Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Intelligence field

From Wikipedia, the free encyclopedia
It has been suggested that this article bemerged intoIntelligence (information). (Discuss) Proposed since January 2026.
Collection of people and organizations dedicated to intelligence
Not to be confused withIntelligence (information),Espionage, orIntelligence community.
Part ofa series on the
Intelligence field
andIntelligence

Theintelligence field, also known as theintelligence business, theintelligence establishment, theintelligence complex, theintelligence industry, thefield of intelligence, or thebusiness of intelligence is the globalindustry revolving aroundintelligence in all of its forms.[1] The intelligence field is composed of people, groups, and organizations who deal – directly or indirectly – with intelligence, and/or support those people that do.[2] This industry contains;lawyers (not only those practicingintelligence law),professors and academics (not just those inintelligence studies),diplomats,biologists,chemists,astronomers,photographers,videographers,information technology specialists,historians,economists,data scientists,graphic designers,food service workers,psychologists andprofilers,essayists,intelligence analysts,c-suite executives,hackers,coders, andsoftware developers, among others.[3][4][5][6] Individuals employed by intelligence organizations are usually fully employed officers of intelligence agencies calledintelligence officers. Those persons popularly called "spies" make up only a small part of the intelligence field – so small that some scholars have even argued that the work of spying, calledespionage, is anachronistic and unnecessary in the modern intelligence field.[7][8][9] In other words, just as not everyone in thefilm industry is an actor, not everyone in the intelligence field is a spy, or even deals with intelligence. Hager Ben Jaffel and Sebastian Larsson write that:

"In sum, doing intelligence today could mean anything from informing high politics and producingrisk assessments, to dealing with the mundanities of the everyday labor oflaw enforcement, to managing vastdatabases involving intricate computerizedsurveillance solutions."[6]

One derogatory term that has been used to describe the intelligence field, especially in the United States, is theintelligence-industrial complex.[10]

Global industry leaders

[edit]
Allan Pinkerton was formerly the global industry leader of the intelligence field, at one point, possessing for thePinkerton Agency more reserves than the US Army, mostly used for union busting. Pinkerton is nowhere near the global leader today, purchased in the early 2000's bySecuritas AB and relegated to basic security duties.

Due to the secretive, often covert, nature of the intelligence field, gaining accurate employment figures or profit and revenue figures in either thepublic sector orprivate sector anywhere is difficult for data scientists, human resources officers, or economists.[11][12] From an etymological perspective, when the professions of intelligence were being developed, the intelligence field deliberately chose words that were mundane and obtuse, so their enemies would not know what these jobs really were.[13] Job postings are even today often intentionally or unintentionally mislabeled by employers.[11][12] Most of the employment figures below are best-estimates.

The one thing that is not measured below is the effectiveness of the industry leaders, because, while those measurements are often performed within the industry, those reports are mostly kept secret or classified.

Public sector

[edit]

Intelligence communities are the collective efforts of a country surrounding intelligence[14][15] – but confusingly, most of the employment studies today only measure the size of individualintelligence agencies. It is inadequate to measure individual agencies alone, because, for example, theCentral Intelligence Agency (CIA) is only 1/18th of the entireUnited States Intelligence Community (USIC) – meaning that the CIA is only one of 18 intelligence agencies in the United States.[16] Comparing the size of the CIA to the size of the KGB is not adequate, because it does not include all of the other people in those governments employed in the industry.[17]

The following are, therefore, the top leading intelligence communities where figures are found. These rankings incorporate both the number of employees and the owned physical assets of these communities, like access to satellites and deployment times:[18][19]

RankIntelligence CommunityEstimated employeesAnnual budget
1[18]United States Intelligence Community (USIC)100,000[20] –200,000$101.6 billion (+)[21]
2[18]Chinese intelligence community?(allocated from defense budget)
3[18]Russian Intelligence Community?(allocated from the ₽3.5[22] – ₽3.91 trillion[23] national defense budget)
4[18]Israeli intelligence community?₪20 billion
5[18]Indian intelligence community₹4,2343 crore[24] (+/- thousands)
6[19]Pakistani Intelligence Community15-20% of ₨1.8[25] – 2.55 trillion[26]
7[19]United Kingdom Intelligence Community (UKIC)[27]15,550 (+)[28]£4.2 billion[29][30]
8[19]Australian Intelligence Community (NIC)7,000[31] – 10,000$44.6 million[32] – $2.05 billion[33]
9[19]France20,000[34]€67 million[35]
10[19]Germany10,000 (+)€1 billion
11[19]Japan5,000(allocated from defense budget)
12[19]South Korea60,000(allocated from defense budget)

The ten most powerful governmentintelligence agencies, when compared to the relative size of their intelligence communities, are the following:

RankIntelligence agencyEstimated employeesAnnual budgetCountry
1[36]Central Intelligence Agency21,575[37] – 22,000[38]$15 billion (+)United States
2[36]Secret Intelligence Service (MI6)3,500 (+)[39]N/A (shares an account

with MI5 and GCHQ)

United Kingdom
3[36]Mossad7,000 (+)[40]₪10 billion[41]Israel
4[36]Research & Analysis Wing5,000 (+)[42]$100 – 500 millionIndia
5[36]Federal Security Service200,000[43] – 500,000[44]?Russia
6[36]Ministry of State Security800,000 (+)[45]?China
7[36]Bundesnachrichtendienst6,500 (+)[46]€1.6 billion (+)[47]Germany
8[36]Inter-Services Intelligence10,000 (+)[48]₨200 – 300 billion[25]Pakistan
9[36]Australian Secret Intelligence ServiceAustralia
10[36]Directorate General for External Security7,200[49]€1 billion (+)France

Private sector

[edit]

Many of the companies below are involved in more industries than only the intelligence field.[50] The following are the most powerfulprivate sector intelligence agencies in the world:

RankCompanyEstimated employeesAnnual revenueCountry
1[51]Kroll Inc.6,500$1.31 billionUnited States
2[51]K2 Integrity350$74 – 121 millionUnited States
3[51]Surefire Intelligence50$5 – 30 millionUnited States
4[51]Booz Allen Hamilton34,200[52]$2.9 billion[53]United States
5[54]Constellis Holdings22,000[55]$1 – 5 billionUnited States
6[54]AggregateIQ12–50$6 millionCanada
7[54]Hakluyt & Company200[56]£130 million[57]United Kingdom
8[54]Black Cube[58]50–200[58]$1 – 5 million[59]Israel
9[54]Earth League International[60]50 (+)N/A (Nonprofit)United States
?Leidos48,000[61][62]$16 billion[63]United States
?CACI International25,500$9 millionUnited States
?Science Applications International Corporation24,000[64]$7.5 million[65]United States
?Palantir Technologies4,000 (+/-)[66]$3 billionUnited States
?5 Stones Intelligence200 (+)[67]$15 – 16 million
?Pinkerton500[68]N/A (now owned by Securitas)United States
?AmazonUNKNOWNUNKNOWNUnited States
?Alphabet Inc.UNKNOWNUNKNOWNUnited States

