• Home
  • Categories
    • Protection
    • Hostile Environment
    • Industry News
    • Intel
    • Career Advice
    • Surveillance
    • Cybersecurity
    • Maritime
    • Risk Management
    • Fitness
    • Medical
    • Training
    • Equipment
    • Reviews
  • Daily Briefing
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

Get free circuit subscription with BBA membership
You are here: Home / Archives / Intelligence 2.0

Intelligence 2.0

Although the underlying principle of understanding ‘capability and intention’ and the objective of ‘forewarned is forearmed’ have not dramatically altered overtime, the sheer scale of intelligence available in the Open Source environment means that the greatest risk today is information overload rather than information scarcity.

It is in this context that in order to acquire and analyse asymmetric and potentially outcome-defining intelligence, analysts are required to think more laterally than ever and be able to draw both strategic and tactical conclusions from intelligence which may be independent and accurate as much as it may be deliberately misleading or presented through an emotional prism. SOCial Media INTelligence (SOCMINT) is one such instance of lateral thinking. FINancial INTelligence is another.

Social Intelligence: Turning Noise into Actionable Knowledge
It would be easy to dismiss SOCMINT as uncorroborated and with too many downsides to its use. After all, it is user-generated content with intrinsic user bias and liable to deliberate deception, from the innocent (overstating one’s importance, income, status or even exaggerating events) to the sinister (the dissemination of falsehoods presented as fact or news). Social Media is also comparatively easy for a bad actor to weaponise and turn against an adversary. But there is little doubt that, a mere 14 years since the launch of Facebook and less than 12 years since the launch of Twitter (just to name two platforms), developing an analyst-driven capability to exploit SOCMINT both for defensive and offensive purposes is becoming essential in nature.

In December 2017 the German Secret Service and in January 2018 the Swiss Secret Service separately took the step of publicly warning about the misuse of the business networking platform LinkedIn for espionage purposes. This particular warning pertained what is suspected to be Chinese state-sponsored espionage. In reality, it could’ve come from virtually any adversary familiar with the techniques used by romance fraudsters and confidence tricksters and sufficient cultural sensitivity to turn LinkedIn into a fertile ground for intelligence acquisition and sometimes manipulation.

 

When, in 2010, a group of British parliamentarians was caught up in a ‘cash for access’ sting where journalists (in time-honoured fashion, one might add) set up a bogus company complete with website to create a veneer of credibility and execute the sting it was the same parliamentarians’ lack of due diligence that left them exposed. Unless a social media profile or even the website itself was specifically created and left to ‘age’, in all likelihood the perpetrators would’ve created recent profiles. Linked with a small number of individuals. Some, most likely impersonated as well. Others, either at first or second degree connection, likely to be linked to ‘red flag’ nominals, such as journalists or researchers. And all this doesn’t take into account the power of networks’ algorithms which, sometimes inadvertently and always usefully for an analyst, can suggest connections opening up whole new networks, therefore assisting in the early identification of threats. Not forgetting the basics: after all, how many have set up a profile using a work email, an address containing the full name or even a nickname replicated across multiple sites and platforms?

Replace journalists for terrorists or any other potential disruptors and the power of networks combined with an analyst’s ability to identify key items of value (are plug sockets as seen in uploaded pictures consistent with the location? Is there any usable metadata? Is the language used consistent with the stated linguistic proficiency or even slang consistent with a specific variety of any given language?) and the principles above can take on a whole new dimension of security. Not to mention potential internal threats. Rogue employees, embedded investigators, saboteurs and the like.

Situational Reports are also greatly enhanced by the harvesting of SOCMINT although this is precisely the environment where an analyst’s ability to rapidly select the valuable and discard the inaccurate and the misleading (deliberate or otherwise) is an absolute must. As the Oxford Street ‘phantom terrorist incident’ of December 2017 clearly exemplified, all the social noise in the world and all the ‘influencers’, celebrities and citizen reporters out there – no matter how often amplified by third parties, some with sinister intents such as destabilising an adversary – still can’t magic up a terrorist attack out of thin air. Sorting the chaff from the wheat matters. And the ability to do so against a noise of media parroting the uncorroborated line can make the difference between achieving an outcome and failure.

And then there’s Profiling. Social Media may be about networks (and the examples above clearly show the importance of ‘panning out’ from an individual item of intelligence to the network it operates within) but for users it is also an image amplifier that can leave them exposed.

