and is often the most prominent element in forming the first impression of a building

  1. Explosive ordnance (EO)

EO is a term used to refer to various types of weapons or devices that contain explosives and are designed to explode or cause damage when triggered. Explosive ordnance includes a number of devices that can be found in military or war contexts

  1. UXO (Unexploded Ordnance)

UXO is a term that refers to explosive devices that have not exploded or failed to detonate as intended, and remain dangerous even when inactive. UXO can be any type of weapon or device used in warfare or military activity, such as a bomb, grenade, artillery shell, landmine or rocket

  1. Euphoria

Euphoria is an emotional state characterized by feelings of ecstasy, excessive happiness, or overwhelming joy

  1. Psychological Operations (PsyOps)

Psychological Operations is a strategy used to influence the thoughts, emotions, and behaviors of individuals or specific groups, with the aim of achieving military or political advantages. PsyOps involves the use of information, propaganda, and communication techniques to influence the perceptions and attitudes of adversaries or even the general public

  1. Buzzer

A "buzzer" is a person or group who actively promotes or spreads specific messages, opinions, or content on social media platforms to influence public opinion, support a political candidate or party, promote a brand, or sway a particular audience. In essence, a buzzer acts as an online influencer or paid promoter who may share posts, tweets, or videos in a way that amplifies a particular narrative or agenda. This practice is often seen in political campaigns, product promotions, or public relations efforts, where buzzers may be paid or hired to generate attention and engagement through social media

  1. Sketches

Sketches refer to drawings or illustrations made to depict individuals or objects relevant to an intelligence operation or investigation. It can be a drawing of a person's face (facial sketch), a map, or a diagram depicting a location, building, or other significant object. They are used to assist intelligence agents in identifying individuals or understanding a particular situation based on the information that has been gathered

  1. Slang

Slang is a seasonal, unofficial language variety used by teenagers or certain social groups for internal communication with the intention that non-members of the group will not understand. You can check at in the Slang dictionary or Slang language in the region

  1. Integrity

Integrity is a trait or state that shows complete unity, honesty, and authority. Integrity can also be defined as consistency between one's words, beliefs, and actions

  1. Unique Data

Unique Data mean in searching for data or information, specify unique data such as time, region, posture, telephone number, identity, email address or brand or other things that unique, some of these things will be useful for narrowing down information so that it is not too broad

  1. Hunch (feeling)

A hunch is a person's ability to sense what will happen in the future. It can also be defined as intuition or innate knowledge. Hunches can arise after seeing circumstances, indications, or signs. It can be a feeling or a gut feeling that comes before something happens

  1. Pun

A pun is a play on words that changes the meaning of a word or phrase into a new one, resulting in a different meaning from the original. It is often used to convey humor, satire, or jokes. Even to censor or avoid information, for example from a wiretap, it can usually be translated into typos, emojis or words that only the community understands like a code or morse

  1. Instincts

Instincts are patterns of behavior that are inborn and not learned. Instinct is also called instinct or garizah. Instincts have several functions, including: Adapting to the environment, Survival, Breeding. Strong instincts can help a person make better decisions and avoid adverse situations. We often use instinct and guesswork when searching for information

  1. Provocation

Provocation is an act or behavior done intentionally to trigger an emotional reaction, controversy, or debate. Provocation can also be defined as the act of inciting or manipulating someone

  1. Sentiment analysis

Sentiment analysis is the process of analyzing digital text to determine whether the emotional tone of the message is positive, negative, or neutral. Today, companies have large volumes of text data such as emails, customer support chat transcripts, social media comments, and reviews. It used by Journalist and news portal or other things

  1. UAV (Unmanned Aerial Vehicle)

A UAV (Unmanned Aerial Vehicle) is an unmanned aircraft used to fly in the air and collect data or images. In the context of OSINT (Open Source Intelligence), these UAVs are used to collect information from the sky, such as pictures or videos of a place, which can be analysed to find out things

  1. Small Arms and Light Weapons (SALW)

SALW stands for “Small Arms and Light Weapons”, which refers to various types of light weapons that can be carried and used by one or two people. The term is often used in the context of global security and stability, especially in relation to the circulation of illegal weapons and their negative impacts

  1. Anti Money Laundering (AML)

AML (Anti-Money Laundering) refers to a set of actions and procedures designed to prevent and detect money laundering activities. Money laundering is the process of hiding the origins of money obtained from illegal activities, such as corruption or drug trafficking, to make it appear legitimate. AML includes various steps taken by banks and other financial institutions, such as verifying customer identities, tracking suspicious transactions, and reporting suspicious activities to the relevant authorities. The goal is to protect the financial system from misuse

  1. Technical Surveillance Counter-Measures (TSCM)

Technical Surveillance Counter-Measures (TSCM) is a way to protect important information from being eavesdropped or stolen. For example, if someone tries to listen in on conversations or spy using hidden devices like microphones or cameras, TSCM will find and disable those devices. The goal is to protect privacy and ensure information security

  1. Personally Identifiable Information (PII)

PII (Personally Identifiable Information) refers to any information that can be used to identify an individual. This includes details like your name, address, phone number, email, face, fingerprint, retina, social security number, or even online identifiers like your IP address. Protecting PII is important because it helps prevent identity theft and ensures privacy

  1. Protected Health Information (PHI)

PHI (Protected Health Information) refers to any information about an individual's health status, healthcare provision, or payment for healthcare services that is protected by privacy laws, like HIPAA (Health Insurance Portability and Accountability Act) in the U.S. PHI includes things like medical records, test results, insurance information, and other personal health details that must be kept confidential to protect a person's privacy

  1. Cyber Incident Response (CIR)

CIR (Cyber Incident Response) is a structured process for detecting, analyzing, handling, and recovering systems from cybersecurity incidents, such as malware attacks, data leaks, or hacking. The goal is to minimize the impact of the attack, secure the system, and collect evidence for forensics or follow-up investigations

  1. Grey Literature

Grey literature is a type of information produced outside traditional publishing and distribution channels, such as scientific journals or books. Examples include research reports, conference papers, theses, dissertations, government documents, and other similar materials. Grey literature is often not indexed in general bibliographic databases and may be difficult to find or access through normal publication channels

  1. Direction Finding

Direction Finding (DF) is the process of determining the direction from which a radio signal or electromagnetic wave originates. It involves the use of antennas and receivers to detect and analyze signals, enabling the location of the signal source to be determined. DF has a wide range of applications, including military, aviation, maritime, and even sports such as radio orienteering

  1. Undercover

Undercover generally means disguising oneself or working secretly without revealing one's true identity, an investigative technique used by law enforcement agencies to infiltrate a group or organization.

Last updated