The global intelligence field, and especially the private sector, is today increasingly diversified in its portfolio, moving away from its core industrial production and management. However, the singular product which remains at the core of this industry is
intelligence. Intelligence as information is to have some secret knowledge of something. To governments and the public sector, this information is knowledge of and/or belonging to the enemy, which will often gain an advantage in
armed conflict. To the private sector, intelligence is usually knowledge of a competitor, and/or "
trade secrets" belonging to that competitor – such as
blueprints and
patents. However, because governments are often liable if they get caught spying on their own citizens, they will often hire-out private intelligence agencies to perform that same intelligence. Unlike coffee, which is the core product of the coffee industry, or sugar, which is the core product of the sugar industry – intelligence is not a manufactured product, but it is nevertheless collected and cultivated in some manner. Intelligence work can be conducted by government
intelligence agencies, police forces, and
military intelligence units. This work can also be engaged by private organizations, including;
private intelligence agencies,
multinational corporations,
private investigators,
drug cartels,
narcotic cartels, terrorist groups, and others.
Intelligence collection (also known as espionage) , also known as intelligence gathering. This craft is declining in numbers with newer technologies. The traditional manner in which intelligence has been cultivated, gathered, or collected throughout history, is by using contractual agents known as "spies." It is the job of a spy to gather this information, and their career field is known as espionage. For governments, spying occurs during both wartime and peacetime, so to say that intelligence is knowledge of the enemy is an incomplete definition, because intelligence collection also occurs against allies. Spies are often single and mission-specific solitary
contracting agents who are commonly known as "secret agents." Espionage, as an occupation, is older than the intelligence field by thousands of years. Espionage is so old that it is often jokingly called "the world's second oldest profession." However, and especially with the advancement of modern technologies – the collection of information has grown far beyond the capabilities of the traditional spy.
Surveillance and mass surveillance – allowed for the creation of a new form of intelligence collection through
surveillance.
Surveillance is often considered as either a tool or a method, and it is one of the newer and non-traditional forms of intelligence collection, which has grown with the advent of modern technologies, such as the
printing press and
postal systems. The first
mass surveillance systems ever created were those
post offices in response to the proliferation of written correspondences after the former barriers to communication were lowered. While governments and companies provided the service of carrying the post and dispatches, they also engaged in
postal censorship. In fact, the oldest law enforcement agency in the world was the
Post Office Investigation Branch – until the British
Royal Mail was privatized in 1996, splintering from
Post Office Limited. After centuries, newer communications technologies were invented using
radio frequencies, especially the
telegraph and the
telephone. One such radio device was called a
bug.
The Thing was a famous bug deployed by the
NKGB shortly after the end of
World War II. It was a gift of the Soviet Union to US Ambassador
W. Averell Harriman, and hung on the walls of the
Embassy of the United States in London from 1945 to 1951. Today, mass surveillance is carried out over the internet. Computer programs, softwares, and
malware – like
keyloggers and
spyware – are deployed by any interested party in collecting massive pattern of life profiles through the monitoring of
digital footprints. Revelations discovered after the
Snowden disclosures by the former US government contract employee revealed that the
National Security Agency (NSA) had already deployed malware against American citizens without their knowledge or consent. s are being increasingly deployed by intelligence agencies to track the movements of humans across the planet. Surveillance has also become the progenitor of over one billion
surveillance cameras scattered around the world, which are video cameras designed for the purposes of monitoring human movements. Mostly, these cameras are used by police departments or security services, but they are also often incorporated into the capabilities of the intelligence field.
Greater London was once known as the surveillance capitol of the world, and there remains a surveillance camera on nearly every street corner there. Over 50% of all the world's surveillance cameras are in China. Today, video camera surveillance uses
facial recognition systems and
gait analysis to identify "suspected" individuals. In London, for example, the
Metropolitan Police officers working at video monitors use facial recognition to match a list of suspects – as many as 6,000 or more within the city alone – to those "matches" identified by the system. The surveillance network of the United Kingdom is overseen by the
Biometrics and Surveillance Camera Commissioner.
Open-source intelligence collection and management , and is largely credited for transforming the OSINT space into a viable career path alternative.
Open-source intelligence (often abbreviated as OSINT) is the information that has been collected through means that are publicly available to anyone and collating that information into consumable intelligence products. OSINT collection is considered to be one of the more traditional crafts within intelligence, dating back to at least the 16th century and the
Council of Ten. Through much of history, after the creation of publicly available information to be found in newspapers, journals, and news magazines – the job of an OSINT officer was to sit for hours every day reading those relevant publications. OSINT has become so integrated into intelligence collection that some scholars of
intelligence studies write that it is "the lifeblood of intelligence." In order to sift through the massive amounts of raw data nearly overwhelming the basic wage government employees of intelligence agencies, the Central Intelligence Agency created
In-Q-Tel to raise the capital for private intelligence agencies that would manage OSINT for them. collection – even though most analysts regard it as unreliable. After the 2010s, the definition of OSINT collection often incorporates the website
Wikipedia somewhere in that definition, or conversation – because this website itself is built as an
open source information platform. Wikipedia is now often considered a first-base for OSINT collectors, and veteran analysts will train their newer recruits to use this website. While the information here is sometimes wrong, leaders train that it is important for an OSINT collector to know where a
Wikipedian got their information, because the
information landscape here represents knowledge in the popular zeitgeist. OSINT collection is merely the practice of observing the information provided by a source, but it is no longer considered OSINT collection when those collectors decide to contribute information to Wikipedia – that is when it becomes
information warfare. In 2007, for example, one incident that violated the Wikipedia
terms of service occurred when users at
IP addresses registered to computers owned by the
Federal Bureau of Investigation (FBI) and the CIA were discovered having edited several pages, violating the
conflict of interest. Another concern for the industry is that enemies and "bad actors" might use open sources to send hidden communications. For example, since anyone is allowed to edit Wikipedia, something that might appear as random editing or vandalism might actually be a coded message to
sleeper agents,
stay-behind networks, or other spies deployed in the field.
Collection management There are two types of intelligence officers that typically "manage" spies in the field. One is called a
Case officer, who is assigned to "handle" agents. The other works in the field of
collection management, and is usually some form of subject matter expert who is entrusted to verify the veracity of claims. In the United States, these officers might be called
Reports Officers (ROs) or
Collection Management Officers (CMOs). In other countries, these people might be called
Collection Managers or
Collection Strategists.
Counterintelligence In order to counteract any enemy activities,
counterintelligence (CI) exists to ensure that the information has not been contaminated in some way by
moles or
rats. Counterintelligence officers, as they are called, are not assigned to collect intelligence about the enemy, but about the enemy's ability to collect intelligence. The primary subfield of CI is known as counterespionage (CE), and it is the job of CE to hunt, find, and catch other spies. == Industrial production, from produce to product ==