# Intelligence Base & Knowledge Base

## OSINT and Other Category (Intelligence Base)

> Knowledge base and acronym likely glosarium

1. ## OSINT

Open Source Intelligence. In point one, OSINT search and Collection of information through open sources or the public internet. In contrast to intelligence obtained through secret methods or hidden, OSINT utilizes information available to general.

2. ## MASINT

Signature Measurement and Intelligence focuses on collection and analysis of data from various forms of temperature measurements and changes or climate. In contrast to intelligence which is based on visual reconnaissance or communications, MASINT relies on technology to detect and analyzing signals that cannot be detected directly by human senses.

3. ## GEOINT

Geospatial Intelligence focuses on geographic or system analysis geographic information (GIS) to collect and analyze geography or satellite imagery. Usually used for military or Speakers for analyzing information from satellite images, information a region and place

4. ## IMINT

Image Intelligence focuses on analyzing images or footage media such as videos or photos, visual analysis from various sources examples of satellite images, airplanes, building structures and cities. In process This an analyst will extract information from an image, for example in a mountainous area identifying the height of a plains, terrain and determining coordinates

5. ## DARKINT

Darkweb Intelligence focuses on the darkweb. Collection information and digital traces contained in darkwb (Dark Site) Usually used to track cyber threat actors, buying and selling illegal, human trafficking and monitoring crimes on the internet

6. ## SOCMINT

Social Media Intelligence focuses on gathering information through social media platforms such as Facebook, Instagram, Twitter and others. This collection of information can be used to view activity as well as monitoring on social media, the information collected various things such as usernames, posts, trending, dates and other things which can be used to track information

7. ## SIGINT

Signals intelligence is intelligence derived from signals and electronic systems used by foreign targets, such as communications systems, radars, and weapons systems to determine the capabilities, actions, and intentions of foreign enemies

8. ## ELINT

Electronic Intelligence focuses its attention on the Radar Systems and to the analysis of their characteristics. Usually used in military applications, information collected generally does not include personal communications. The sensors used to collect data may be active or passive. A particular signal is analyzed and compared with data recorded for a known signal type

9. ## HUMINT

Human Intelligence focuses collecting information or intelligence from humans and provided by human resources. For example interrogations and conversations, interviews, surveys, espionage with people who have access to information. Surveillance of targets, uncovering people with potential access to information, approaches to targets

10. ## OPSEC (Operational security)

Operational Security is a risk management and security process and strategy used to classify and protect sensitive information and prevent it from falling into unauthorized hands or people. In implementing OPSEC, information will be classified and steps will be taken to identify potential threats and vulnerabilities that may occur in that sensitive information. The approach involves analyzing an organization's systems and operations from the perspective of those who could potentially attack and retrieve sensitive information. Several applications in practice such as monitoring behavior, social media, and implementing best security practices will reduce the risk of exposure of sensitive information.

11. ## FISINT

Foreign instrumentation signals intelligence involves collecting information from foreign nationals who are testing or using aerospace, surface, or sub-surface systems. Foreign instrumentation signals intelligence involves the collection of information from foreign nationals who are testing or using aerospace, surface, or subsurface systems, related to the testing and operational deployment of foreign aerospace, surface, and subsurface systems. FISINT is not in ordinary human language, but in machine-to-machine (instrumentation) language or in a combination of ordinary human language and instrumentation language. FISINT is also considered a subset of MASINT (intelligence measurement and signature)

12. ## COMINT

Communications intelligence focuses information gathered from the communications between individuals or groups of individuals, including telephone conversations, text messages, email conversations, radio calls, and online interactions on the analysis of signals containing speech or text. Tapping voice, text or signal channels is aimed at finding information about voice, text and signal transmissions. That can lead to determining a number of intelligence considerations about the communications, such as signal bandwidth and protocol, modulation type and rate, and the radio frequency used

13. ## CSINT

CSINT is Cyber ​​Security Intelligence In the world of intelligence, CSINT refers to and analysis related to cyber security which is used to protect computer systems, networks and data from threat information and cyber attacks. CSINT can also involve the use of classified information sources, such as intercepted communications or data from surveillance systems, typically used by authorized investigators. Examples include specialist analytical and forensic tools, secret geolocation service, A collection of confidential data provided by law enforcement agencies, subscription and special tools

Also&#x20;

