Step Zero: What is the IR-INT Hub?
Scholars of International Relations (IR) need to, like any other set of academics, publish or perish. But in order to publish, they need novel datasets. Compared to many fields of study, IR is notoriously scarce in data. In IR, notably, there is often someone who is incentivized to actively go out of their way to keep the data under wraps.
However, practitioners of intelligence-gathering have an alphabet soup of different techniques used to gather data, many of which are not directly used in IR research. IMINT, HUMINT, MASINT, OSINT, TECHINT, even PIZZINT, are disciplines of intelligence collection.
This page serves as repository of different “INTs” that may, in some way or other, be of use to IR scholarship. It is meant to be a bit of a grab bag of techniques and tips. The idea is that at least some of these can be converted into an actual dataset for peer-reviewed research. For example, the use of open-source intelligence (OSINT) in IR research has proven particularly valuable in the analysis of conflict zones. Researchers have successfully mined social media posts, news reports, and satellite imagery to build datasets on troop movements, humanitarian crises, and ceasefire violations.
The hope is for this repository to simply provide situational awareness for all the techniques that are out there; and how they can be converted into datasets for studies in IR.
Step 1: What are the INTs?
These are the different intelligence collections disciplines (popularly called “INTs”). You don’t have to be an expert in every one of the below, but be generally appraised about what each one is.
1. HUMINT (Human Intelligence): Gathering information from human sources through interviews, espionage, or other human-to-human interaction.
2. SIGINT (Signals Intelligence): Collecting data from intercepted communications, including radio, telephone, or internet signals.
3. COMINT (Communications Intelligence): A subset of SIGINT, focused specifically on communication signals like radio or phone conversations.
4. ELINT (Electronic Intelligence): Another SIGINT subset, dealing with non-communication signals, such as radar emissions.
5. FISINT (Foreign Instrumentation Signals Intelligence): Intercepting data from foreign weapon or missile tests.
6. IMINT (Imagery Intelligence): Acquiring data through visual images, including satellite or aerial photos.
7. GEOINT (Geospatial Intelligence): Using geographical data, including maps and satellite imagery, to analyze physical locations.
8. MASINT (Measurement and Signature Intelligence): Collecting scientific data like radiation levels or seismic activity to detect and classify objects or events.
9. OSINT (Open-Source Intelligence): Gathering publicly available information from media, academic publications, or social networks.
10. TECHINT (Technical Intelligence): Analysis of foreign weapons and equipment to understand capabilities and vulnerabilities.
11. CYBINT (Cyber Intelligence): Gathering intelligence from cyberspace, including hacking and network surveillance.
12. FININT (Financial Intelligence): Tracking financial transactions to uncover illicit activities or strategic economic moves.
13. ACINT (Acoustic Intelligence): Using sound waves, particularly underwater, to track submarines or other vessels.
14. MEDINT (Medical Intelligence): Gathering health-related data to assess biological threats or the health of military forces.
15. NGAINT (National Geospatial-Intelligence Agency Intelligence): Specialized intelligence derived from the U.S. NGA's analysis of geospatial data.
16. SOCMINT (Social Media Intelligence): Analyzing data from social media platforms for intelligence purposes, such as monitoring unrest or propaganda.
17. PSYINT (Psychological Intelligence): Understanding the psychological profile and decision-making processes of adversaries or key figures.
18. CULTINT (Cultural Intelligence): Gaining insights into the cultural and societal context of a target population.
19. BIOINT (Biometric Intelligence): Collecting data on physical characteristics like fingerprints or facial recognition.
20. DENTINT (Dental Intelligence): Using dental records for identification purposes.
21. DOCINT (Documentary Intelligence): Extracting information from physical or electronic documents.
22. VIBINT (Vibration Intelligence): Collecting intelligence through monitoring of vibrations, used in seismic surveillance or machinery tracking.
23. PHOTINT (Photography Intelligence): Utilizing photographic images to extract intelligence, often overlapping with IMINT.
24. LASINT (Laser Intelligence): Intelligence gathered through laser-based systems, often related to targeting or precision measurements.
25. PIZZINT (Pizza Intelligence): A humorous term, referring to analyzing pizza orders for intelligence purposes, typically used in jest to emphasize how trivial information can sometimes reveal key data.
26. INFINT (Infrastructure Intelligence): Intelligence derived from studying critical infrastructure such as power grids or transportation systems.
27. NAVINT (Naval Intelligence): Focused on collecting data related to maritime operations, ships, and naval strategies.
28. LITINT (Literature Intelligence): Gathering information from published literature, including academic or technical writings.
Step 2: the Intelligence Community
This block is meant to give the reader rapid familiarity in how different bureaucracies actually engage in intelligence collections.
The primary thing to note is that, generally speaking, countries will have two types of intelligence bureaucracies: internal intelligence and external intelligence. Agencies may be categorized based on their mission and goal. Some agencies are charged with exclusively identifying military assets belonging to some other state; other agencies are tasked primarily with fighting drug trafficking. Agencies may also be categorized by their specialization. The CIA has long been thought to be a specialist in HUMINT; the NSA, a specialist in SIGINT. In practice, agencies will make use of a combination of different tools. Lastly, the IC is itself a holistic system. Some ICs are cooperative and hierarchical, with different agencies working together and answering to single authorities. Other ICs are more competitive, with different agencies providing different services; all, ultimately, collated into briefings and reports for intelligence consumers.
