Thursday, June 20, 2019
Strategic intelligence Assignment Example | Topics and Well Written Essays - 500 words
Strategic intelligence - Assignment ExampleOpen sources often equal or surpass classified discipline in monitoring and analyzing such pressing problems as terrorism, proliferation, and counterintelligence In this sense, OSINT is extremely important for formulation of military plans and politics policiesThe OSINT can be segmented further into various divisions, according to the disposition of the sources from which the information is extracted. However many a times officials feel that open source information are too open to be benefited for the secretive personality of military strategy or Governmental policies? OSINT can be related to wide variety of resources like internet, media and public data. The OSINT is the publicly available information which is utilised by American Intelligence Agency and U.S. Department of Defense. Apart from publicly available data, various vendors also supply information to the intelligence agency and government under one name. Generally speaking, OS INT is the easiest way of procuring information from a particular resource.Apart from OSINT, another data collection method which is of primary importance is HUMINT.HUMINT hither refers to the human intelligence and information gathered with the assistance of interpersonal connection. This can be acquired with the aid of interview with people, government advisors, accredited diplomats, espionage, Nongovernmental organizations, prisoners or detainees and refugees. Here the information is gathered or collected from interacting with real human beings. However the information collector needs to have accurate knowledge about what needs to be collected in order to make good use of the gathered information. If the information collected is inadequate, there is a chance that there would be red ink of energy time and expenditure. Even while collecting information through HUMINT, attention should be given that information collected are genuine. A privation of authenticity in information gath ered can result in poor military strategic plans
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.