This is a list of intelligence gathering disciplines.
This is a list of intelligence gathering disciplines.
Human intelligence (HUMINT, pronounced /ˈhjuːmɪnt/ HEW-mint) is intelligence-gathering by means of human sources and interpersonal communication. It is distinct from more technical intelligence-gathering disciplines, such as signals intelligence (SIGINT), imagery intelligence (IMINT) and measurement and signature intelligence (MASINT). HUMINT can be conducted in a variety of ways, including via espionage, reconnaissance, interrogation, witness interviews, or torture. Although associated with military and intelligence agencies, HUMINT can also apply in various civilian sectors such as law enforcement.
Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of signals, whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis (to decipher the messages). Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis.
Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other broader areas of interest. Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.
Imagery intelligence (IMINT), pronounced as either as Im-Int or I-Mint, is an intelligence gathering discipline wherein imagery is analyzed (or "exploited") to identify information of intelligence value. Imagery used for defense intelligence purposes is generally collected via satellite imagery or aerial photography.
As an intelligence gathering discipline, IMINT production depends heavily upon a robust intelligence collection management system. IMINT is complemented by non-imaging MASINT electro-optical and radar sensors.
Measurement and signature intelligence (MASINT) is a technical branch of intelligence gathering, which serves to detect, track, identify or describe the distinctive characteristics (signatures) of fixed or dynamic target sources. This often includes radar intelligence, acoustic intelligence, nuclear intelligence, and chemical and biological intelligence.
MASINT is defined as scientific and technical intelligence derived from the analysis of data obtained from sensing instruments for the purpose of identifying any distinctive features associated with the source, emitter or sender, to facilitate the latter's measurement and identification.
JMWAVE or JM/WAVE or JM WAVE was the codename for a major secret United States covert operations and intelligence gathering station operated by the Central Intelligence Agency from 1961 until 1968. It was headquartered in Building 25 at the former Naval Air Station Richmond, an airship base in Miami, about 12 miles south of the main campus of the University of Miami on what is the university's present-day South Campus.
The intelligence facility was also referred to as the CIA's "Miami Station" or "Wave Station."
Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from cyberwarfare that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.
Information warfare may involve the collection of tactical information, assurance(s) that one's information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of the opposing force's information, and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.