Is the subject an extrovert over-sharer? Do they display signs of seeking attention or validation? Is there a propensity to manifest political, social, religious views? Who do they engage with? And do they do so knowingly? And that’s without forgetting the basics. Where do they ‘tag’ themselves? Does that betray a pattern? Whether that’s a behavioural pattern (same place, same time) or an image pattern (they only ‘tag’ themselves in fashionable premises or premises that matter to their reference group creating a true or manufactured sense of belonging).

Financial Intelligence: The New Frontier?
The ability to turn intelligence into profiles that can be actioned upon is also a key benefit of FININT – FINancial INTelligence.

FININT is another discipline in its relative infancy and a much misunderstood one. Suffice to say for now it is not forensic accounting as some assume nor it is restricted to understanding financial matters. It is much, much more.

As the worldwide trend points to the decline of anonymous cash and the rise of electronic payments and some parts of the world (Africa springs to mind) may well jump directly on to electronic payments only, the body of intelligence being built up is phenomenal in both scale and depth. Undoubtedly, the main application of FININT to date has been in the investigation arena. From identifying a cash machine user close to the scene of a murder through their card number even in the absence of CCTV to understanding the deliberately opaque movement of funds that underpins money laundering and terrorist financing it’s not difficult to see the use of financial data for investigative purposes. And then of course there’s the not insignificant matter of corporate records, both legitimate and leak-driven (Panama and Paradise to name two) and the networks they can open up.

But there is more. Financial data can be used to track the movement of parts needed to build explosive devices or the smuggling of weapons. Less dramatically perhaps, it can be used to understand the commonalities between networks of entities. Do two seemingly unconnected individuals spend money at the same time at the same premises on a regular basis?

They may not be so unconnected after all. Or is the same person ‘owning’ multiple companies all sharing the same address and links to, for instance, terrorists? Then this person is either of interest or a front. Effectively, a due diligence force multiplier.

FININT can also help build that all-important profiling.
Take payment card data for instance. What may appear to be a dreary list of transactions opens up a window on to a target. Do they spend beyond their means or are they thrifty? Where do they spend their money? Is there a pattern to it? Where is the repeat spend? And if planning a surveillance job, where am I likely to find them at a given time? Do they create a heat map just by spending? Do they spend at premises that may leave them open to compromise? Do they have a weakness or secret? The answer to all questions is traceable just by analysing what appears to be nothing more than a ledger. And if an operative’s work is to protect an asset then perhaps ‘mixing up’ patterns that an analyst on the adversaries’ payroll may identify could be a life-saving move.


Private Matters
As security and defence continue to evolve to a domain where the private sector is expected to play an extensive role it only played to this extent prior to the State taking over defence and policing in the early 20th century and late 19th century respectively, it’s important for the sector to understand that without new, asymmetric intelligence today’s asymmetric threats cannot be understood let alone mitigated or tackled head-on.

Adversaries today actively seek to deceive and maximise plausible deniability; from the ‘Little Green Men’ in Ukraine to insurgents dressed as women or activists mingling with crowds in conformist clothing following the trend of football fans who, to avoid police detection in the 1980s would dress in expensive sportswear giving rise to the ‘casual’ phenomenon. As today’s adversaries but also benign sources of intelligence often communicate in emojis and shun traditional media, wire each other funds through ‘peer to peer’ mechanisms outside of traditional banks, traditional methods of acquisition and traditional analysis no longer provides the edge they used to.

As threats evolve, so should our approach to intelligence. Embracing new disciplines within it is crucial in remaining on a par with our adversaries, whichever form they may take.

 


Intelligence 2.0
By: Albert James Galloni

Albert James Galloni is an analyst who specialises in OSINT, SOCMINT and FININT. His diverse experience spans across financial crime, counter-terrorist financing, due diligence, investigations, advisory to selected investigative journalists and security. He is the director of Interoperable Services Ltd (www.interoperableservices.co.uk) a British Private Intelligence Company leveraging intelligence disciplines holistically for diverse outcomes, including Security and Defence, Surveillance and Profiling. Albert can be contacted at albertjames@interoperableservices.co.uk or LinkedIn www.linkedin.com/in/albertjamesgalloni/

 

 

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Issue

Circuit magazine cover issue 55

Issue 55

Buy Now

Latest Industry News

Industry News October 2020

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Industry News

We cast our eye over the main stories impacting the security industry, including, Kanye West’s former bodyguard is calling the rapper a “bully” and is threatening to sue for damages after West accused him of breaking a confidentiality agreement.

Industry News

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Security Industry Association Announces New SIA Women in Security Scholarship Opportunity

“The SIA Women in Security Forum works to grow and retain leaders in the security industry,” said Gloria Salmeron, director of human resources at Brivo and co-chair of the scholarship committee. “With the addition of this new scholarship, we look forward to helping bring opportunities for further education and advancement to as wide a spectrum of people as possible and inviting individuals to participate in the Women in Security Forum.”

Product Review earHero

Product Review – Ear Hero

Designed by an audiologist, earHero’s speakers are so tiny they will never block your ear canal giving you the ability to literally talk on a separate phone without removing the earHero tactical earpiece from either ear.

You can literally hear whisper level sounds from yards away, while identifying the sounds’ precise location. The earHero tactical headsets have wires so thin and clear, they are virtually undetectable, and the design is so comfortable, you’ll barely know the earpiece is there.

Introduction to Cybersecurity Part 4

Insecure Smart Houses

They are only of limited relevance today, but as the technologies involved become more widespread and implemented into every facet of life they will only become more prevalent. While it sounds like the stuff of science fiction, these threats exist now and are not going to go away.

For simplicity, we’ll say that a ‘smart’ device is anything which connects to the internet (or a network) and is not intended to be a computer interface. Intended is the key word there, as many of these devices are insecure for the simple reason that they are a computer. The problem is that it is now cheaper and easier to put a general purpose computer into a device and run some software to, for example, turn lights on and off than it is to design a single-purpose lightbulb which also connects to a network.

Behavioral Analysis

Turning Habitual Habits into a Positive

Being an instructor for Tony Scotti’s Vehicle Dynamics Institute has forwarded the opportunity to observe how a large section of professionals interact and function from different niches of the industry. Military, transnational EP teams, US based teams, Federal LEO’s or with civilians this theme shows through. Even in the larger training arena the change can be seen as more of the schools are starting to focus on classes or blocks of instruction such as client management and behavioral analysis. The discussion forms are flooded with conversations relating to how to work in a team dynamic. It doesn’t matter if its a 28 day school or a three day school, they will be touching on and teaching these topics.

Global Risk

Global Situation report provided by Stratfor

Global Situation Report October, 2020

Having informed insight in today’s increasingly complex international environment is more important than ever. That’s why we’ve partnered with Stratfor, the worlds leading geopolitical intelligence platform, to bring readers regular analysis and accurate forecasting of global trends from someone you can trust.

Popular Tags

Afghanistan armed attack Bodyguard Bodyguarding Celebrity client Close Protection Close Protection Officer Elijah Shaw Executive Executive Protection fight firearm gun Intelligence Iraq Law Enforcement Medical military News online police Prevention professional protect protection PTSD Risk Risk Assessment Risk Management Safety Security Security Incidents Security Industry Authority SIA Social Media Surveillance terror Terrorism terrorist Threat train Training VIP

On The Frontline

Head on a Swivel

Industry Catch Phrase or Industry Standard? From the time we are indoctrinated into this Industry, we hear the phrase … >>>

Keeping Your Edge – Is Politics Driving a Wedge Between Protectors?

2017 has been an interesting year for politics, particularly American politics.  On these shores, we had an election for … >>>

A day in the Life – Maritime Security

  The word on the high seas is that the first modern-day Somali Pirates were, in fact, the Somali Coastguard. … >>>

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Keeping Your Edge – Flowers For the Living

If you’re one of the many that have a chance to work around me operationally over the years you know one thing, I can be … >>>

Global Incidents: 25 Apr 2014

Global Incidents: 25 Apr 2014   Critical Information Brazil: Fresh clashes in Rio over dancer's death. DRC: … >>>

Foot Steps Episode 1 Kevin Ghee

How was your transition as a Philadelphia police officer to the private sector? My transition was a tricky one. Coming … >>>

Driving in Hostile Areas

January 2013 and I am sitting in the back of a Toyota Prada on the outskirts of ill-famed Cité Soleil in Port-au-Prince, … >>>

  • Terms And Conditions
  • Magazines
  • Privacy Policy
  • Archives

© 2021 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept