OSINT, HUMINT, SIGINT… at least give me a hint!

Military analytics nomenclature rests on a foundation of abbreviations and key concepts– here’s an essential overview.

Asset

A recruited source who provides information (aka an informant or mole).

Bona Fide

Proof that someone is legit (e.g., a way to verify a contact is trustworthy).

Case Officer (CO)

A trained intel officer who recruits and runs human sources.

CI

Counterintelligence – preventing or exposing enemy spies inside your system.

COA

Course of Action – potential plan or strategy, often from an adversary.

Dead Drop

A hidden location for passing items or messages without direct contact.

ELINT

Electronic Intelligence – subset of SIGINT; radar and non-voice electronics.

Escrow (in cybercrime)

A service used to hold funds (often in cryptocurrency) during illicit transactions (for example transactions with stolen data) until both sides fulfill their part of the deal. It builds “trust” in black markets where participants are anonymous.

Handler

The intelligence officer who manages and communicates with an asset.

HUMINT

Human Intelligence – info from human sources (spies, defectors, interlocutors, or by interviews).

IMINT

Imagery Intelligence – satellite and aerial photography analysis. E.g. NGA satellites, commercial services like Maxar or Planet.

Legend

A fabricated backstory/persona for an operative under cover.

MASINT

Measurement & Signature Intelligence – data like radar, acoustics, or nuclear signatures.

Numbers Station

Shortwave radio station used for encrypted messaging across the globe by intelligence assets.

Order of Battle (OB)

The structure and strength of a military force (units, commanders, weapons).

OSINT

Open-Source Intelligence – info gathered from public sources (news, social media, VKontakte, Telegram (esp. milbloggers like Rybar), Twitter, OSINT initiatives like Bellingcat).

RaaS (Ransomware-as-a-Service)

A business model in cybercrime where ransomware developers sell their malware to affiliates. Affiliates carry out attacks and split the profits (ransom payments) with the developers. It works similarly to SaaS (Software-as-a-Service), just for ransomware campaigns.

SCIF

Sensitive Compartmented Information Facility – a secure, soundproof intel room.

SDR (Surveillance Detection Route)

A planned movement to check for tails (used to evade surveillance).

SIGINT

Signals Intelligence – intercepted communications or electronic signals. E.g. NSA’s XKEYSCORE, Skyling, or PRISM (for data scraping), Palantir.

Stealerlog

Data files or logs produced by information-stealing malware (“stealers”). These logs typically contain stolen credentials, cookies, session tokens, browser autofill data, crypto wallet keys, and more. Cybercriminals buy/sell these logs to gain access to victims’ data and accounts.

TECHINT

Technical Intelligence – analysis of weapons systems or foreign tech.

Previous
Previous

The Potemkin Village – how the expression came about