Below, I present the major American bureaucracies in the intelligence community (IC); and then, major non-American bureaucracies per country respectively. The reason for this is because the American IC has the highest variation in different agencies. A word of caution: use any analogies between these organizations with great care — the enormous variation in agency behaviors and mission-statements are very specific to the country and these shift across time as well.
United States:
CIA (Central Intelligence Agency): Primarily focused on HUMINT (Human Intelligence) and responsible for gathering and analyzing foreign intelligence to assist U.S. policymakers.
NSA (National Security Agency): Specializes in SIGINT (Signals Intelligence), handling electronic surveillance and codebreaking. Also responsible for cybersecurity operations.
DIA (Defense Intelligence Agency): Focuses on military-related intelligence, often providing strategic assessments for the Department of Defense.
FBI (Federal Bureau of Investigation): Internal security agency, responsible for counterintelligence, counterterrorism, and investigating federal crimes within the U.S.
NGA (National Geospatial-Intelligence Agency): Collects and analyzes GEOINT (Geospatial Intelligence), providing maps, satellite imagery, and other geospatial data to support military and intelligence operations.
NRO (National Reconnaissance Office): Designs, builds, and operates the reconnaissance satellites that provide IMINT (Imagery Intelligence) and other data for the IC.
DEA (Drug Enforcement Administration): Primarily concerned with combating drug trafficking. Collects intelligence to disrupt domestic and international drug networks.
DHS (Department of Homeland Security): Oversees various aspects of domestic security, including intelligence on terrorism, border security, and cybersecurity. Includes organizations like ICE (Immigration and Customs Enforcement) and the U.S. Coast Guard.
INR (Bureau of Intelligence and Research): The State Department's intelligence arm, focused on analyzing foreign political developments and supporting diplomacy.
DOE OICI (Department of Energy Office of Intelligence and Counterintelligence): Focuses on nuclear weapons, energy-related intelligence, and safeguarding U.S. energy infrastructure.
United Kingdom:
MI6 (Secret Intelligence Service - SIS): Equivalent to the CIA, responsible for foreign intelligence and HUMINT operations.
MI5 (Security Service): Internal security agency, similar to the FBI, focusing on domestic counterintelligence and counterterrorism.
GCHQ (Government Communications Headquarters): Equivalent to the NSA, specializing in SIGINT and cyber operations.
Russia:
GRU (Main Intelligence Directorate): Military intelligence agency, comparable to the NSA, handling foreign military intelligence and special operations.
SVR (Foreign Intelligence Service): Russia's foreign intelligence agency, similar to the CIA, responsible for espionage and covert operations abroad.
FSB (Federal Security Service): Russia’s internal security and counterintelligence agency, akin to the FBI, focusing on domestic security and counterterrorism.
Israel:
Mossad: Israel’s foreign intelligence agency, focusing on HUMINT and counterterrorism, similar to the CIA and MI6.
Shin Bet (Shabak): Internal security service, responsible for domestic counterintelligence and counterterrorism, analogous to the FBI.
Aman (Directorate of Military Intelligence): Israel’s military intelligence arm, similar to the DIA, responsible for defense-related intelligence.
France:
DGSE (General Directorate for External Security): France’s foreign intelligence service, akin to the CIA, focused on espionage, HUMINT, and counterintelligence.
DGSI (General Directorate for Internal Security): France's domestic security and counterintelligence agency, similar to the FBI and MI5.
DRM (Directorate of Military Intelligence): France’s military intelligence agency, similar to the DIA, focused on defense intelligence.
Germany:
BND (Federal Intelligence Service): Germany’s foreign intelligence agency, equivalent to the CIA, responsible for espionage and foreign intelligence.
BfV (Federal Office for the Protection of the Constitution): Internal security agency, focusing on domestic counterintelligence and counterterrorism, akin to MI5 and the FBI.
MAD (Military Counterintelligence Service): Germany’s military counterintelligence agency, tasked with internal security within the armed forces, similar to parts of the DIA.
China:
MSS (Ministry of State Security): China’s main intelligence agency, responsible for both domestic counterintelligence and foreign espionage, similar to a combination of the CIA and FBI.
PLA SSF (People's Liberation Army Strategic Support Force): China’s military intelligence unit, handling SIGINT, cyber warfare, and space operations, similar to the NSA and DIA.
CMC Joint Staff Department: Military intelligence and operational command structure, focused on defense and military intelligence, analogous to the DIA.
India:
RAW (Research and Analysis Wing): India’s foreign intelligence agency, focusing on HUMINT and espionage, similar to the CIA.
IB (Intelligence Bureau): Internal security and counterintelligence agency, responsible for domestic security, akin to the FBI and MI5.
DIA (Defense Intelligence Agency of India): India’s military intelligence agency, handling defense-related intelligence, similar to the U.S. DIA.
