POTENTIAL TARGETS
1. Military Operational Environments
2. Terrorists Targets
3. Espionages
4. Friendly Accredited Diplomats
5. Military Attaches
6.Non-governmental Organizations
7. Patrolling military police
8. Prisoners of War
9. Strategic Prisoners of War or Detainees
10. Traveler Debriefing. Eg CIA Domestic Service
COLLECTION METHODS
1. HUMINT
2. SIGINT
3. IMINT
4. OSINT
5. GEOINT
POTENTIAL TARGETS
1. Neutral Forces
2. Friendly Forces
3. Civilian Population in an area of combat operation
COLLECTION METHOD
1. MASINT
-Electro-optical
-Nuclear
-Geophysical
-Radar
-Materials
-Radiofrequency
2. ACHELON
3. Signal Intelligence
4. Imagery Intelligence
5. OSINT
6. SIGINT
7. TECHINT
8. FININT
9. CYBINT/DNINT
QUIZ: Is CSIS allowed to recruit university students to spy on their colleagues on Campus?
One major method used by CSIS and other security intelligence, and other worldwide security intelligence units and law implementation agencies through the world, is the recruitment of human sources of information. In case a CSIS investigation requires the direction of intrusive devices or human source, the facility is necessary, pursuant to ministerial course, to acquire ministerial approval.
This method of obtaining information is known as open source intelligence. It is however good to note that the information obtained through this process does become verifiable or authentic until it is vitiated and verified by a qualified analyst. Within a university setup, the intelligence unit can obtain information on intentions of foreign nations since students come from different countries. This is a strategic intelligence method. Conversely, the information can also help inform about the plans that terrorists may have on a country’s security since terrorist are more likely to use students to execute their malevolent plans. This is a practical application of human intelligence (HUMINT) and a practical application of OSINT(Open Source Intelligence). This method of obtaining information makes use of both Strategic and Tactical Intelligence.
References
Rapp, Adam, Raj Agnihotri, and Thomas L. Baker. "Conceptualizing salesperson competitive intelligence: an individual-level perspective." Journal of Personal Selling & Sales Management 31, no. 2 (2011): 141-155.
Loshin, David. Business intelligence: the savvy manager's guide . Newnes, 2012.
Marrin, Stephen. "The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis." Intelligence and National
Security 26, no. 2-3 (2011): 182-202.
Stone, Merlin David, and Neil David Woodcock. "Interactive, direct and digital marketing: A future that depends on better use of business intelligence." Journal of Research in Interactive Marketing 8, no. 1 (2014): 4-17.
Koseoglu, Mehmet Ali, Kemal Karayormuk, John A. Parnell, and Michael L. Menefee. "Competitive intelligence: evidence from
Turkish SMEs." International Journal of Entrepreneurship and Small Business 13, no. 3 (2011): 333-349.
Ratcliffe, Jerry H. Intelligence-led policing. Routledge, 2012.