What is OSINT? Are there other intelligence gathering disciplines?

OSINT is only tip of the iceberg. Explore a wide array of intelligence collection types, that go beyond publicly available sources.

What is OSINT? Are there other intelligence gathering disciplines?

If you are new to the field, you are probably wondering about the meaning of OSINT. I understand; there are too many intelligence abbreviations. I will decipher and explain them. We are going to explore a wide array of intelligence collection disciplines. Each discipline is accompanied by use cases and history.

Open-Source Intelligence

Open-Source Intelligence (OSINT) is the collection and analysis of data gathered from open sources with the purpose of answering a specific intelligence question. Information is collected from various sources, such as public records, news, libraries, social media platforms, websites, and the Dark Web.

Use cases

  • Cybersecurity: OSINT supports cybersecurity by providing valuable insights into potential threats and vulnerabilities through the monitoring of online forums, social media platforms, and other digital channels. Additionally, it aids in threat intelligence gathering, allowing cybersecurity professionals to proactively identify and mitigate security risks before they escalate.
  • Investigative Journalism: OSINT enables journalists to access publicly accessible data to improve their reporting capabilities. They use it to verify information, validate where the information is coming from, and construct unbiased narratives.
  • Business Intelligence: Corporations use OSINT to make informed decisions and stay ahead of the competition. Business analysts and Market researchers research trends and business opportunities to increase revenue and dominate the market.
  • Risk Management and Due Diligence: OSINT aids in evaluating risks connected to investments, upcoming acquisitions or mergers, business operations, and supply chains. Organizations monitor news, social networks, and other sources to identify potential risks, including reputation damage, regulation changes, or market disruptions.
  • Military and Security: OSINT is broadly used by Intelligence Analysts and various Security professionals (from digital to physical realm) to get actionable insights and stay aware on the upcoming threats.
  • Disaster Response and Humanitarian Aid: OSINT gives an invaluable support by providing real-time information on affected areas, enabling timely resource allocation and effective coordination among responders. Additionally, it helps in assessing the evolving situation, identifying needs, and understanding the impact of the disaster on affected populations.

Short history

OSINT traces its roots back to the Foreign Broadcast Monitoring Service (FBMS), created in 1941. FBMS was an American agency responsible for monitoring foreign broadcasts. They analyzed various types of data, including economic indicators, public broadcasts, and news reports, to infer information about enemy activities and conditions.


Social Media Intelligence

Social Media Intelligence (SOCMINT) is a subset of OSINT, which refers to the collection and analysis of data from social media websites. It includes all social media platforms, not only social networking sites.

Use cases

  • Crime Monitoring and Counter-Terrorism: Law enforcement access real-time insights and enhance situational awareness using social media channels. Authorities can set up automated systems to monitor keywords, hashtags, and geotags related to potential threats. This can trigger alerts that prompt further investigation or immediate action.
  • Fighting Human Trafficking and Child Sexual Exploitation: Law enforcement identifies traffickers, victims, and illegal activities through monitoring of social media platforms for suspicious behaviour, recruitment tactics, and communication patterns.
  • Fighting Cybercrime: Cybercrime researchers use social media to monitor for discussions, advertisements, or discussions related to illegal activities such as hacking, fraud, or data breaches. Additionally, SOCMINT can help in tracking stolen data or compromised accounts being traded on underground forums.
  • Brand protection: SOCMINT aids in brand protection by monitoring online conversations and sentiments to detect and respond to potential threats to a brand's reputation. By analyzing social media data, companies can identify negative trends, customer complaints, or misinformation early, allowing them to address issues promptly and mitigate damage.
  • Marketing and Competitive Analysis: marketers analyse consumer sentiments, preferences, and behaviors from social media interactions, allowing companies to tailor their strategies and improve customer engagement. In competitive analysis, SOCMINT helps track competitor activities, identify market trends, and benchmark performance against rivals.

Short history

The term SOCMINT was formally coined in 2012 by researchers from the UK think tank Demos. They published a seminal paper titled "#Intelligence", which articulated the need for a structured approach to collecting and analyzing social media data for intelligence purposes. Later on SOCMINT became an integral part of intelligence and security operations. It is now globally used for everything from counterterrorism and public safety to market research and political campaigns.


Financial Intelligence

Financial Intelligence (FININT) is the gathering of information about the financial affairs of entities, to understand their nature and capabilities, and predict their intentions.