Criminal intelligence

[edit]

Where they do exist, the leading criminal intelligence organizations are the following:

RankNameEstimated sizeAnnual budgetParent department
Beijing State Security Bureau??Ministry of State Security
United States Postal Inspection Service2,500$150 millionUnited States Postal Service
Counterterrorism and Intelligence Bureau360(+)$230,000New York City Police Department
SO151,800[69]?Metropolitan Police
Counter-Terrorism and Special Operations Bureau300(+)$650,000Los Angeles Police Department
Bureau of Counter Terrorism1,300$2.5 million[70]Chicago Police Department
Intelligence Bureau??Los Angeles County Sheriff's Department
Regional Operations and Intelligence Center?$250 million[71]New Jersey State Police
Specialized Investigations??Miami-Dade Police Department
Police Intelligence Department15,000?Singapore Police Force

Industrial cultivation

[edit]
See also:List of intelligence gathering disciplines
Clients of intelligence products usually desire a sight picture of their operating environment to help them make decisions.

The global intelligence field, and especially the private sector, is today increasingly diversified in its portfolio, moving away from its core industrial production and management.[6] This industry has often branched-out into secondary and tertiarygoods and services, such asunion busting,policy recommendation,estimates andplanning,sanctioned assassinations,mass surveillance programs,malware production and deployment, and so on. One common adage for the intelligence field is that "intelligence is as intelligence does."[72]

However, the singular product which remains at the core of this industry isintelligence. Intelligence asinformation is to have some secretknowledge of something. Togovernments and the public sector, this information is knowledge of and/or belonging to theenemy, which will often gain an advantage inarmed conflict.[73] To the private sector, intelligence is ususally knowledge of acompetitor, and/or "trade secrets" belonging to that competitor – such asblueprints andpatents. However, because governments are often liable if they get caught spying on their own citizens, they will often hire-out private intelligence agencies to perform that same intelligence.[74][75]

Unlikecoffee, which is the core product of thecoffee industry, orsugar, which is the core product of thesugar industry – intelligence is not a manufactured product, but it is nevertheless collected and cultivated in some manner.

Intelligence work can be conducted by governmentintelligence agencies,police forces, andmilitary intelligence units. This work can also be engaged by private organizations, including;private intelligence agencies,multinational corporations,private investigators,drug cartels,narcotic cartels,terrorist groups, and others.

Intelligence collection (also known as espionage)

[edit]
Similar to howfarmers might "collect," wheat or oranges through the practice known asfarming – the traditional collectors of the intelligence field are called spies, and they practice the craft ofespionage, also known as intelligence gathering. This craft is declining in numbers with newer technologies.

The traditional manner in which intelligence has been cultivated, gathered, or collected throughout history, is by using contractual agents known as "spies." It is the job of a spy to gather this information, and their career field is known asespionage. For governments, spying occurs during bothwartime andpeacetime, so to say that intelligence is knowledge of the enemy is an incomplete definition, because intelligence collection also occurs against allies.[76] Spies are often single and mission-specific solitarycontracting agents who are commonly known as "secret agents."

Espionage, as an occupation, is older than the intelligence field by thousands of years. Espionage is so old that it is often jokingly called "the world's second oldest profession."[77] However, and especially with the advancement of modern technologies – the collection of information has grown far beyond the capabilities of the traditional spy.[9][78]

Surveillance and mass surveillance

[edit]
The advent of new technologies – such as thistelephone switchboard – allowed for the creation of a new form of intelligence collection throughsurveillance.

Surveillance is often considered as either a tool or a method, and it is one of the newer and non-traditional forms of intelligence collection, which has grown with the advent of modern technologies, such as theprinting press andpostal systems. The firstmass surveillance systems ever created were thosepost offices in response to the proliferation of written correspondences after the former barriers to communication were lowered. While governments and companies provided the service of carrying the post and dispatches, they also engaged inpostal censorship.[79] In fact, the oldest law enforcement agency in the world was thePost Office Investigation Branch – until the BritishRoyal Mail was privatized in 1996, splintering fromPost Office Limited.[80][81]

After centuries, newer communications technologies were invented usingradio frequencies, especially thetelegraph and thetelephone. One such radio device was called abug.The Thing was a famous bug deployed by theNKGB shortly after the end ofWorld War II. It was a gift of the Soviet Union to US AmbassadorW. Averell Harriman, and hung on the walls of theEmbassy of the United States in London from 1945 to 1951.[82]

Today, mass surveillance is carried out over theinternet. Computer programs, softwares, andmalware – likekeyloggers andspyware – are deployed by any interested party in collecting massive pattern of life profiles through the monitoring ofdigital footprints.[83] Revelations discovered after theSnowden disclosures by the former US government contract employee revealed that theNational Security Agency (NSA) had already deployed malware against American citizens without their knowledge or consent.[84][85]

Facial recognition systems are being increasingly deployed by intelligence agencies to track the movements of humans across the planet.

Surveillance has also become the progenitor of over one billionsurveillance cameras scattered around the world, which are video cameras designed for the purposes of monitoring human movements. Mostly, these cameras are used by police departments or security services, but they are also often incorporated into the capabilities of the intelligence field.Greater London was once known as the surveillance capitol of the world, and there remains a surveillance camera on nearly every street corner there.[86] Over 50% of all the world's surveillance cameras are inChina.[87]

Today, video camera surveillance usesfacial recognition systems andgait analysis to identify "suspected" individuals. InLondon, for example, theMetropolitan Police officers working at video monitors use facial recognition to match a list of suspects – as many as 6,000 or more within the city alone – to those "matches" identified by the system.[86][88] The surveillance network of the United Kingdom is overseen by theBiometrics and Surveillance Camera Commissioner.[89]

Open-source intelligence collection and management

[edit]
Eliot Higgins created the OSINT-specific intelligence agency known asBellingcat, and is largely credited for transforming the OSINT space into a viable career path alternative.

