strategy

Intelligence gathering from the internet

Description:
The Internet is a potentially lucrative source of intelligence useful to national security services. This intelligence can include: a) reports on current events; b) analytic assessments by politically astute observers on or near the scene of those events, many of whom offer unique insights; and c) information about the plans and operations of politically active groups.
Context:
Beside being used to gather information on developing conflicts or the beginnings of new global trends or "sea changes," the Internet can be used at the opposite end of the spectrum: to obtain pinpoint information about specific matters of interest. Networks of human sources with access to the Internet can be developed in areas of security concern and these sources can be oriented to seek specific needed information. Constructed and managed correctly, such systems can be much more responsive and efficient than the current complex, unwieldy intelligence tasking and collection processes. Cultivating the capability to perform strategic reconnaissance "by modem," may never replace official intelligence collection systems or services, but will be a useful adjunct.
Claim:
1. Individual analysts in intelligence agencies should routinely monitor Internet traffic (that is readily accessible to the general public) related to their responsibilities. Agencies should establish high volume internal outlets to provide them with this traffic, subject to appropriate relevance filters.
Counter Claim:
1. A great deal of the message traffic on the Internet is idle chit-chat with no intelligence value whatsoever, a veritable "Tower of Babble." Monitoring of that traffic would need to be supported by automated filters that pass through for human analysis only those messages that satisfy certain relevance criteria.

2. Information and disinformation about breaking events are pretty raw on the Net. That's the point. You don't know what to think of any particular bit of information, how to gauge its credibility.

3. If it became widely known that security services were monitoring Internet traffic for intelligence or counterintelligence purposes, individuals with personal agendas or political purposes in mind, or who enjoy playing pranks, would deliberately enter false or misleading messages.

Type Classification:
F: Exceptional strategies
Related UN Sustainable Development Goals:
GOAL 9: Industry, Innovation and Infrastructure