NATIONAL AND INTERNATIONAL SECURITY
Practical approaches for collecting intelligence information
- 1 Academy of the Ministry of Interior, Sofia, Bulgaria
Abstract
The report examines and assesses the possibilities for obtaining information for the benefit of the security services. The main practical approaches and their specifics regarding the collection of intelligence informaThe report examines and assesses the possibilities for obtaining information for the benefit of the security services. The main practical approaches and their specifics regarding the collection of intelligence information are highlighted.tion are highlighted.
Keywords
References
- Greene, Kate. Reality Mining. Sandy Pentland is using data gathered by cell phones to learn about human behavior. – In: MIT Technology Review February 19, (2008) http://www2.technologyreview.com/news/409598/tr10-reality-mining/
- Greenwald, Glenn. NSA taps in to internet giants' systems to mine user data, secret files reveal. – In: The Guardian 6 June (2013). http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
- Kent, Sherman. Strategic intelligence for American world policy. Princeton University Press, (1966).
- Kondratiev, Alexander. Based on open sources. - In: Military industrial courier. MIC, September 16, (2009), № 36 (302)
- Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015 or the USA FREEDOM Act of 2015. https://www.congress.gov/bill/114th-congress/house-bill/2048
- Marks, Paul. Pentagon sets its sights on social networking websites. - In: New Scientist [онлайн]. June 9, (2006) https://www.newscientist.com/article/mg19025556-200- pentagon-sets-its-sights-on-social-networking-websites/