Key Aspects of Open Source Intelligence Analysis
1.Determine the research topic.
All research work must be
carried out around a certain theme, which can be roughly classified into three
categories. The first category, task-based research topics, usually has a clear
specific target and clear intelligence needs, and the research content and time
limit are determined in the form of a contract, which requires a higher level of
research. The second category, demand-based research topics, is usually mainly
adopted by units and personnel independently engaged in open source intelligence
work. There is no clear specific object, but the research topic is determined
according to the potential needs of some specific objects. Taking this approach can
both show your professionalism and attract the attention of potential specific
objects. The third category, interest-based research topics, is usually adopted by
people with relevant professional qualities. They can give full play to their
professional advantages to choose research topics with potential advantages or great
influence.
2.Use information search means.
With the
rapid development of the Internet, using the Internet to engage in open source
intelligence work has become the mainstream. A large amount of information carried
by traditional public publications, TV broadcasts, news media, etc. basically also
exists on the Internet. And various websites and social media have also dramatically
expanded the amount of open source information contained in the Internet, which has
become an inexhaustible database. For units and individuals independently engaged in
open source intelligence work, it is a very good thing, but also a challenge. The
key lies in how to discover and collect useful information for themselves.
3.Improve the ability of information analysis and
processing.
This is an essential skill for independent open
source intelligence workers. There are two core issues with open source information:
accuracy and timeliness. Although the information on the Internet is mixed, there is
also a large amount of real information. For example, government website
information, military website information, enterprise website information, college
website information, etc. Multi-channel comparison of the same piece of information
is usually a more effective way to identify authenticity.
4.Accumulate
while researching.
In the process of conducting research on a
certain topic, you will actually come into contact with a large amount of
information and sources of information (including government and enterprise
websites, blogs, personal homepages, etc.). Although the large amount of information
browsed at this time may not be related to the source topic, it may still serve the
topic of subsequent research.
Then,
how do
intelligence analysts prepare for investigations?