CSINT stands for “Closed Source Intelligence”. This is information that is not publicly available, such as law enforcement data, goverment data, education records, banking records, or medical records, this come from closed source like informan, goverment database, banking database and etc or other things

*\***Notes** : The meaning depends on the context being discussed. For example, “private data” in CSINT can refer to different things. CSINT may mean Cyber Security Intelligence, which relates to cyber activities or operations*

14. ## Espionage

Espionage is the illegal or unauthorized collection of confidential or sensitive information. Espionage is usually carried out to obtain data of strategic or tactical value, such as military, technical, business or political information. These activities often include infiltrating organizations, monitoring their activities, or using obfuscation techniques to access protected information

15. ## Satellite Imagery

Satellite Imagery focuses on the collection of GIS, Earth imagery, space operated by governments and companies around the world. Useful for analyzing changes on Earth, maps and images, detection of climate change and weather, disasters, fires or leaks, air and maritime use. Satellite types include Visible Imagery, Infrared Imagery. It can be utilized for monitoring especially such as national security, war, natural resources, disasters, maritime, academic research, and other things. There are many satellite providers such as Google, Bing, Maxar, Planet, Himawari, NASA, Sentinel etc

16. ## Interrogation

Interrogation focuses on the examination of a person through verbal questioning by an authorized or public person. Interrogation is the main task in the investigation process. The goal is to obtain information about information, true information, so that it can help solve the case. It contains the 5W+1H (What, When, Who, Why, Where, and How)

17. ## Forensics

Forensics focuses on the science used to assist the process of justice through the application of science. Proving the existence of a crime or offense, forensics can be done in Medical, IT (Digital), Chemistry and Biology, Psychology. Examples include Digital Forensics, Forensic Pathology, Mobile Forensics

18. ## Sockpuppet

Sockpuppet focuses on identity in the internet world. The goal is to obscure identity. Sockpuppets can also be used as research accounts to hide the identity of OSINT investigators. With this account, investigators can access information that requires an account to access

19. ## Astronomy

Astronomy focuses on the study of celestial bodies, the phenomena of the universe and the processes that occur in space. It is also known as star science or phalactic science. Why is OSINT or investigation necessary? It can be utilized to determine time, Know the distribution and movement of celestial bodies, Clues to natural phenomena, Weather prediction

20. ## Cryptography

Cryptography focuses on the study of mathematical techniques to keep information secure. Cryptography uses codes, hashes, and signature algorithms to protect information, for example like RSA, DSA

21. ## Reconstruction

Reconstruction focuses on cases that can provide a picture of how events really happened. Although not necessarily also the suspects, related, who provide explanations are telling the truth. In the reenactment there are several methods such as Interview, Interrogation, Confrontation, Reconstruction. Why is it necessary? Reconstruction is carried out by investigators to complete case files, develop investigations, and get a picture of how the incident occurred

22. ## CIA Triad

The CIA Triad is a model used as a guide in information security that consists of three aspects, namely Confidentiality, Integrity, Availability the most important concept in information security is adequately protecting those assets

23. ## Text Intelligence

Focusing on text analysis or text mining, this is useful for analyzing whether the text is generated by AI, Plagiarism, Clustering and other things, this is used for social media analysis, such as word repetition, mentions, similar text and words to be selected and processed (clsutering) along with time and other things

24. ## Propaganda

Propaganda is a type of communication that seeks to influence views and reactions, without regard to the true or false value of the message conveyed

25. ## Wiretapping

Wiretapping is an activity to listen to, record, alter, distort, or record the transmission of electronic information or electronic documents. Tapping can be done through wired communication networks or wireless networks

26. ## 5W + 1H

5W 1H is a question-and-answer and problem-solving method that consists of 6 questions, namely what, who, when, where, why, and how. 5W 1H can be used in various situations, such as: News writing 5W 1H is a standardized guide for composing news texts. The answers to the 5W 1H questions will help the writer organize the news information well. Problem solving 5W 1H can help look at ideas and issues from multiple perspectives, helping to understand the problem and find its root causes. 5W 1H process improvement can be used as a continuous process improvement technique in an organization

27. ## Sociology

Social studies is the study of humans as individuals, communities and societies, and their interactions with each other and the environment. It also studies how humans organize themselves, international relations, and wealth. Social sciences include various fields of study, such as: Anthropology, Economics, Political science, Psychology, Sociology