Open-source intelligence (often abbreviated as OSINT) is the information that has been collected through means that are publicly available to anyone and collating that information into consumable intelligence products. OSINT collection is considered to be one of the more traditional crafts within intelligence, dating back to at least the 16th century and theCouncil of Ten.[90]

Through much of history, after the creation of publicly available information to be found innewspapers, journals, andnews magazines – the job of an OSINT officer was to sit for hours every day reading those relevant publications.[90] OSINT still maintains that core principle, but has also become inundated with the rapid and constant flow of modern information on the internet with ever-shrinking news cycles.[91]

OSINT has become so integrated into intelligence collection that some scholars ofintelligence studies write that it is "the lifeblood of intelligence." In order to sift through the massive amounts of raw data nearly overwhelming the basic wage government employees of intelligence agencies, the Central Intelligence Agency createdIn-Q-Tel to raise the capital for private intelligence agencies that would manage OSINT for them.[92]

Wikipedia is often a source foropen-source intelligence collection – even though most analysts regard it as unreliable.

After the 2010's, the definition of OSINT collection often incorporates the websiteWikipedia somewhere in that definition, or conversation – because this website itself is built as anopen source information platform. Wikipedia is now often considered a first-base for OSINT collectors, and veteran analysts will train their newer recruits to use this website.[93] While the information here is sometimes wrong, leaders train that it is important for an OSINT collector to know where aWikipedian got their information, because theinformation landscape here represents knowledge in the popular zeitgeist.

OSINT collection is merely the practice of observing the information provided by a source, but it is no longer considered OSINT collection when those collectors decide to contribute information to Wikipedia – that is when it becomesinformation warfare.[94][95] In 2007, for example, one incident that violated the Wikipediaterms of service occurred when users atIP addresses registered to computers owned by theFederal Bureau of Investigation (FBI) and the CIA were discovered having edited several pages, violating theconflict of interest.[96]

Another concern for the industry is that enemies and "bad actors" might use open sources to send hidden communications. For example, since anyone is allowed to edit Wikipedia, something that might appear as random editing or vandalism might actually be a coded message tosleeper agents,stay-behind networks, or other spies deployed in the field.[92] This is calledsteganography – one famous example was the secret code broadcast over the radio inRwanda which signaled to the militia that theRwandan genocide had begun, and that they needed to begin fighting: "It's time to cut down the tall trees."[97]

Collection management

[edit]

There are two types of intelligence officers that typically "manage" spies in the field. One is called aCase officer, who is assigned to "handle" agents. The other works in the field ofcollection management, and is usually some form of subject matter expert who is entrusted to verify the veracity of claims.[98] In the United States, these officers might be calledReports Officers (ROs) orCollection Management Officers (CMOs).[99] In other countries, these people might be calledCollection Managers orCollection Strategists.[100]

Counterintelligence

[edit]

In order to counteract any enemy activities,counterintelligence (CI) exists to ensure that the information has not been contaminated in some way bymoles orrats. Counterintelligence officers, as they are called, are not assigned to collect intelligence about the enemy, but about the enemy's ability to collect intelligence. The primary subfield of CI is known as counterespionage (CE), and it is the job of CE to hunt, find, and catch other spies.

Industrial production, from produce to product

[edit]
TheIntelligence Cycle, while it was invented by theUnited States Army in 1948, has been adopted andglocalized throughout the world, largely as a result of theOfficer in Residence program. Most organizations have today adapted it to suit their cultures. Here, the cycle appears in theRussian language.

Theories of management

[edit]

There are several working theories as to howintelligence management should work, and how the intelligence field should be structured around that process. During theFrench Revolution, certain approaches to professionalizing the approach to working with the products produced by espionage were invented, laying many of the foundations to the modern intelligence management approach. Many years later, duringWorld War I, further advancements were made on both sides of the war.[101]

In 1948, theintelligence cycle was theorized in the United States byPhillip Davidson andRobert R. Glass while they were serving as staffers at theUnited States Army Command and General Staff College.[102] The theory first spread throughout theUnited States Intelligence Community, where it was then absorbed by most of the intelligence field. Today, the intelligence cycle, and its accompanying theory ofintelligence cycle management, is the predominate working theory in nearly every modern intelligence agency.[102] The intelligence cycle is not, however, a law of human nature that must be followed everywhere, it is only a theoretical model of how some scholars and practitioners think that the industry should operate. In those countries that follow the cycle model, you will find their intelligence communities structured around it. Elsewhere, intelligence communities might appear different, and with different priorities.[102]

Many scholars ofintelligence studies have identified faults in the standard theory of the intelligence cycle, and have created alternatives.[103]Art Hulnick created theMatrix Model, for example.[104] TheTarget-Centric Approach To Intelligence is another breakaway from the intelligence cycle invented by Robert M. Clark.

Specifically in the English language, many of the seemingly innocuous names of the intelligence process aremetaphors derived from stories inThe Bible,[105] and especially interpretations of theTree of Knowledge. This is why so many of the terms used in traditional espionage sound like they belong on an apple orchard: cultivating, gathering, processing, and so on.

Processing raw intelligence

[edit]

Similar to how rawhops collected from the field must be processed anddistilled to createbeer, and how many other crops must be processed into products prior to consumption – whenraw intelligence is collected from the field, or gathered by other methods, it must also be properly processed. This is literally calledintelligence processing, and it is the intermediary step in between collection and analysis.[106] Often, case officers and collection managers do a decent enough job at processing that they are able to pass on field reports directly to analysts. But in the modern era, digital technologies also scoop-up thousands of bits of secret information every second;telephone intercepts,text messages,satellite photographs,emails,laser mic surveillance transcripts, are all in need of processing by intelligence managers.[106]

WhenMichael Hayden, then theDirector of the National Security Agency, was asked what his major problems were shortly after theSeptember 11 attacks, thepithy aphorism that he gave in response was: "I have three: processing, processing, and processing."[106][107]

Raw intelligence is pure and unfiltered, meaning that it might be written in another language that needs to betranslated into the working language of that intelligence community, or it might need to bedeciphered if it is something written incode. Intelligence comes in to headquarters or field bases from every method of collection and gathering, and sometimes even fromall-source intelligence.[106]

Much of these processing responsibilities have in recent decades been taken out of public sector intelligence agencies and hired-out to contractors inBig Tech.[108]

Analyzing that intelligence

[edit]
Intelligence analysts are the deep thinkers of the intelligence field. Their job is to sit, read, and think about what it all means, before producing consumable intelligence products.

