Skip to content

Intelligence Base & Knowledge Base

Jieyab edited this page Oct 10, 2024 · 9 revisions

OSINT Category (Intelligence Base)

  1. OSINT

Open Source Intelligence. In point one, OSINT search and Collection of information through open sources or the public internet. In contrast to intelligence obtained through secret methods or hidden, OSINT utilizes information available to general.

  1. MASINT

Signature Measurement and Intelligence focuses on collection and analysis of data from various forms of temperature measurements and changes or climate. In contrast to intelligence which is based on visual reconnaissance or communications, MASINT relies on technology to detect and analyzing signals that cannot be detected directly by human senses.

  1. GEOINT

Geospatial Intelligence focuses on geographic or system analysis geographic information (GIS) to collect and analyze geography or satellite imagery. Usually used for military or Speakers for analyzing information from satellite images, information a region and place

  1. IMINT

Image Intelligence focuses on analyzing images or footage media such as videos or photos, visual analysis from various sources examples of satellite images, airplanes, building structures and cities. In process This an analyst will extract information from an image, for example in a mountainous area identifying the height of a plains, terrain and determining coordinates

  1. DARKINT

Darkweb Intelligence focuses on the darkweb. Collection information and digital traces contained in darkwb (Dark Site) Usually used to track cyber threat actors, buying and selling illegal, human trafficking and monitoring crimes on the internet

  1. SOCMINT

Social Media Intelligence focuses on gathering information through social media platforms such as Facebook, Instagram, Twitter and others. This collection of information can be used to view activity as well as monitoring on social media, the information collected various things such as usernames, posts, trending, dates and other things which can be used to track information

  1. SIGINT

Signals intelligence is intelligence derived from signals and electronic systems used by foreign targets, such as communications systems, radars, and weapons systems to determine the capabilities, actions, and intentions of foreign enemies

  1. ELINT

Electronic Intelligence focuses its attention on the Radar Systems and to the analysis of their characteristics. Usually used in military applications, information collected generally does not include personal communications. The sensors used to collect data may be active or passive. A particular signal is analyzed and compared with data recorded for a known signal type

  1. HUMINT

Human Intelligence focuses collecting information or intelligence from humans and provided by human resources. For example interrogations and conversations, interviews, surveys, espionage with people who have access to information. Surveillance of targets, uncovering people with potential access to information, approaches to targets

  1. OPSEC (Operational security)

Operational Security is a risk management and security process and strategy used to classify and protect sensitive information and prevent it from falling into unauthorized hands or people. In implementing OPSEC, information will be classified and steps will be taken to identify potential threats and vulnerabilities that may occur in that sensitive information. The approach involves analyzing an organization's systems and operations from the perspective of those who could potentially attack and retrieve sensitive information. Several applications in practice such as monitoring behavior, social media, and implementing best security practices will reduce the risk of exposure of sensitive information.

  1. FISINT

Foreign instrumentation signals intelligence involves collecting information from foreign nationals who are testing or using aerospace, surface, or sub-surface systems. Foreign instrumentation signals intelligence involves the collection of information from foreign nationals who are testing or using aerospace, surface, or subsurface systems, related to the testing and operational deployment of foreign aerospace, surface, and subsurface systems. FISINT is not in ordinary human language, but in machine-to-machine (instrumentation) language or in a combination of ordinary human language and instrumentation language. FISINT is also considered a subset of MASINT (intelligence measurement and signature)

  1. COMINT

Communications intelligence focuses information gathered from the communications between individuals or groups of individuals, including telephone conversations, text messages, email conversations, radio calls, and online interactions on the analysis of signals containing speech or text. Tapping voice, text or signal channels is aimed at finding information about voice, text and signal transmissions. That can lead to determining a number of intelligence considerations about the communications, such as signal bandwidth and protocol, modulation type and rate, and the radio frequency used

  1. CSINT

CSINT is Cyber ​​Security Intelligence In the world of intelligence, CSINT refers to and analysis related to cyber security which is used to protect computer systems, networks and data from threat information and cyber attacks. CSINT can also involve the use of classified information sources, such as intercepted communications or data from surveillance systems, typically used by authorized investigators. Examples include specialist analytical and forensic tools, secret geolocation service, A collection of confidential data provided by law enforcement agencies, subscription and special tools

  1. Espionage

Espionage is the illegal or unauthorized collection of confidential or sensitive information. Espionage is usually carried out to obtain data of strategic or tactical value, such as military, technical, business or political information. These activities often include infiltrating organizations, monitoring their activities, or using obfuscation techniques to access protected information