28. ## BIAS

Bias is a tendency or preference that influences the way a person thinks, acts or makes decisions. Biases can arise in a variety of contexts, such as in decision-making, judgment of others, or interpretation of information. Biases can be positive or negative, and are often unconscious (a prejudiced presentation of material) It should be emphasized that everyone has BIAS, our role is to study so as not to get carried away with our own BIAS, there are factors such as environment, point of view and other things. We should not be complacent about being stupid or anything with the BIAS we have

29. ## FININT

Financial intelligence is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Generally the term applies in the context of law enforcement and related activities. One of the main purposes of financial intelligence is to identify [financial transactions](https://en.wikipedia.org/wiki/Financial_transaction) that may involve [tax evasion](https://en.wikipedia.org/wiki/Tax_evasion), [money laundering](https://en.wikipedia.org/wiki/Money_laundering) or some other criminal activity

30. ## VOIP

VoIP stands for Voice over Internet Protocol, a technology that allows users to make voice and video calls over the internet e.g WhatsApp, Discord

32. ## Linguistics

Linguistics is the study of language in general, including local languages, Indonesian languages, or foreign languages. Linguistics is also called general linguistics. In linguistics, language is studied with its various aspects, such as Language sounds (phonology), Word forms (morphology), Sentences (syntax), Word meanings (semantics), Language context

33. ## Chronolocation

Chronolocation refers to a way of mapping or relating an event or occurrence to the time and place where it happened. To describe an event or phenomenon that happened in a certain place and time

34. ## Facade

Facade is the outer part of a building, usually referring to the front, but the facade can also refer to the sides and back. The facade includes elements such as walls, windows, doors, decorations, and materials used, and is often the most prominent element in forming the first impression of a building

35. ## Explosive ordnance (EO)

EO is a term used to refer to various types of weapons or devices that contain explosives and are designed to explode or cause damage when triggered. Explosive ordnance includes a number of devices that can be found in military or war contexts

36. ## UXO (Unexploded Ordnance)

UXO is a term that refers to explosive devices that have not exploded or failed to detonate as intended, and remain dangerous even when inactive. UXO can be any type of weapon or device used in warfare or military activity, such as a bomb, grenade, artillery shell, landmine or rocket

37. ## Euphoria

Euphoria is an emotional state characterized by feelings of ecstasy, excessive happiness, or overwhelming joy

38. ## Psychological Operations (PsyOps)

Psychological Operations is a strategy used to influence the thoughts, emotions, and behaviors of individuals or specific groups, with the aim of achieving military or political advantages. PsyOps involves the use of information, propaganda, and communication techniques to influence the perceptions and attitudes of adversaries or even the general public

39. ## Buzzer

A "buzzer" is a person or group who actively promotes or spreads specific messages, opinions, or content on social media platforms to influence public opinion, support a political candidate or party, promote a brand, or sway a particular audience. In essence, a buzzer acts as an online influencer or paid promoter who may share posts, tweets, or videos in a way that amplifies a particular narrative or agenda. This practice is often seen in political campaigns, product promotions, or public relations efforts, where buzzers may be paid or hired to generate attention and engagement through social media

40. ## Sketches

Sketches refer to drawings or illustrations made to depict individuals or objects relevant to an intelligence operation or investigation. It can be a drawing of a person's face (facial sketch), a map, or a diagram depicting a location, building, or other significant object. They are used to assist intelligence agents in identifying individuals or understanding a particular situation based on the information that has been gathered

41. ## Slang

Slang is a seasonal, unofficial language variety used by teenagers or certain social groups for internal communication with the intention that non-members of the group will not understand. You can check at in the Slang dictionary or Slang language in the region

42. ## Integrity

Integrity is a trait or state that shows complete unity, honesty, and authority. Integrity can also be defined as consistency between one's words, beliefs, and actions

43. ## Unique Data

Unique Data mean in searching for data or information, specify unique data such as time, region, posture, telephone number, identity, email address or brand or other things that unique, some of these things will be useful for narrowing down information so that it is not too broad

44. ## Hunch (feeling)

A hunch is a person's ability to sense what will happen in the future. It can also be defined as intuition or innate knowledge. Hunches can arise after seeing circumstances, indications, or signs. It can be a feeling or a gut feeling that comes before something happens