After raw intelligence is adequately processed, it is passed tointelligence analysts. Analysts make up the bulk of intelligence work throughout the world. Analysis is effectively thethinking stage of the intelligence process, where creativity is often considered a paramount trait for an effective analyst, alongside quick thinking and wisdom. The industry prefers to hire those people called "the best brains possible" as intelligence analysts.[106]

While traditional spies are often hired straight out of theMarines or theinfantry, and are not necessarily depended upon for theirbook smarts, but for theirstreet smarts – intelligence analysts must besmart. They are almost always required to be college graduates and deep thinkers.[106]

However, as the world of intelligence tends to shift focus from one primary fascination, such as from the "evil virus of Satan"[109] that was either Capitalism or Communism during theCold War, to the illusive threat ofterrorism with the rise of groups likeAl-Qaeda – it takes time to train analysts on new topics, newgeographies anddemographies, and newcultures. Especially within government intelligence work, analysts serve at the pleasure of their bosses, and are often given work that lies outside of their expertise because new situations develop. It is preferable for intelligence communities to also hire recent graduates withlanguage proficiencies in the region or area where they might be operating.[106]

While in the corporate sector, analysts might be valued more for theiropinions than merely their assessments – most government analysts are expected to be dispassionate in their work. It is impossible for humans not to feel emotion, but the objective of public sector intelligence analysis is to avoid what is calledpolitical spin. When analysts succumb to the pressures of politicians, the resulting products are called "intelligence to please," which is generally frowned upon by the rest of the intelligence field. Government intelligence does not exist to tell politicians what they want to hear, it exists to tell them the truth about their enemies.[106]

If analysts do not work quickly enough, their work might receive something called an OBE, which means that the intelligence was "overtaken by events."[106]

Clientele and target market

[edit]
Vladimir Putin, a formerCase officer for theKGB, and the longest-serving leader of Russia since Stalin, has developed a streamlined and personalized intelligence consumption schedule.[110]

The relationship between the intelligence field and their clients changes depending on whether the work is in the public sector or the private sector, because theCEOs of companies and thepoliticians of governments usually want different things, and expect different outcomes.

Those persons at intelligence organizations who are assigned to interact or face with their clientele are calledbriefers, and their specific responsibility is to presentintelligence briefings (which is similar, but different to adebriefing).[111] Most intelligence analysts are not usually assigned to provide briefings. Intelligence briefings are usually in some form ofpresentation, in addition to some form of written intelligence product calledfinished intelligence.

Policymakers

[edit]
TheIntelligence and Security Committee of Parliament, while assigned oversight for British intelligence, also consume intelligence products.

For government agencies, the primary client and consumer of intelligence products are the politicians somewhere at the top of that governmental structure – every government is different, but usually, the decision makers are oftenelected officials or members of themonarchy. Intelligence products exist to support thatpolicymaking anddecision-making. These decisions primarily revolve around matters related tonational security,military affairs,law enforcement, andinternational relations.[112]

United States President's Daily Brief

[edit]
President Barack Obama is seen here receiving thePresident's Daily Brief fromRobert Cardillo.

The most well-known intelligence briefing in the history of the intelligence field is the United StatesPresident's Daily Brief (PDB), of which intelligence analysts have been assigned as briefers to thePresident of the United States over the years, to present the daily product of the largest intelligence community in the world.[113] The PDB has existed for over half-a-century, and every US President has had different methods of consuming the intelligence. Some Presidents have preferred to arrange full briefing sessions with several people in the room and a question-and-answer session, while other Presidents have preferred to consume the PDB as a written product silently by the fireplace.[113]

President Lyndon B. Johnson and First LadyLady Bird Johnson read thePresident's Daily Brief aloud to their grandchild, Patrick Lyndon Nugent, for story time.

During his first term,Donald Trump notoriously refused to partake in many of the PDB's that had been tasked specifically for him, preferring to pass on this responsibility and give it to people more qualified, often because he could not understand the concepts that had already been simplified for him.[114][115][116] Many people assumed that Trumpcould not read well enough to consume the written products, and on the rare occasions that he attended, he preferred to receive his briefings orally.[117][118] He did look at the pictures.[119] When he did attend, he would sometimes receive verifiable information that he dismissed immediately, preferring to believe foreign leaders over his own CIA staff, especially concerning an incident where Trump was informed that Russia had ordered bounties on US servicemembers stationed in Afghanistan.[120][121][122] During his second term, he has nearly scrapped the PDB altogether.[123]

The Chinese and the Russians have similar variations on the theme of the PDB, received atZhongnanhai and theKremlin.

Military leadership

[edit]
Militaries rely on theactive voice and quick presentation styles for their intelligence briefings, which are not dissimilar to the style of any other branch except in content.

In militaries, and especially in the world ofmilitary intelligence (MI), the consumers of large intelligence products are usually theGenerals andAdmirals in charge of theorder of battle or some form of military echelon. However, military intelligence is incorporated into every level of command, and clients are not limited to the highest ranks – evenButterbars andLandlubbers barely out of officer training school consume intelligence products when they are assigned to their units.[124]

C-suite executives

[edit]
TheGentlemen Seventeen in the Directors' Room at theEast India House, Amsterdam. TheDutch East India Company relied heavily on military intelligence to make corporate decisions.[125]

In thecorporate world, intelligence products are used for an even broader set of decisions than in the realm of governments and politicians. The primary client here is usually theC-Suitebusiness executive, or perhaps theBoard of directors of a large company.[78] As opposed to the primary objective of public sector intelligence, which is mostly to gain an advantage over a perceived enemy, the objective the private sector is to serve the executive's agenda.[126] Private intelligence often fails when executives do not understand the purpose of intelligence, and expect their intelligence analysts to perform predictive judgements, which are often outside of their core function.[127]

Despite the fact that there are large private intelligence agencies that specialize in performing intelligence operations, most multinational corporations maintain some staff of corporate intelligence, sometimes a staff of only a few analysts.[128]The Coca-Cola Company, for example, maintains theirGlobal Intelligence Division (GID), as of 2026 led byMatthew Howe. However, Coca Cola also hires private intelligence agencies such asStratfor to provide intelligence on potential oppositional forces, such as in 2007, when they hired Stratfor to investigate members ofPETA in Canada.[129]

Police departments

[edit]
TheGovernor of Maryland,Larry Hogan, is seen here receiving intelligence from Israeli police during a trip there.

In what has often been calledmission creep, the leadingcriminal intelligence bureaus and departments in cities around the world often change their core mission set depending on whatArt Hulnick called thethreat du jour.[130] Threat du jour, in this respect, follows that when the perceived threat against society wasCommunism, criminal intelligence units focused on suppressing Communist organizations. Similarly, when theUSSR was created and theOkhrana was dissolved, Russian criminal intelligence focused on suppressing what they called the Capitalist disease there. When that threat becameorganized crime, these units shifted to largely become gang units, and when narcotics became the threat du jour, those gang units became anti-narcotics task forces.

Today, criminal intelligence organizations have largely been absorbed intocounterterrorism bureaus, with terrorism becoming the new threat du jour.[131] The same work might be performed, but around the world, more money and effort has been allocated to counterterrorism over standard intelligence collection since the start of theGlobal War On Terror. Specifically in the United States, however, that relationship goes back much further, to the 1980's, whenWilliam Colby created theCounterterrorism Task Force.[132] London's formerSpecial Branch, for example, which was the single-largest municipal criminal intelligence branch in the world, was absorbed into theCounter Terrorism Command in 2006.[133] Los Angeles's Counter-Terrorism and Criminal Intelligence Bureau was merged in 2010 with the former Special Operations Bureau to create the Counter-Terrorism and Special Operations Bureau.[134] Chicago's Bureau of Organized Crime (which was designed to hunt gangsters like Al Capone), is now the Bureau of Counter Terrorism.[70]

History

[edit]
[icon]
This sectionneeds expansion. You can help byadding missing information.(January 2026)

Despite the fact that espionage is thousands of years old, the intelligence field as it is known today is roughly 100–200 years old. The original definition of intelligence (inEnglish) was as to be synonymous withjournalism and news, and has morphed and transformed into whatever uses it has today. Hence the name of many newspapers today still calledThe Intelligencer. At least by the 1600's in the English language,intelligence officers were categorized into several categories, to include spies, scouts, and intelligencers.[135]

See also

[edit]

References

[edit]
  1. ^Macartney, John (December 1988)."Intelligence: A consumer's guide∗".International Journal of Intelligence and CounterIntelligence.2 (4):457–486.doi:10.1080/08850608808435077.ISSN 0885-0607.
  2. ^Lowenthal, Mark M. (2017).Intelligence : from secrets to policy 7th Edition. Internet Archive. Los Angeles, California : CQ Press, an Imprint of SAGE Publications, Inc.ISBN 978-1-5063-4256-6.
  3. ^"Explore Intelligence Community careers".United States Intelligence Community. RetrievedJanuary 22, 2026.
  4. ^"Careers | SIS".www.sis.gov.uk. Retrieved2026-01-22.
  5. ^"Technology Careers with ASIO".Australian Security Intelligence Organisation. RetrievedJanuary 22, 2026.
  6. ^abcBen Jaffel, Hager; Larsson, Sebastian (2024-04-02)."Why Do We Need a New Research Agenda for the Study of Intelligence?".International Journal of Intelligence and CounterIntelligence.37 (2):727–750.doi:10.1080/08850607.2023.2222342.ISSN 0885-0607.
  7. ^"Rethinking Espionage in the Modern Era | Chicago Journal of International Law".cjil.uchicago.edu. Retrieved2026-01-21.
  8. ^"Old school spying is obsolete, says one expert. Blame technology".NBC News. 2021-10-07. Retrieved2026-01-22.
  9. ^abO'Connell, Gregory F. Treverton; Kevin M."Reshaping the intelligence business".Tampa Bay Times. Retrieved2026-01-25.{{cite web}}: CS1 maint: multiple names: authors list (link)
  10. ^Tyler, Randy (2010-07-22).""Top Secret America" Sheds Light on the Intelligence-Industrial Complex".ACLU of Washington. Retrieved2026-01-22.
  11. ^ab"Private Sector Intelligence Careers: Analyzing Job Titles and Professional Trends | The Belfer Center for Science and International Affairs".www.belfercenter.org. 2025-07-23. Retrieved2026-01-22.
  12. ^abGerman, Mike (February 6, 2015)."The U.S. Intelligence Community is Bigger Than Ever, But is It Worth It? | Brennan Center for Justice".www.brennancenter.org. Retrieved2026-01-23.
  13. ^Words Unravelled (2026-01-20).What does 'espionage' actually mean?. Retrieved2026-01-23 – via YouTube.
  14. ^"Intelligence Community".www.rand.org. Retrieved2026-01-23.
  15. ^"Intelligence Community: Understanding Its Legal Definition | US Legal Forms".legal-resources.uslegalforms.com. Retrieved2026-01-23.
  16. ^"Intelligence community (IC) | Emerging Technology Policy Careers". 2024-11-18. Retrieved2026-01-23.
  17. ^LLC, Madison Education Group (2026-01-23)."US Intelligence Agencies: Too Many? Not Enough?".Madison Education Group LLC. Retrieved2026-01-23.
  18. ^abcdef"5 Countries with Best Intelligence Agencies".Insider Monkey. Retrieved2026-01-23.
  19. ^abcdefgh"12 Countries with Best Intelligence Agencies".Yahoo Finance. Archived fromthe original on 2025-12-05. Retrieved2026-01-23.
  20. ^Kness, Ron (2025-08-01)."The True Scale of U.S. National Security: Inside the Defense and Intelligence Community".ClearanceJobs. Retrieved2026-01-22.
  21. ^"Intelligence Community Spending Trends"(PDF).congress.gov. Congressional Research Service. September 26, 2024.
  22. ^Stalczynski, Mark (2025-06-26).The Russian Federal Budget 2025–2027 (Report).
  23. ^"Kremlin plans record spending hike on law enforcement and security agencies".The Kyiv Independent. 2025-09-30. Retrieved2026-01-23.
  24. ^"Big Cut For Intelligence Units In Nirmala Sitharaman's Budget 2025".www.ndtv.com. Archived fromthe original on 2025-06-01. Retrieved2026-01-25.
  25. ^abVerma, Shivam."Pakistan's ISI agency is funded by..., large part of this money is used for..."DNA India. Retrieved2026-01-23.
  26. ^"Pakistan announces defence budget increase".Default. 2025-06-12. Retrieved2026-01-23.
  27. ^"UK Intelligence Community: An Overview".Grey Dynamics. Retrieved2026-01-23.
  28. ^"Work in the intelligence services: get a job in MI5, MI6 and GCHQ | Prospects.ac.uk".www.prospects.ac.uk. Retrieved2026-01-23.
  29. ^"China/France/Kazakhstan/United Kingdom/Vietnam • London hikes spy budget, Ablyazov case in Senate, Vietnamese spy olympics, CNAM chair open, Guoanbu recommendations for BRICS - 04/11/2024".Intelligence Online. 2024-11-04. Retrieved2026-01-23.
  30. ^"Security and Intelligence Agencies Financial Statement 2023-24 (HTML)".GOV.UK. Retrieved2026-01-23.
  31. ^Dobell, Graeme (2017-09-24)."Oz intelligence review: the new community".The Strategist. Retrieved2026-01-26.
  32. ^Media, Sekuro (2025-04-01)."Is the 2025 Federal Budget Dropping the Ball on Australian Cybersecurity?".Sekuro. Retrieved2026-01-25.
  33. ^Leben, William (2025-03-28)."Australia's international spending reveals uneven ambition".The Strategist. Retrieved2026-01-25.
  34. ^"France • French intelligence career mobility stagnating - 20/03/2025".Intelligence Online. 2025-03-20. Retrieved2026-01-25.
  35. ^"France • French intelligence largely spared from budgetary constraints - 30/04/2025".Intelligence Online. 2025-04-30. Retrieved2026-01-25.
  36. ^abcdefghij"Top 10 Most Powerful Intelligence Agencies in the World – Aljundi Journal – A Military & Cultural Monthly Magazine".United Arab Emirates Ministry of Defence. Al Jundi Journal. 2025-12-22. Retrieved2026-01-23.
  37. ^"Central Intelligence Agency Number of Employees, Statistics, Diversity, Demographics, and Facts - Zippia".www.zippia.com. 2022-03-25. Retrieved2026-01-23.
  38. ^"Trump administration plans major downsizing at U.S. spy agencies".The Washington Post. 2025-05-02. Archived fromthe original on 2025-06-06. Retrieved2026-01-23.
  39. ^"MI6 set to recruit 1,000 extra staff".BBC News. 2016-09-21. Retrieved2026-01-23.
  40. ^"Inside Mossad: Israel's Elite Spy Agency".spyscape.com. Retrieved2026-01-22.
  41. ^"Inside Mossad: Israel's Elite Spy Agency".spyscape.com. Retrieved2026-01-23.
  42. ^"Research and Analysis - Global Intelligence Knowledge".Global Intelligence Knowledge Network. Retrieved2026-01-23.
  43. ^"Russia's Foreign Intelligence Services".www.everycrsreport.com. Retrieved2026-01-22.
  44. ^Pringle, Robert W. (2010-09-02),"The Intelligence Services of Russia",The Oxford Handbook of National Security Intelligence, Oxford University Press, pp. 774–789,doi:10.1093/oxfordhb/9780195375886.003.0046,ISBN 0-19-537588-2, retrieved2026-01-22{{citation}}: CS1 maint: work parameter with ISBN (link)
  45. ^Greitens, Sheena Chestnut (2025-02-27)."Counter-Espionage and State Security: The Changing Role of China's Ministry of State Security | China Leadership Monitor".China Leadership. Retrieved2026-01-23.
  46. ^"Our Organisation | BND".BND. Archived fromthe original on 2024-10-11. Retrieved2026-01-23.
  47. ^"Bundesnachrichtendienst".Global Intelligence Knowledge Network. Retrieved2026-01-23.