Use cases

  • Anti-Money Laundering (AML): FININT helps identify patterns and transactions indicative of money laundering, such as unusually large transfers, frequent international transactions, and use of high-risk accounts.
  • Counter-Terrorism Financing (CTF): Authorities use FININT to trace and disrupt financial networks that support terrorist organizations, identifying sources and channels of funding.
  • Fraud Detection: By analyzing transaction patterns and financial behaviors, FININT can detect anomalies that suggest fraudulent activities, such as identity theft, credit card fraud, and insider trading.
  • Risk Management: Organizations utilize FININT to assess risks related to credit, investments, and counterparties by analyzing financial histories and market conditions.
  • Investment Analysis: Investors use FININT to analyze market trends, company financials, and economic indicators, making informed investment decisions.

Short history

Financial Intelligence (FININT) began in the early 20th century, primarily to combat financial crimes like money laundering and tax evasion. During World War II, it gained importance as governments sought to disrupt enemy financing, leading to the establishment of agencies like the U.S. Treasury's Office of Foreign Assets Control (OFAC). Post-9/11, FININT's role expanded dramatically to counter terrorism, further enhanced by technological advancements and digital finance developments in the 21st century.


Market Intelligence

Market Intelligence (MARKINT) is intelligence gathered from the global capital markets. It involves analyzing financial data, stock prices, commodity trends, and economic indicators. This helps gain insights into economic stability, geopolitical events, and the financial health of nations or corporations.

Use cases

  • Market Analysis: MARKINT helps to identify trends and movements in financial markets, such as stock price fluctuations, commodity prices, and market indices
  • Economic Forecasting: Analysts use MARKINT to predict economic conditions by examining market behaviors and economic indicators.
  • Risk Assessment: MARKINT can reveal the impact of geopolitical events on global markets, helping businesses and governments anticipate and respond to changes.
  • Competitor Analysis: Companies utilise MARKINT to monitor the financial performance and strategic moves of competitors, gaining a competitive edge.
  • Investment Strategy: Investors use MARKINT to inform their portfolio management, leveraging market data to optimize asset allocation and investment timing.

Short history

Market Intelligence (MARKINT) started in the early 20th century when businesses were using basic data collection methods like surveys and sales reports. The mid-20th century saw the incorporation of computers, enhancing data analytics and market research. The digital age further revolutionized MARKINT with big data, AI, and real-time analytics for deeper insights.


Blockchain Intelligence

Blockchain Intelligence (BLOCKINT) is a subset of FININT and involves analysing data about cryptocurrency transactions on the blockchain.

Use cases

  • Anti-Money Laundering (AML): Blockchain intelligence helps track and analyse cryptocurrency transactions to identify patterns indicative of money laundering, such as unusual transaction volumes or rapid movement across multiple wallets.
  • Counter-Terrorism Financing (CTF): Authorities use blockchain intelligence to trace cryptocurrency flows and disrupt financial networks supporting terrorist activities by identifying and tracking suspicious transactions.
  • Risk Management and Fraud Detection: By analyzing blockchain transaction data, blockchain intelligence can detect fraudulent activities like Ponzi schemes, phishing scams, and false investment opportunities.
  • Supply Chain Transparency: Blockchain intelligence tracks the movement of goods on the blockchain, ensuring transparency and authenticity in supply chains by verifying the origins and handling of products.
  • Investment Analysis: Investors leverage blockchain intelligence to analyze cryptocurrency market trends, token performance, and on-chain metrics, making informed investment decisions.
  • Cybersecurity: Security experts use blockchain intelligence to monitor and respond to cyber threats, such as hacks and unauthorized access attempts, by analyzing blockchain data for signs of breaches.

Short history

Blockchain intelligence began to take shape around 2014-2015, driven by the need to analyze blockchain data for compliance and fraud detection. Early efforts focused on developing tools to interpret blockchain transactions and track illicit activities. Over time, it has become an essential field for finance, law enforcement, and cybersecurity, providing crucial insights into blockchain networks.


Geospatial Intelligence

Geospatial Intelligence (GEOINT) is an analysis of images (typically from satellites) and data associated with a particular location. It combines several disciplines such as mapping, charting, imagery analysis, and imagery intelligence.