45. ## Pun

A pun is a play on words that changes the meaning of a word or phrase into a new one, resulting in a different meaning from the original. It is often used to convey humor, satire, or jokes. Even to censor or avoid information, for example from a wiretap, it can usually be translated into typos, emojis or words that only the community understands like a code or morse

46. ## Instincts

Instincts are patterns of behavior that are inborn and not learned. Instinct is also called instinct or garizah. Instincts have several functions, including: Adapting to the environment, Survival, Breeding. Strong instincts can help a person make better decisions and avoid adverse situations. We often use instinct and guesswork when searching for information

47. ## Provocation

Provocation is an act or behavior done intentionally to trigger an emotional reaction, controversy, or debate. Provocation can also be defined as the act of inciting or manipulating someone

48. ## Sentiment analysis

Sentiment analysis is the process of analyzing digital text to determine whether the emotional tone of the message is positive, negative, or neutral. Today, companies have large volumes of text data such as emails, customer support chat transcripts, social media comments, and reviews. It used by Journalist and news portal or other things

49. ## UAV (Unmanned Aerial Vehicle)

A UAV (Unmanned Aerial Vehicle) is an unmanned aircraft used to fly in the air and collect data or images. In the context of OSINT (Open Source Intelligence), these UAVs are used to collect information from the sky, such as pictures or videos of a place, which can be analysed to find out things

50. ## Small Arms and Light Weapons (SALW)

SALW stands for “Small Arms and Light Weapons”, which refers to various types of light weapons that can be carried and used by one or two people. The term is often used in the context of global security and stability, especially in relation to the circulation of illegal weapons and their negative impacts

51. ## Anti Money Laundering (AML)

AML (Anti-Money Laundering) refers to a set of actions and procedures designed to prevent and detect money laundering activities. Money laundering is the process of hiding the origins of money obtained from illegal activities, such as corruption or drug trafficking, to make it appear legitimate. AML includes various steps taken by banks and other financial institutions, such as verifying customer identities, tracking suspicious transactions, and reporting suspicious activities to the relevant authorities. The goal is to protect the financial system from misuse

52. ## Technical Surveillance Counter-Measures (TSCM)

Technical Surveillance Counter-Measures (TSCM) is a way to protect important information from being eavesdropped or stolen. For example, if someone tries to listen in on conversations or spy using hidden devices like microphones or cameras, TSCM will find and disable those devices. The goal is to protect privacy and ensure information security

53. ## Personally Identifiable Information (PII)

PII (Personally Identifiable Information) refers to any information that can be used to identify an individual. This includes details like your name, address, phone number, email, face, fingerprint, retina, social security number, or even online identifiers like your IP address. Protecting PII is important because it helps prevent identity theft and ensures privacy

54. ## Protected Health Information (PHI)

PHI (Protected Health Information) refers to any information about an individual's health status, healthcare provision, or payment for healthcare services that is protected by privacy laws, like HIPAA (Health Insurance Portability and Accountability Act) in the U.S. PHI includes things like medical records, test results, insurance information, and other personal health details that must be kept confidential to protect a person's privacy

55. ## Cyber Incident Response (CIR)

CIR (Cyber Incident Response) is a structured process for detecting, analyzing, handling, and recovering systems from cybersecurity incidents, such as malware attacks, data leaks, or hacking. The goal is to minimize the impact of the attack, secure the system, and collect evidence for forensics or follow-up investigations

56. ## Grey Literature

Grey literature is a type of information produced outside traditional publishing and distribution channels, such as scientific journals or books. Examples include research reports, conference papers, theses, dissertations, government documents, and other similar materials. Grey literature is often not indexed in general bibliographic databases and may be difficult to find or access through normal publication channels

57. ## Direction Finding

Direction Finding (DF) is the process of determining the direction from which a radio signal or electromagnetic wave originates. It involves the use of antennas and receivers to detect and analyze signals, enabling the location of the signal source to be determined. DF has a wide range of applications, including military, aviation, maritime, and even sports such as radio orienteering

58. ## Undercover

Undercover generally means disguising oneself or working secretly without revealing one's true identity, an investigative technique used by law enforcement agencies to infiltrate a group or organization

59. ## POI (Point of Interest)

Point of Interest (POI) is a point, entity, or behavior that attracts the attention of analysts because it has informational value, connections, or potential influence on a specific goal. In short, POI is a key indicator that marks where valuable information, hidden motivations, and potential influences lie. Here are some examples of POIs: active social media accounts during political events or interest in emotional reactions such as reactions, ego, and identity (personal) regarding engagement and having the motivation do that