  48. ^"Pakistan: How the ISI works".The Guardian. 2009-08-05.ISSN 0261-3077. Retrieved2026-01-23.
  49. ^"Who are we ? | DGSE".www.dgse.gouv.fr. Retrieved2026-01-23.
  50. ^Shorrock, Tim (2016-09-08)."5 Corporations Now Dominate Our Privatized Intelligence Industry".ISSN 0027-8378. Retrieved2026-01-23.
  51. ^abcd"Private Spies: Inside the Covert World of Spooks for Hire".spyscape.com. Retrieved2026-01-24.
  52. ^"About Booz Allen Hamilton".careers.usnews.com. May 27, 2025.
  53. ^Janney, Josh (2025-10-27)."Booz Allen Hamilton announces new round of layoffs".Virginia Business. Retrieved2026-01-23.
  54. ^abcde"Global private intelligence spy agencies (1) -- Knowlesys Open Source Intelligence System".Knowlesys Intelligence System. Retrieved2026-01-24.
  55. ^"Home - Constellis".constellis.com. Retrieved2026-01-25.
  56. ^"Hakluyt & Company Limited - Company Profile - Endole".open.endole.co.uk. Retrieved2026-01-25.
  57. ^"Annual Report Year Ended 30 June 2024"(PDF). Hakluyt. 2024.
  58. ^ab"A Rundown of Israeli Spy Firms and Surveillance Outfits".CTECH - www.calcalistech.com. 2018-11-15. Archived fromthe original on 2021-03-08. Retrieved2026-01-24.
  59. ^"Client Challenge".www.ft.com. Retrieved2026-01-25.
  60. ^Friend, Tad (2023-05-15)."Earth League International Hunts the Hunters".The New Yorker.ISSN 0028-792X. Retrieved2026-01-25.
  61. ^"One of the region's biggest federal contractors just doubled its size".The Washington Post. 2016-08-16.ISSN 0190-8286. Retrieved2026-01-23.
  62. ^"Workforce Demographics".Leidos. Archived fromthe original on 2025-11-19. Retrieved2026-01-23.
  63. ^"Leidos Posts Strong Fourth Quarter and Fiscal Year 2024 Results".investors.Leidos.com. February 11, 2025.
  64. ^"SAIC - About SAIC".jobs.saic.com. Retrieved2026-01-25.
  65. ^"SAIC Announces Third Quarter of Fiscal Year 2026 Results". December 4, 2025.
  66. ^"Palantir Technologies Number of Employees 2020-2025 | Bullfincher".bullfincher.io. Retrieved2026-01-25.
  67. ^"Our People".5 Stones intelligence. Retrieved2026-01-25.
  68. ^"Pinkerton - 2025 Company Profile & Team - Tracxn".tracxn.com. 2025-12-20. Retrieved2026-01-25.
  69. ^"Police Staff Information Pack Digital Specialist –Hardware"(PDF).counterterrorism.police.uk. Metropolitan Police Service. p. 7.
  70. ^ab"Deep dive: A look at the proposed 2024 Chicago police budget - CBS Chicago".www.cbsnews.com. 2023-10-24. Retrieved2026-01-27.
  71. ^Boukadoum, Colin Kalmbacher, Iman (2022-04-20)."Op-Ed: Audit needed of NJ's ROIC intelligence center".NJ Spotlight News. Retrieved2026-01-28.{{cite web}}: CS1 maint: multiple names: authors list (link)
  72. ^Stout, Mark; Warner, Michael (2018-06-07)."Intelligence is as intelligence does".Intelligence and National Security.33 (4):517–526.doi:10.1080/02684527.2018.1452593.ISSN 0268-4527.
  73. ^Troy, Thomas F. (December 1991)."The "correct" definition of intelligence".International Journal of Intelligence and CounterIntelligence.5 (4):433–454.doi:10.1080/08850609108435193.ISSN 0885-0607. Archived fromthe original on 2023-03-31.
  74. ^"Scouts and Spies: The Covert Operations of Pinkerton's Secret Service in the Civil War".pinkerton.com. Retrieved2026-01-26.
  75. ^McPhail, Quinn (2020-05-20)."Pinkertons, Prostitutes, and Spies (2019)".Civil War Monitor. Retrieved2026-01-26.
  76. ^Toth, Robert C. (23 June 1986)."Spying on Allies – It's a Tradition"(PDF).cia.gov. Los Angeles Times.
  77. ^hkandt (2014-11-19)."The Second Oldest Profession: A World History of Espionage".Department of History. Retrieved2026-01-26.
  78. ^abJOSHI, SHASHANK (September 24, 2024)."How private intelligence companies became the new spymasters".Engelsberg ideas. Retrieved2026-01-26.
  79. ^"Surveillance, privacy and history".History & Policy. Retrieved2026-01-26.
  80. ^O'Driscoll, Julia; published, The Week UK (2024-01-11)."How the Post Office got its prosecution powers".The Week. Retrieved2026-01-27.
  81. ^Team, The Postal Museum (2019-10-02)."The Post Office Investigation Branch".The Postal Museum. Retrieved2026-01-27.
  82. ^"The Thing".www.cryptomuseum.com. Retrieved2026-01-27.
  83. ^SentinelOne (2022-12-11)."What Is Spyware? Types, Risks, and Prevention Tips".SentinelOne. Retrieved2026-01-26.
  84. ^Ciolacu, Lucian."NSA`s Deployed Malware via Automated Tools to Enhance Spy Capabilities".Hot for Security. Retrieved2026-01-26.
  85. ^"How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept".The Intercept. 2014-03-12. Archived fromthe original on 2014-03-16. Retrieved2026-01-26.
  86. ^ab"Focus - Smile, you're on camera: Facial recognition becomes widespread in London".France 24. 2026-01-23. Retrieved2026-01-26.
  87. ^Cosgrove, Elly (2019-12-06)."One billion surveillance cameras will be watching around the world in 2021, a new study says".CNBC. Retrieved2026-01-26.
  88. ^Sandle, Paul (December 4, 2025). Kerry, Frances (ed.)."British police to ramp up facial recognition to catch criminals".reuters.com.Reuters.
  89. ^"Biometrics and Surveillance Camera Commissioner".GOV.UK. 2025-12-04. Retrieved2026-01-26.
  90. ^abBlock, Ludo (2024-05-03)."The long history of OSINT".Journal of Intelligence History.23 (2):95–109.doi:10.1080/16161262.2023.2224091.hdl:1887/3731669.ISSN 1616-1262.
  91. ^Colley, Thomas; Dylan, Huw (2025-07-03)."The War on Open-Source Intelligence".The Washington Quarterly.48 (3):147–162.doi:10.1080/0163660X.2025.2554477.ISSN 0163-660X.
  92. ^abHulnick, Arthur S. (November 2002)."The Downside of Open Source Intelligence".International Journal of Intelligence and CounterIntelligence.15 (4):565–579.doi:10.1080/08850600290101767.ISSN 0885-0607.
  93. ^Fleischman, Amir (2022)."Effective Use of OSINT in the Russo-Ukrainian War: Collection and Disclosure of Reliable Information along with Refuting False Information".American Intelligence Journal.39 (2):66–79.ISSN 0883-072X.
  94. ^Miller, Carl (2018-08-29)."Wikipedia has resisted information warfare, but could it fight off a proper attack?".New Statesman. Retrieved2026-01-27.
  95. ^Rindsberg, Clifford D. May, Ashley (2026-01-24)."Wikipedia Wars".FDD. Retrieved2026-01-27.{{cite web}}: CS1 maint: multiple names: authors list (link)
  96. ^Mikkelsen, Randall (August 16, 2007)."CIA and FBI computers used for Wikipedia edits".reuters.com.Reuters.
  97. ^"Cut Down the Tall Trees".Burundi Film Center. 2007-07-05. Retrieved2026-01-28.
  98. ^Wippl, Joseph W.; D'Andrea, Donna (December 2014)."The Qualities That Make a Great Collection Management Officer".International Journal of Intelligence and CounterIntelligence.27 (4):806–814.doi:10.1080/08850607.2014.924821.ISSN 0885-0607.