Australia:
ASIS (Australian Secret Intelligence Service): Australia’s external intelligence agency, akin to the CIA and MI6, focusing on HUMINT and foreign intelligence.
ASIO (Australian Security Intelligence Organisation): Domestic intelligence agency, similar to MI5 or the FBI, responsible for counterintelligence and counterterrorism.
AGO (Australian Geospatial-Intelligence Organisation): Focuses on GEOINT and imagery intelligence, similar to the NGA.
Step 3: INT Data
Below is a set of resources to rapidly gain acquaintance with different INT disciplines, especially open-source intelligence, “OSINT”. Strictly speaking, OSINT does not necessarily imply the use of a specific discipline of collections per se; rather, it is a grab-all term meant to specify the gathering and use of non-classified data. Consequently, most academic research is thus, theoretically, OSINT — even if the actual technique used may come from satellite imagery, cyber data, etc.
First, we’ll start with OSINT preliminaries. The following links provide a broad situational awareness of different techniques.
1. Rapidly go through CyberMentor’s excellent YouTube intro on OSINT topics. Link.
2. Bendobrown’s series on OSINT. Link.
3. Scan through Bellingcat’s guides. Link.
4. Exposing the Invisible’s “kit”. Link.
Second, we’ll consider databases. These are data that have already been collected or can readily be collected.
1. Social Media Databases: Tracking movements, gauging sentiment, or monitoring developments often begins on social media. These databases provide access to real-time and historical social media data.
Twitter API: Offers programmatic access to public tweets and metadata. Use it to track discussions, geolocate tweets, and identify key influencers or patterns of behavior. Link.
Facebook API: Allows researchers to search for public posts, profiles, and interactions. Ideal for identifying groups, sentiment, or trends related to political movements or crises. Link.
Telegram API: Messaging app, often forum of choice for a lot of politically relevant proxies. Link.
2. Government Databases: For those seeking official reports, declassified documents, or policy analysis, these databases are invaluable for primary-source material.
CIA FOIA Reading Room: A treasure trove of declassified CIA documents, offering insights into historical foreign policy, covert actions, and intelligence assessments. Link.
National Archives (U.S.): Offers access to a wide range of government documents, from presidential papers to military reports. An excellent resource for historical intelligence research. Link.
UK National Archives: Similar to its U.S. counterpart, the UK National Archives hold military, political, and intelligence-related records from the British government. Link.
UNdata: You already know about this one, but worth mentioning it in terms of combining with other data. Link.
3. Geospatial Databases: Geospatial intelligence is vital for tracking movements, identifying key locations, or visualizing conflicts. These databases provide satellite imagery and geospatial data for analysis.
Google Earth, Remote Sensing OSINT: From the commendable folks at Bellingcat. Link.
NASA’s Worldview: Provides real-time satellite imagery that can be used to monitor global weather events, natural disasters, and environmental changes. Link.
Sentinel Hub: Use it for analyzing land use, forestry, or urban development. Link.
USGS EarthExplorer: Provides access to satellite images, aerial photographs, and maps from the U.S. Geological Survey. A great resource for environmental or geopolitical analysis. Link.
4. Intelligence Databases and Collections: These databases focus on security, conflict, and terrorism. They offer access to data on incidents, trends, and policy measures related to global security issues.
Jane’s Defence Intelligence Review: Enormously useful, but obviously check and see if your university offers this for free. Link.
Global Terrorism Database (GTD): Tracks terrorism incidents around the world, providing detailed records of attacks, tactics, perpetrators, and casualties. Link.
Yale’s Compendium: Yale has a collection of databases on intelligence. Link.
USNAVWARCOL’s Compendium: NAVWARCOL has a collection of databases on intelligence. Link.
5. Niche OSINT Tools for Specialized Research: Beyond general social media or geospatial tools, these specialized OSINT resources allow researchers to uncover less accessible data.
Shodan: A search engine for discovering devices connected to the internet. This can provide insights into exposed infrastructure, vulnerable systems, and geopolitical cyber risks. Link.
Censys: A tool for mapping and monitoring the global internet infrastructure. Censys provides real-time data on certificates, websites, and systems, which could be relevant for cyber conflict studies. Link.
FOIA Project: A tool that helps locate datasets and documents available through the Freedom of Information Act (FOIA) in the U.S. Link.
6. Intelligence-Driven Analytical Tools: These tools help academics combine different INTs to analyze data patterns or to create their own datasets.
Maltego: A link analysis tool that enables visualization of relationships between entities across the web, including social media accounts, domain names, and IP addresses. It’s useful for identifying networks or clusters in conflict zones or political movements. Link.
Atlas.ti: A lot of academics already know about this one, but I’m adding it here so that it can be used in tandem with the other qualitative, document-based databases on this page. Link.
IntelTechniques: Bazzell’s suite of techniques; has come highly recommended to me. Link.
SpiderFoot: An open-source OSINT automation tool that can gather data from over 100 sources, ranging from social media profiles to domain names and WHOIS data. Perfect for creating datasets related to cyber espionage or state-sponsored attacks. Link.
i2 Analyst’s Notebook: Tool, not database per se. Link.