Use cases

  • Disaster Response and Humanitarian Aid: provides analysis of vulnerable regions and helps to understand the potential scope of disasters. Gathers data to develop mitigation or elimination strategies for emergencies.
  • Environmental Sciences: helps in crisis management for natural disasters, understanding of changes in weather patterns, and land degradation.
  • Investigative Journalism: helps journalists to uncover hidden details by analysing satellite imagery, mapping locations, and tracking movement patterns. This can reveal environmental damage, unreported military activities, or unauthorized construction projects.
  • Health Sector: employs it for disease outbreak monitoring. One of the most famous products we probably used is the Johns Hopkins COVID map.
  • Business Intelligence: aids businesses by providing essential insights into markets, customers, and competitors. Real estate companies rely on GEOINT to determine property values and development opportunities.
  • Military and Security: it's crucial for national security and counter-terrorism, allowing the tracking of geopolitical changes and military operations. GEOINT enhances awareness of the situation and aids in border control.

Short history

Geospatial Intelligence (GEOINT) originated in the early 2000s, formalized with the establishment of the National Geospatial-Intelligence Agency (NGA) in 2003. It evolved from traditional cartography and remote sensing, integrating advanced technologies like satellite imagery, geographic information systems (GIS), and data analytics to support national security and defence. 


Human Intelligence

Human Intelligence (HUMINT) is intelligence gathered by means of human sources and interpersonal contact. It can be conducted in a variety of ways, including via espionage, reconnaissance, interrogation, or witness interviews.

Use cases

  • Counterintelligence: HUMINT agents gather information from human sources to identify and counter espionage activities by foreign intelligence services, protecting national security and sensitive information.
  • Military Operations: In military contexts, HUMINT is used to collect insights on enemy positions, intentions, and capabilities through direct interaction with local populations, prisoners of war, and defectors.
  • Criminal Investigations: Law enforcement agencies leverage HUMINT to obtain information from informants, witnesses, and undercover agents, helping to solve crimes, dismantle criminal networks, and apprehend suspects.
  • Cybersecurity: human sources provide information that is not accessible through technical means. This intelligence can be obtained from informants, surveillance, and collaboration with other intelligence sources.
  • Counterterrorism: HUMINT is crucial in counterterrorism efforts, as operatives infiltrate terrorist organizations, gain firsthand information on plots, and disrupt activities through direct human interaction.

Short history

Human Intelligence (HUMINT) has ancient roots, with early instances dating back to when societies employed spies and informants for military and political advantage. Its formalization began in the early 20th century, with the establishment of dedicated intelligence agencies like the CIA in the United States and MI6 in the United Kingdom. Throughout history, HUMINT has played a critical role in gathering information through interpersonal contact, significantly impacting the outcomes of conflicts and shaping geopolitical landscapes.


Signals Intelligence

Signals Intelligence (SIGINT) is intelligence gathering by interception of signals, whether communications between people or from electronic signals not directly used in communication. Being a broad field, SIGINT has many sub-disciplines. The two main ones are Communications Intelligence and Electronic Intelligence.

Use cases

  • Counter-Terrorism: SIGINT intercepts and analyzes communications to identify and disrupt terrorist networks, providing real-time intelligence on potential threats and coordinating counter-terrorism efforts
  • Military Operations: SIGINT supports military operations by intercepting and decoding enemy communications, providing critical information on enemy positions, movements, and plans, thereby enhancing situational awareness and strategic decision-making.
  • Law Enforcement: Law enforcement agencies use SIGINT to monitor and investigate criminal activities, such as drug trafficking, human trafficking, and organized crime, by intercepting and analyzing communications between suspects.
  • Cybersecurity: SIGINT monitors and deciphers communications between cybercriminals to identify and mitigate threats, track hacking attempts, and protect sensitive information.

Short history

Signals Intelligence originated during World War I, focusing on intercepting and deciphering enemy communications. It saw significant advancements during World War II, exemplified by the Allied success in breaking the German Enigma code. Since then, SIGINT has evolved with technological advancements, playing a crucial role in modern military and intelligence operations by intercepting electronic signals for national security purposes.


Communications Intelligence

Communications Intelligence (COMINT) is a sub-category of Signals Intelligence that engages in dealing with messages or voice information derived from the interception of foreign communications.

Use cases

  • National Security: COMINT is used by government agencies to intercept and analyse communications between potential threats to national security, such as terrorist groups or hostile nations, allowing for proactive measures to prevent attacks.
  • Cybersecurity: Organizations use COMINT to monitor and analyse communication channels for signs of cyber threats, such as phishing attempts or coordinated cyber-attacks, enabling timely responses to protect sensitive data.
  • Corporate Espionage Detection: Businesses employ COMINT to detect unauthorized or suspicious communications within their networks, identifying potential corporate espionage or insider threats that could compromise proprietary information.
  • Criminal Investigations: Law enforcement agencies use COMINT to intercept and analyze communications between criminal suspects, gathering critical evidence to disrupt criminal activities and support prosecutions.

Short history

Communications Intelligence (COMINT) has its roots in the early 20th century, gaining prominence during World War II with the interception and decoding of enemy communications. Throughout the Cold War, COMINT evolved with advancements in technology, enabling the monitoring of more sophisticated and encrypted signals.


Foreign Instrumentation Signals Intelligence

Foreign Instrumentation Signals Intelligence (FISINT) is intelligence derived from signals created by the testing and use of foreign weapons systems, such as foreign aerospace, surface, and subsurface systems. FISINT is a subset of above mentioned COMINT, therefore use cases are quite similar.

Short history

FISINT emerged as a specialized field in the mid-20th century, focusing on intercepting and analyzing signals from foreign military and technological systems. Initially, it was crucial during the Cold War for understanding enemy missile and satellite capabilities. Over time, it evolved to include a broader range of technologies and applications. Nowadays it aids in national security and defense by providing critical insights into foreign technological developments.


Electronic Intelligence

Electronic Intelligence (ELINT) is intelligence gathered by the use of electronic sensors. Information is derived primarily from electronic signals that do not contain speech or text. It is commonly used to detect enemy ships and aircrafts.

Use Cases

  • Military Surveillance: ELINT is used to intercept and analyze enemy radar and communication signals, providing insights into the capabilities, locations, and movements of adversary forces. This information helps in strategic planning and threat assessment.
  • Counter-Intelligence: ELINT detects and identifies hostile electronic activities, such as espionage attempts and covert communications. This aids in uncovering spy networks, preventing data breaches, and safeguarding sensitive information.
  • Maritime Security: ELINT monitors naval and shipping activities by intercepting radar and communication signals from vessels. This enhances the ability to track illegal fishing, piracy, and unauthorized naval operations.
  • Air Traffic Control: ELINT is used to analyze and manage electronic emissions from aircraft, ensuring they comply with regulations. This aids in identifying unauthorized flights, managing airspace security, and preventing potential threats.

Short history

Electronic Intelligence (ELINT) emerged prominently during World War II, focusing on intercepting and analyzing non-communication electronic signals such as radar emissions. Post-war, ELINT advanced significantly, driven by the Cold War's technological race, leading to sophisticated systems for detecting and understanding adversary electronic systems. 


Imagery Intelligence

IMINT (Imagery Intelligence) is intelligence derived from the exploitation of imagery collected by visual photography, infrared, lasers, multi-spectral sensors, and radars.

Use Cases

  • Military Operations: IMINT provides detailed imagery of enemy positions, troop movements, and infrastructure, aiding in strategic planning and operational execution.
  • Disaster Response: IMINT helps assess damage from natural disasters, guiding emergency response efforts by identifying affected areas and infrastructure damage.
  • Environmental Monitoring: IMINT tracks changes in ecosystems, deforestation, and pollution, supporting environmental protection and conservation efforts.
  • Urban Planning: Urban planners use IMINT to analyze city growth, infrastructure development, and land use patterns, ensuring sustainable development and efficient resource allocation.
  • Agriculture: IMINT aids in monitoring crop health, detecting pests or diseases, and assessing soil conditions, enabling more efficient and productive farming practices
  • Counter-Terrorism: IMINT identifies and monitors terrorist training camps, safe houses, and other facilities, supporting counter-terrorism operations and efforts to disrupt terrorist networks.

Short history

Imagery Intelligence (IMINT) has its roots in the early 20th century, with significant advancements during World War I and II through the use of aerial reconnaissance. The Cold War era saw the development of sophisticated satellite imaging technology, greatly enhancing the capabilities of IMINT.


Measurement and Signature Intelligence

Measurement and Signature Intelligence (MASINT) is an intelligence discipline built on capturing and measuring the intrinsic characteristics and components of an object or activity. These characteristics allow the object or activity to be detected, identified, or characterized every time it is encountered.

Use Cases

  • Nuclear Proliferation Monitoring: MASINT detects and analyzes nuclear tests and radioactive material through seismic activity, radiation levels, and other unique signatures, helping to monitor and prevent the spread of nuclear weapons.
  • Missile Launch Detection: By analyzing infrared and acoustic signatures, MASINT identifies and tracks missile launches, providing early warning and aiding in missile defense strategies.
  • Chemical and Biological Threat Detection: MASINT sensors detect and identify chemical and biological agents in the environment, helping to protect against chemical and biological warfare by providing timely alerts and data for response actions.
  • Environmental Monitoring: MASINT assesses environmental conditions by measuring factors like pollution levels, land use changes, and natural resource depletion, aiding in environmental protection and disaster response.
  • Battlefield Surveillance: MASINT provides real-time data on battlefield conditions by analyzing acoustic, seismic, and electromagnetic signatures, enhancing situational awareness and tactical decision-making.

Short history

Measurement and Signature Intelligence (MASINT) emerged during the Cold War as a method to gather and analyze data from various physical phenomena, such as nuclear, radar, and acoustic signatures. It was developed to enhance the ability to detect and identify unconventional threats beyond traditional intelligence sources. 


Technical Intelligence

Technical Intelligence (TECHINT) is intelligence about weapons and equipment used by the armed forces of foreign nations. In Cybersecurity, Technical Intelligence refers to one of the Threat Intelligence collection sources.

Use Cases

  • Cybersecurity: TECHINT focuses on technical components such as malicious IPs, indicators of compromise (IoCs), and tactics, techniques, and procedures (TTPs). It is gathered using malware analysis, sandboxes, threat feeds, reports, and various technical data repositories. Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and other threat detection technologies often rely on this type of intelligence.
  • Weapon Systems Analysis: TECHINT involves the examination of foreign weapon systems, including missiles, aircraft, and naval vessels. This analysis helps military and defense agencies assess the capabilities and potential threats posed by adversaries' technologies.
  • Technology Countermeasures: TECHINT is used to develop countermeasures against advanced technologies employed by adversaries. This includes electronic warfare techniques to disrupt or neutralize enemy communications, radar, and other electronic systems.

Short history

Technical Intelligence (TECHINT) emerged as a field during the Cold War, focusing on the collection and analysis of information related to technology and technical systems. Initially centered on understanding foreign military capabilities and technological advancements, TECHINT has since expanded to include a broad range of technical data relevant to national security and defense.


Cyber or Digital Network Intelligence

Cyber or Digital Network Intelligence (CYBINT / DNINT) is intelligence gathered from cyberspace.

Use Cases

  • Threat Detection and Mitigation: CYBINT/DNINT helps identify and counter cyber threats by monitoring network traffic, analyzing malware, and tracking hacker activities. This proactive approach allows organisations to respond to threats before they cause significant damage.
  • Incident Response: CYBINT/DNINT provides critical information during and after a cyber incident. It helps incident response teams understand the attack vector, assess the impact, and develop remediation strategies. This intelligence aids in minimizing downtime and preventing future attacks.
  • Attribution of Cyber Attacks: By analyzing digital footprints, network patterns, and behavioral indicators, CYBINT/DNINT can attribute cyber attacks to specific threat actors or groups. This is essential for legal actions, sanctions, and diplomatic responses.
  • Protection of Critical Infrastructure: CYBINT/DNINT is used to safeguard critical infrastructure such as power grids, water supplies, and communication networks from cyber threats. Continuous monitoring and analysis ensure these systems remain secure and resilient against cyber attacks.

Short history

Cyber or Digital Network Intelligence emerged as a distinct field in the early 2000s, driven by the increasing complexity and scale of cyber threats. It involves gathering and analyzing data from digital networks to detect, understand, and mitigate cyber threats and vulnerabilities. Over time, CYBINT has evolved to encompass advanced techniques such as threat hunting, behavioral analysis, and automated threat detection. It has become vital for cybersecurity strategies across various sectors.


To conclude, each intelligence discipline addresses a specific problem. The method you are going to choose depends on the intelligence question you are trying to answer. Our blog covers various intelligence gathering methods. Subscribe to our newsletter below to improve your all-source intelligence skills.