60. ## LLM (Large Language Model)

An LLM is an AI system trained on massive amounts of text. It learns patterns in language so it can understand questions and generate human-like responses. LLMs are used for chatbots, writing help, coding assistance, translation, and summarizing information (LLM its produce language)

61. ## LGM (Large Geotemporal Model)

An LGM is an AI system trained on large amounts of geographic data over time, such as satellite images, weather records, and environmental changes. It learns how places on Earth change across months or years and can help analyze or predict things like floods, droughts, deforestation, or urban growth (LGM its understand and predict changes on Earth across space and time)

62. ## LBS (Location-Based Service)

Location-Based Service (LBS) tracking determines a device's location using nearby cellular network towers rather than GPS satellites. It acts as a reliable backup when GPS signals are unavailable, such as indoors or in urban canyons, offering lower battery consumption but lower accuracy (meters) compared to GPS

63. ## Emotional Intelligence

Emotional intelligence (EI or EQ) is the ability to perceive, understand, manage, and use emotions effectively in oneself and others. It is crucial for high performance, leadership, and building healthy relationships, often serving as a better predictor of success than IQ. Key components include self-awareness, self-regulation, motivation, empathy, and social skills, all of which can be developed

64. ## Lone Wolf

Lone Wolf is a term used to describe an independent individual who tends to be solitary and feels more comfortable working or making decisions on their own rather than relying on a group. They are usually focused on personal goals, independent in their thinking, and not overly attached to social dynamics or group hierarchies

65. ## Blueprint

Blueprint is a detailed design that forms the main basis for building, creating, or developing something, providing clear direction and structure. Blueprints not only provide an overview, but also encompass concepts, structures, systems, and the steps required to realise an idea in practice. In various fields, blueprints are used as the main guidelines to ensure that the process runs more smoothly, is better organised, and is in line with the planned objectives. For this reason, blueprints are often considered the foundation on which projects, works, or systems can be built and developed effectively

66. ## Mainstream&#x20;

Mainstream is an English term that means “the dominant or widely accepted trend,” referring to ideas, lifestyles, cultures, or styles that are embraced, liked, and considered normal by the majority of society. Things that are mainstream are generally popular, conventional, and commonly found in everyday life

67. ## AI Slop&#x20;

AI slop refers to low-quality, bland, or meaningless digital content that is mass-produced using generative AI, often with little to no human oversight. This type of content includes images, videos, and text that flood social media platforms (such as the “Shrimp Jesus” images on Facebook) and are typically created for clickbait purposes and quick monetization

68. ## Shell Company

A shell company is a corporate entity that is legally established but has no active business operations, no physical office, and no employees. Such companies often exist only on paper or consist solely of legal documents

69. ## Attack Surface&#x20;

An attack surface is a mapping used to identify vulnerabilities across all exposed assets in order to uncover potential initial access paths, security weaknesses, and potential pivots between assets within a system or organizational environment. Examples include data leaks, document leaks, IP addresses, DNS, employees, and others

70. ## Offshore Account&#x20;

An offshore account is a bank or financial account opened outside the country where the account holder resides or operates, typically used for international transactions, asset protection, financial privacy, or cross-border business structures

71. ## Enumeration&#x20;

Enumeration  is the process of gathering and identifying detailed information about a target or system to identify assets, services, users, configurations, and vulnerabilities. For example, it involves identifying misconfigurations on a server or discovering database backups, error messages, or other relevant information within the target system that could potentially be exploited

72. ## Combolist

A combolist is a collection of credential data that typically contains pairs of email addresses or usernames and passwords in a simple format such as email:password. This data generally originates from database breaches, phishing, information-stealing malware (infostealers), or the consolidation of various older breaches into a single large list. It is called a “combo” because it combines account identities with their passwords. In the world of cybersecurity, combolists are often associated with credential stuffing—automated login attempts across multiple services using leaked credentials, exploiting the habit of users reusing the same password across many sites. However, on the defensive side, security firms also use this type of data to detect compromised accounts and alert users to change their passwords and enable two-factor authentication


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://jieyab89-osint.gitbook.io/jieyab89-osint-cheat-sheet-wiki-tips/intelligence-base/intelligence-base-and-knowledge-base.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