  1. Satellite Imagery

Satellite Imagery focuses on the collection of GIS, Earth imagery, space operated by governments and companies around the world. Useful for analyzing changes on Earth, maps and images, detection of climate change and weather, disasters, fires or leaks, air and maritime use. Satellite types include Visible Imagery, Infrared Imagery. It can be utilized for monitoring especially such as national security, war, natural resources, disasters, maritime, academic research, and other things. There are many satellite providers such as Google, Bing, Maxar, Planet, Himawari, NASA, Sentinel etc

  1. Interrogation

Interrogation focuses on the examination of a person through verbal questioning by an authorized or public person. Interrogation is the main task in the investigation process. The goal is to obtain information about information, true information, so that it can help solve the case. It contains the 5W+1H (What, When, Who, Why, Where, and How)

  1. Forensics

Forensics focuses on the science used to assist the process of justice through the application of science. Proving the existence of a crime or offense, forensics can be done in Medical, IT (Digital), Chemistry and Biology, Psychology. Examples include Digital Forensics, Forensic Pathology, Mobile Forensics

  1. Sockpuppet

Sockpuppet focuses on identity in the internet world. The goal is to obscure identity. Sockpuppets can also be used as research accounts to hide the identity of OSINT investigators. With this account, investigators can access information that requires an account to access

  1. Astronomy

Astronomy focuses on the study of celestial bodies, the phenomena of the universe and the processes that occur in space. It is also known as star science or phalactic science. Why is OSINT or investigation necessary? It can be utilized to determine time, Know the distribution and movement of celestial bodies, Clues to natural phenomena, Weather prediction

  1. Cryptography

Cryptography focuses on the study of mathematical techniques to keep information secure. Cryptography uses codes, hashes, and signature algorithms to protect information, for example like RSA, DSA

  1. Reconstruction

Reconstruction focuses on cases that can provide a picture of how events really happened. Although not necessarily also the suspects, related, who provide explanations are telling the truth. In the reenactment there are several methods such as Interview, Interrogation, Confrontation, Reconstruction. Why is it necessary? Reconstruction is carried out by investigators to complete case files, develop investigations, and get a picture of how the incident occurred

  1. CIA Triad

The CIA Triad is a model used as a guide in information security that consists of three aspects, namely Confidentiality, Integrity, Availability the most important concept in information security is adequately protecting those assets

  1. Text Intelligence

Focusing on text analysis or text mining, this is useful for analyzing whether the text is generated by AI, Plagiarism, Clustering and other things, this is used for social media analysis, such as word repetition, mentions, similar text and words to be selected and processed (clsutering) along with time and other things

  1. Propaganda

Propaganda is a type of communication that seeks to influence views and reactions, without regard to the true or false value of the message conveyed

  1. Wiretapping

Wiretapping is an activity to listen to, record, alter, distort, or record the transmission of electronic information or electronic documents. Tapping can be done through wired communication networks or wireless networks

  1. 5W + 1H

5W 1H is a question-and-answer and problem-solving method that consists of 6 questions, namely what, who, when, where, why, and how. 5W 1H can be used in various situations, such as: News writing 5W 1H is a standardized guide for composing news texts. The answers to the 5W 1H questions will help the writer organize the news information well. Problem solving 5W 1H can help look at ideas and issues from multiple perspectives, helping to understand the problem and find its root causes. 5W 1H process improvement can be used as a continuous process improvement technique in an organization

  1. Sociology

Social studies is the study of humans as individuals, communities and societies, and their interactions with each other and the environment. It also studies how humans organize themselves, international relations, and wealth. Social sciences include various fields of study, such as: Anthropology, Economics, Political science, Psychology, Sociology

  1. BIAS

Bias is a tendency or preference that influences the way a person thinks, acts or makes decisions. Biases can arise in a variety of contexts, such as in decision-making, judgment of others, or interpretation of information. Biases can be positive or negative, and are often unconscious (a prejudiced presentation of material)

  1. FININT

Financial intelligence is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Generally the term applies in the context of law enforcement and related activities. One of the main purposes of financial intelligence is to identify financial transactions that may involve tax evasion, money laundering or some other criminal activity

  1. VOIP

VoIP stands for Voice over Internet Protocol, a technology that allows users to make voice and video calls over the internet e.g WhatsApp, Discord

  1. Linguistics

Linguistics is the study of language in general, including local languages, Indonesian languages, or foreign languages. Linguistics is also called general linguistics. In linguistics, language is studied with its various aspects, such as Language sounds (phonology), Word forms (morphology), Sentences (syntax), Word meanings (semantics), Language context.