  99. ^"It's a Cultural Thing: Thoughts on a Troubled CIA, Part Two - Foreign Policy Research Institute". Retrieved2026-01-29.
  100. ^"HQ ARRC - Journal - April 2003".www.arrc.nato.int. Archived fromthe original on 2007-06-23. Retrieved2026-01-29.
  101. ^Davydoff, Daniil (January 2018)."RETHINKING THE INTELLIGENCE CYCLE FOR THE PRIVATE SECTOR"(PDF).ASIS International. p. 2.
  102. ^abcMuhić, Emir (December 7, 2025)."Transforming the Intelligence Cycle through Adapting to Complex Environments and the Operational Dynamics of Special Warfare"(PDF).www.acigjournal.com. Applied Cybersecurity & Internet Governance Journal.
  103. ^"Intelligence Cycle".Silobreaker. 2023-06-17. Retrieved2026-01-29.
  104. ^Hulnick, Arthur S. (December 2006)."What's wrong with the Intelligence Cycle".Intelligence and National Security.21 (6):959–979.doi:10.1080/02684520601046291.ISSN 0268-4527.
  105. ^Benham, Jenny (2024-12-31), Church, Stephen D.; Aird, Bill; Benham, Jenny; Bisson, Thomas N (eds.),"'A Little Bird Told Me … '. Spies and Espionage in the Norman World",Anglo-Norman Studies XLVI, Boydell and Brewer, pp. 185–202,doi:10.1515/9781805434276-014,ISBN 978-1-80543-427-6, retrieved2026-01-29{{citation}}: CS1 maint: work parameter with ISBN (link)
  106. ^abcdefghiJohnson, Loch K. (ed.)."Handbook of Intelligence Studies".Routledge & CRC Press. Retrieved2026-01-29.
  107. ^Johnson, Loch K. (2002).Bombs, Bugs, Drugs, and Thugs. NYU Press.ISBN 978-0-8147-7173-0.
  108. ^"The Role of Private Corporations in the Intelligence Community | The Belfer Center for Science and International Affairs".www.belfercenter.org. 2025-04-25. Retrieved2026-01-29.
  109. ^bill wurtz (2017-05-10).history of the entire world, i guess. Retrieved2026-01-29 – via YouTube.
  110. ^"Inside Putin's Mind: Portrait of a KGB Spy".spyscape.com. Retrieved2026-01-28.
  111. ^"On the Job with the Director's Briefer".Federal Bureau of Investigation. Retrieved2026-01-28.
  112. ^Hulnick, Arthur S. (May 1986)."The intelligence producer – policy consumer linkage: A theoretical approach".Intelligence and National Security.1 (2):212–233.doi:10.1080/02684528608431850.ISSN 0268-4527.
  113. ^abHelgerson, John L. (1996).Getting to Know the President: CIA Briefings of Presidential Candidates, 1952-1992. Center for the Study of Intelligence, Central Intelligence Agency.ISBN 978-1-4563-1741-6.
  114. ^"Trump has sat for only 12 'daily' intelligence briefings since taking office".POLITICO. 2025-05-10. Retrieved2026-01-28.
  115. ^Lillis, Katie Bo (2021-11-29)."US intelligence community 'struggled' to brief Trump, CIA study says | CNN Politics".CNN. Retrieved2026-01-28.
  116. ^Luscombe, Richard (2021-11-29)."Trump's 'fact-free' approach caused briefing challenges, CIA report says".The Guardian.ISSN 0261-3077. Retrieved2026-01-28.
  117. ^Graham, David A. (2018-01-05)."The President Who Doesn't Read".The Atlantic. Retrieved2026-01-28.
  118. ^"Opinion | Which is scarier — that Trump doesn't read his daily intel briefing, or that Jared Kushner does?".The Washington Post. 2018-02-11.ISSN 0190-8286. Retrieved2026-01-28.
  119. ^Mark, Michelle."Trump doesn't read his intelligence reports, but looks at the graphs, charts, and tables".Business Insider. Retrieved2026-01-28.
  120. ^McCarthy, Tom (2020-06-30)."'Russian bounties' intelligence was in Trump written daily briefing – reports".The Guardian.ISSN 0261-3077. Retrieved2026-01-28.
  121. ^"White House briefs 'Gang of 8' on Russia-Taliban bounty intel". 2020-07-02. Retrieved2026-01-28.
  122. ^Calia, Mike (2020-06-30)."Trump was briefed on Russian bounties earlier than thought, reports say".CNBC. Retrieved2026-01-28.
  123. ^Cohen, Katie Bo Lillis, Kylie Atwood, Zachary (2025-04-10)."Trump administration has tightly restricted access to president's daily intelligence brief | CNN Politics".CNN. Retrieved2026-01-28.{{cite web}}: CS1 maint: multiple names: authors list (link)
  124. ^"The Different Levels Of Military Intelligence".www.governmentprocurement.com. Retrieved2026-01-28.
  125. ^Noordam, Barend (2015), Flüchter, Antje; Schöttli, Jivanta (eds.),"Military Intelligence and Early Modern Warfare: The Dutch East India Company and China 1622–1624",The Dynamics of Transculturality: Concepts and Institutions in Motion, Cham: Springer International Publishing, pp. 113–135,doi:10.1007/978-3-319-09740-4_6,ISBN 978-3-319-09740-4, retrieved2026-01-28{{citation}}: CS1 maint: work parameter with ISBN (link)
  126. ^Gilad, Benjamin (2020-05-12)."When the Consumer of Intelligence is a CEO, Does it Matter?".The Strategy Bridge. Retrieved2026-01-28.
  127. ^"Intelligence Analysis in the Private Sector: Growth, Challenges, and Applications".securityexecutivecouncil.com. Security Executive Council. 2023. Archived fromthe original on 2026-01-27. Retrieved2026-01-27.
  128. ^Gioe, Dorothea; Parkhurst, Jeremey; Gioe, David V. (14 August 2023)."Can Private Sector Intelligence Benefit from U.S. Intelligence Community Analytic Standards?".International Journal of Intelligence and CounterIntelligence.37 (4):1145–1163.doi:10.1080/08850607.2023.2235078.ISSN 0885-0607.
  129. ^"Spooky Business: U.S. Corporations Enlist Ex-Intelligence Agents to Spy on Nonprofit Groups".Democracy Now!. Retrieved2026-01-28.
  130. ^"Book Reviews".Contemporary Security Policy.26 (1):160–184. April 2005.doi:10.1080/13523260500127353.ISSN 1352-3260.
  131. ^Hafetz, Jonathan (2023-03-19)."Homeland Security's fusion centers show the dangers of mission creep".The Hill. Archived fromthe original on 2025-05-11. Retrieved2026-01-28.
  132. ^Hulnick, Arthur S. (September 1997)."Intelligence and law enforcement: The "spies are not cops" problem".International Journal of Intelligence and CounterIntelligence.10 (3):269–286.doi:10.1080/08850609708435350.ISSN 0885-0607.
  133. ^O'Neill, Sean (2006-10-03)."Special Branch absorbed into counter terror unit".www.thetimes.com. Retrieved2026-01-27.
  134. ^"Counter-Terrorism and Special Operations Bureau - LAPD Online".LAPD Online. Archived fromthe original on 2025-09-18. Retrieved2026-01-27.
  135. ^"intelligencer: Meaning & Use".Oxford English dictionary. 2010.
Collection
Human (HUMINT)
Clandestine
Espionage
Signals (SIGINT)
Measurement and
signature (MASINT)
Other
Analysis
Dissemination
Analysis
Devices and
communications
Tradecraft and
techniques
Operations
Retrieved from "https://en.wikipedia.org/w/index.php?title=Intelligence_field&oldid=1338608153"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp