Information collection is an important way for intelligence agencies to obtain reliable and high-value information resources. This article introduces the main classifications of intelligence information collection, which can be roughly divided into three types according to their source attributes: open-source intelligence, human intelligence, and technical intelligence.
Human intelligence and technical intelligence are collectively referred to as secret intelligence.
Human intelligence refers to the role of people as collectors, transmitters, and analysts of intelligence, where humans play an absolutely dominant role. As professional intelligence personnel, especially those engaged in human intelligence collection, although the goal is to gather intelligence, where does this intelligence come from?
"People are the core of human intelligence, which is people-oriented. Human intelligence is always the highest realm of intelligence, the killer weapon."
— Intelligence Analyst
During the U.S. invasion of Iraq, the U.S. military's excessive reliance on technology and lack of human intelligence led to a deficiency of human thought and rational thinking in intelligence analysis, resulting in a failure to understand local sentiments and human thinking, which caused the U.S. forces in Iraq to win the war but lose the battle.
Of course, this may be a bit far-fetched.
Today, as an intelligence officer engaged in human intelligence work, how do you "make" the next person?
Some might say to find weaknesses, such as greed or lust.
In fact, coercion and inducement are just one method. To truly "make" the next person, you need to understand him better than he understands himself. For example, many spies in British history became Soviet spies because of their political ideals, and the teaching assistant once introduced several similar historical stories.
If he stands before you as if he were naked, would you still fear not being able to "make" him? The fact is, he may find you more terrifying than the devil or more compassionate than God. Additionally, it's worth noting that any country pays close attention to the physical condition of leaders in important target countries. For example, North Korea is particularly concerned about the health of the Kim family, as this is extremely important intelligence for them.
To truly understand a person, what details do you need to know? The following analysis system will completely overturn your understanding of a person, and it includes 7 major categories and 70 subcategories:
-
Appearance
-
Height; 2. Weight; 3. Face shape (oval face, square face, etc.); 4. Eyes (big eyes, small eyes, mouse eyes, phoenix eyes, etc.); 5. Eyebrows; 6. Nose (high nose bridge, flat nose bridge); 7. Mouth; 8. Ears; 9. Teeth; 10. Neck; 11. Skeleton; 12. Limbs; 13. Fingers (can indicate if they often use guns); 14. Palms; 15. Feet (shoe size); 16. Tattoos; 17. Scars; 18. Size of sweat pores; 19. Nails;
-
Health
-
Past medical history; 21. Previous hospitalization records; 22. Regular medications (e.g., those with chronic diseases on long-term medication); 23. Current health status (healthy, sub-healthy, unhealthy, specific diseases); 24. Frequency of exercise; 25. Preferred exercise methods; 26. Vision status (nearsighted, farsighted, astigmatism, lens degree, corrected vision); 27. Hearing status; 28. Dental health; 29. Coordination of limbs;
-
Family
-
Parents; 31. Children; 32. Spouse (or partner, lover); 33. Immediate relatives and their professions; 34. Important extended relatives and their professions; including profession, emotional closeness, and economic status; 35. Position in the family;
-
Lifestyle
-
Interests and hobbies (e.g., basketball, bar-hopping, reading. For bar-hopping, which bar do they like to go to, what kind of drinks do they prefer); 37. Favorite entertainment stars; 38. Preferred clothing (e.g., shirts or T-shirts in summer, which style, if they have a favorite clothing brand, which brand is it); 39. Preferred type of shoes; 40. Preferred type of bag; 41. Preferred perfume; 42. Daily routine (general wake-up and sleep times, whether they have a habit of napping); 43. Whether they often cannot answer their phone in time; 44. Preferred mobile phone brand (Samsung, Apple, Blackberry, etc.); 45. Mode of transportation (e.g., prefers to drive to work, likes to ride a bike while shopping); 46. Favorite foods; 47. Favorite restaurants (similarly, favorite cinemas for watching movies); 48. Favorite fruits; 49. Preferred entertainment methods; 50. Favorite websites and forums; 51. Preferred chat tools; 52. Whether they like to take photos; 53. Preferred types of books;
-
Psychology
-
When they seek fame; 55. What they care about most; 56. Unconscious expressions and actions (including when happy, angry, fearful, or nervous, including eye movements, mouth corners, hand and foot movements, all need to be observed in detail); 57. Personality trait assessment (petty or magnanimous, optimistic or pessimistic); 58. Whether they have any unhealthy or perverse hobbies; 59. What they are most sensitive about; 60. Personal ideals and goals; 61. What they like to do when experiencing various psychological emotions (e.g., happy to sing, sad to drink, etc.); 62. Whether they have other psychological issues and diseases; 63. Political beliefs;
-
Weaknesses
-
Family; 65. Power; 66. Money; 67. Beauty; 68. Self; 69. Personality; 70. Interests;
Here, let me explain what self-weakness is. For example, many South Korean and North Korean agents like to use the ethnic ties of being of the same Korean descent to subvert North Koreans domestically; for instance, some people naturally identify with communism, and their concept of the country is very vague. This is their self-awareness, and by doing so, their work can be very efficient. For example, some people are very keen on engaging in espionage work, enjoying this thrilling and dangerous job, and they are very happy to help you become an intelligence officer (this is generally used to develop intelligence agents within their own country).
Personality weaknesses, for example, can use the opponent's suspicion to confuse and sow discord.
- Others
In fact, there are many things that need attention, such as how well someone writes, how they walk, etc., all of which can be observed. The above are just some details worth noting and are not exhaustive.
Each of the above items has its significance. For example, analysis and research on appearance, in addition to basic external appearance, focuses on observing facial features, which can roughly guess a person's personality traits; observing limbs and other body parts can roughly guess the type of work they engage in, especially whether they often use firearms; observing tattoos and scars is also an important characteristic for confirming a person's identity in the future.
Only by observing these details can many things be inferred, which will be very useful in the future. For example, there are often rumors that some leaders like to use body doubles; you can observe using these methods. Here, I won't elaborate too much.
I just want to say, if you really understand a person according to the above requirements, then he will eventually be in your pocket, because whether it's ideological persuasion, emotional attachment, or coercion and inducement like the KGB, you can hit the nail on the head.
When it comes to the CIA, you must think of various assassination and intelligence theft activities. But you probably don't know that they are also the eyes of the U.S. military, the most mysterious elite force of the U.S. military. CIA personnel are divided into two categories: federal intelligence analysts and frontline agents, also known as frontline special reconnaissance forces.
These frontline agents start their careers using fake names, fake IDs, and fake passports, and even training is conducted in a place in the U.S. codenamed "the farm." They use intelligence tools to learn how to survive locally, etc., and military skills training. Most of these people are elite selected from various conventional and special forces of the U.S. military.
The development trend of this elite force mainly has four points:
First, from "individual action" to "joint operations." From the beginning of its establishment, this unit has undertaken various tasks such as secretly infiltrating enemy rear areas to capture tongues, blowing up railways, destroying bridges, cutting off supply lines, and attacking command posts, all of which have obvious characteristics of individual action and do not require much coordination with other military forces.
With the continuous deepening of joint operations theory and practice, the actions of U.S. special forces are increasingly reflecting obvious joint characteristics.
Second, from emphasizing "physical type" to highlighting "intelligent type." With the demands of actual combat, the tasks performed by U.S. special forces have far exceeded secret operations and sudden attacks, so their members often possess master's degrees and are high-tech "snake catchers," capable of engaging in various special intelligence activities.
When carrying out tasks, special forces can skillfully use lasers, new radar sensors, computers, unmanned aerial vehicles, and advanced networks.
Third, from "small groups" to "large-scale" development. U.S. high-level decision-makers always assign unusual, urgent, and heavy combat tasks to special operations forces in specific situations against different combat targets, leveraging their role as "shock troops."
Fourth, from "subordinate status" to "strategic status." In the Afghanistan War, they made significant contributions to collecting intelligence, discovering clues, tracking targets, and cooperating in combat, playing a major strategic role in the implementation of the anti-terrorism war. In the Iraq War, this unit even entered Iraq in advance, launching intelligence warfare, psychological warfare, and public opinion warfare, gaining strategic initiative for the U.S. military to smoothly occupy Baghdad.
Some even listed the North Korean capital Pyongyang as an intelligence target, creating a false training ground in Moscow. Some agents have secretly lived in countries like North Korea and Russia for nearly 20 years as seasoned operatives, knowing what to do if captured. Either they would poison themselves with poison on their collar, or they would self-harm.
Some even mixed genders and pretended to be couples living in other countries for intelligence, while others secretly infiltrated the military of other countries to gather intelligence, etc.
Their specific training content is said to include: training on all usable weapons, including weapons from various countries, knives, pencils, etc. They can even learn how to drug and incapacitate people, escape training, mixed martial arts training, and assassination training, among other anti-capture training, which is generally a main training subject. The training time usually lasts 5-6 years!
The most important skill that agents need to possess—situational awareness—whether disguising as an ordinary person, having excellent fighting skills, or using various cool high-tech weapons, is not as important as this skill. This skill is the most important thing he learned from the CIA and is an essential ability for agents that ordinary people can also possess.
To illustrate, let me quote a segment from the BBC version of "Sherlock Holmes." In this segment, Sherlock Holmes first meets Watson and immediately says: "I guess you must have just returned from Afghanistan or Iraq." Watson, who has never experienced Holmes's deductive style, is naturally taken aback and asks, "I just returned from Afghanistan, but how did you know?"
Holmes's answer is even more astonishing: "I don't know, I just saw it."
You must understand that this is their first meeting, and the two did not know each other before. Holmes took one look at Watson and knew he had just returned from Afghanistan. Behind this is Holmes's extraordinary observation and reasoning ability. "From the moment I saw you, I began to observe you. Your hairstyle reveals your military identity, your conversation when you first entered indicates that you are a doctor, so it is obvious that you are a military doctor. Your skin is dark, but the area where your wrist wears a watch is white, indicating that you did not get tanned while on vacation abroad. You walk with a severe limp, but when you stand, you do not ask others to move a chair for you, indicating that you have not yet healed, and you must have been injured not long ago. Moreover, the injury must have been very painful and occurred during an operation.
An injury during an operation, coupled with being tanned, means that you must have been injured during operations in Afghanistan or Iraq. So I asked you if you had just returned from Afghanistan or Iraq." Of course, Holmes's story is not real, and his deductive ability is exaggerated, but this story is enough to illustrate one point: as a detective or agent, the most important and fundamental quality is the ability to observe and reason.
Therefore, the greatest enemy of agents is mobile phones, especially smartphones. Because once you focus on your phone, you will lower your observation of the surrounding environment, putting yourself at risk. It is heartbreaking to say that today, in public places, 90% of people are looking down, engrossed in their smartphones, walking without looking up, and not noticing dangers. In fact, most of today's street robberies, thefts, and stalking are due to people's lack of attention to their external environment.
Data shows that many victims, when interviewed, stated that they had no idea why they were targeted by thieves, robbers, or bad people. That is because you have been scrolling on your phone, lacking situational awareness. Any criminal has a pattern before they act, such as following you for a while, or keeping an eye on you for a while, or finding ways to distract you, etc. These are all factors that remind you to pay attention.
So he himself tries to minimize using his phone in public places, and most importantly, he has never sent a text message on his phone. Because sending a text message requires looking down at the screen, which makes it impossible to pay attention to the surrounding environment and assess one's risk.
Therefore, to avoid becoming the next victim, please be sure to put down your phone and practice situational awareness. In China, this advice can be simply changed to: do not look at your phone or scroll through your social media on the main road, otherwise, you are likely to become the next victim. Generally, criminals tend to target those with low vigilance.
How to determine if you are being followed?
So how can you determine if you are being followed? There is a little trick: pay attention to the shoes of others. Because those who are following you can use sunglasses, coats, and other disguises, making it hard to recognize if it is the same person, but shoes are not easy to change. By focusing on the shoes, you can determine if someone has been following you.
How to detect lies?
The tester starts by asking very simple questions, such as your name, age, job, etc. The tested person is generally quite nervous when strapped to a lie detector, so when they are suddenly asked these questions, they relax their guard and answer in the most normal state, because they do not need to lie about these questions and can answer truthfully.
In this way, the tester can record their heart rate, blood pressure, muscle state, how much they sweat, etc., in their most genuine state. After a roundabout approach, when the tester unexpectedly asks some key questions, the tested person is likely to expose their abnormality, such as elevated blood pressure, tense muscles, accelerated heartbeat, etc., making it easy to identify whether the tester is lying.
Therefore, the key to the lie detector is to test the person's true state. Once they show any abnormal state, you can follow the clues and conduct a more in-depth investigation.
Of course, in real-life scenarios, there is no lie detector, and CIA agents cannot measure a person's blood pressure or heartbeat before investigating whether they are lying. So how can CIA agents detect whether a person is lying?
The principle is actually similar to that of a lie detector; CIA agents need to understand the person's true state. When Jason and others talk to a certain criminal suspect, they do not do it like in TV shows or movies, where the person sits in a cold, windowless interrogation room with a big spotlight overhead, while CIA agents ask very serious questions in a menacing manner.
Relationship Intelligence#
There are many types of interpersonal relationships, and their manifestations are quite complex. They can be classified in various ways based on different criteria.
Based on interpersonal media, relationships can be divided into blood relations (parent-child, mother-daughter, etc.), kinship (spouses, in-laws, etc.), interest-based relationships (friends, chess buddies, sports buddies, etc.), occupational relationships (teacher-student, comrades, colleagues, etc.), and geographical relationships (hometowners, neighbors, alumni, etc.).
Based on stability, interpersonal relationships can be divided into fixed and non-fixed relationships. Fixed relationships refer to relatively stable and long-term relationships (such as parent-child relationships, teacher-student relationships, comrade relationships, etc.), which have a greater impact and deeper influence, and people are more dependent on them. Non-fixed relationships mainly refer to relationships that change with time, location, and conditions (such as temporary travel companions, one-time business relationships, etc.), which are maintained for a short time, are unstable, and are prone to change. Of course, fixed or non-fixed is relative, and under certain conditions, they can also transform into each other.
In short, if one can correctly recognize the other party's social role, they may be able to estimate and infer the other party's behavior more accurately.
Interpersonal behavior also follows several laws of exchange, mainly including the following six:
(1) Success Law. The more often a person's actions are rewarded, the more likely they are to take that action. In other words, anyone is more likely to engage in behaviors that are frequently rewarded, and in interpersonal interactions, the frequency of interaction is directly proportional to the rewards received.
(2) Stimulus Law. If a specific stimulus in the past has rewarded a person's actions, the more similar the current stimulus is to that specific stimulus, the more likely the previous actions will be repeated.
(3) Value Law. The more valuable the outcome of a person's actions is to them, the more likely they are to repeat the same actions. Therefore, in interpersonal interactions, people will always choose behaviors that can yield higher rewards.
(4) Deprivation/Satisfaction Law. If a person has frequently received a specific reward recently, the value of that reward will decrease for them in the future.
(5) Attack/Approval Law. On one hand, when a certain action does not receive the expected reward (or receives an unexpected punishment), they may become angry and take aggressive actions; on the other hand, when a certain action receives the expected reward, or even the reward is greater than expected (or does not receive the anticipated punishment), they will feel happy and be more likely to take approving actions.
(6) Rational Law. When deciding what action to take, people will not only consider the size of the action's value but also the likelihood of the action's success.
The above six laws indicate that in the process of interaction, both parties pursue fairness, that is, to judge the various possibilities of the costs and rewards of the interaction, and in the case of equal costs and contributions, they always expect to receive fair rewards. The "fairness" standard mainly has two aspects: one is to compare past experiences, that is, in similar actions, whether the past "input-output ratio" is higher or lower; if it was more advantageous in the past, they will feel unfair; the second is to compare with other groups, that is, if their "input-output ratio" is lower compared to the group they identify with, they will feel unfair. In real life, people tend to compare themselves more with surrounding groups.
Here are several methods that everyone should pay attention to:
Method 1: Observe their feet
Many people believe that facial expressions are the most revealing of a person's inner thoughts; whether they are lying, facial expressions reveal everything, which is why the American TV series "Lie to Me" is so popular. However, in fact, observing a person's feet may reveal more information.
For example, when you are chatting with someone about trivial matters, you notice that they do not shake their crossed leg, but when you mention some key issues, such as the company recently losing a lot of things, they start to unconsciously shake their leg, then this person is highly likely to be lying.
For example, we subconsciously point our feet toward the direction we want to go. You may have experienced this: at a party, if you are chatting with someone and their feet are occasionally pointing toward the door, you can probably feel that they want to sneak out of the party.
Customs officers have also received similar training; they can tell whether someone is lying by observing their feet. Generally, normal people, when stopped by customs and questioned, face the customs personnel, and their feet will also turn toward them; however, those who are smuggling, when stopped, often turn their faces away, but their feet still point toward the exit. These subconscious body states are uncontrollable when a person is very nervous.
Method 2: Overly staring at you
Generally, we think that if a person is lying, they should not be able to look you straight in the eye and should avoid others' gaze to prevent their anxious eyes from revealing themselves. A person who is lying is more likely to stare at the person questioning them to convince them that they are not lying. Therefore, when someone is talking about something and is staring at you excessively, there is an 80% chance they are trying to hide something.
The suggestion is that if you really want to hide something, you can look at the other person moderately and then slightly lower your head; this will make it easier to gain trust.
Method 3: Overreacting
Similar to staring at the other person, liars are often more easily angered and more likely to have excessive reactions than normal people. They do this to completely crush you, making you feel how could you ask such a ridiculous and stupid question, trying to dissuade you from asking them that question through such an extreme reaction. Therefore, when you ask someone a question and their reaction is very abnormal, it is worth delving deeper.
Method 4: Lighter punishment (this can be referenced by business managers)
There are many ways to discover if someone is lying; the key is to carefully observe a person's abnormal behavior, in what circumstances they react differently from usual, or how their reactions differ from most people; this is the key to the problem.
CIA agents' "weapons" they carry at all times
Some items they carry with them are common household items, including safety pins, small knives, handcuff keys, tape, etc. Among them, one item they love as a self-defense weapon is the tactical self-defense pen.
We need to understand what an intelligence source is. Theoretically, any form of carrier that can generate, hold, store, or transmit intelligence, including institutions, individuals, or objects, can become a source of intelligence.
Based on the form of the intelligence source, intelligence sources can be divided into five aspects:
-
Documentary intelligence sources
-
Network intelligence sources
-
Human intelligence sources
-
Institutional intelligence sources
-
Physical intelligence sources
Although these five types of intelligence sources differ in their carriers, there are extensive and complex connections between them. Through one type of intelligence source, clues to another type of intelligence source can be obtained, thus linking them together to ultimately meet intelligence needs.
Due to the different fields involved, different types of intelligence information sources have their particularities, which require intelligence collection to have certain professional characteristics. Here are a few examples:
-
The military intelligence field often uses reconnaissance methods for intelligence collection, and its intelligence sources include espionage and reconnaissance, military reconnaissance, civilian reconnaissance, radio technical reconnaissance, satellite reconnaissance, etc.;
-
In the medical field, the intelligence sources available to doctors include specialized journals, society reports, instructions, pharmaceutical collections, printed materials from pharmaceutical companies, advertisements, and exchanges among peers;
-
The library intelligence field often uses literature, networks, physical objects, discourse, visuals, and service agencies as intelligence sources.
Episode 1: Documentary Intelligence Sources
Documentary intelligence sources have always played an indispensable role in the intelligence collection process. As a traditional source of intelligence collection, documents are also the most basic source, and each type of documentary material plays its unique importance. Let's focus on discussing the classification and utilization of some documentary intelligence sources.
1. Books
In the 1970s, a young student studying economics at Harvard University wrote a technical report titled "How to Manufacture a Nuclear Bomb" using those very ordinary public books and materials in the library, which was described by American nuclear expert Taylor as "the most detailed and comprehensive material on manufacturing nuclear bombs ever seen."
In addition to obtaining intelligence through the content of books, intelligence personnel should also pay attention to the citations at the end of the documents to find more clues for further research. Besides being used for national strategy and international relations research, books can also serve as evidence.
2. Newspapers, Journals, and Magazines
The intelligence covered by newspapers includes various fields such as domestic and foreign politics, economics, culture, academia, and society, serving as a "window to the world." U.S. embassies abroad usually subscribe to various major local newspapers and highlight relevant information from those countries, compiling related information in the form of clippings, thus forming part of intelligence reports to support government decision-making.
U.S. news even states that "Spy agencies turn to newspapers, NPR, and Wikipedia for information," indicating that intelligence agencies have begun to turn to publicly available news reports for intelligence collection, highlighting the importance of newspapers as intelligence sources.
3. Scientific and Technical Reports
The content of scientific and technical reports involves military, national defense, cutting-edge technology, important projects, new materials, new processes, and other new fields and technological frontiers. Some of these reports are confidential and can only be made public once the content is no longer sensitive.
Each country has its own scientific and technical reports, with the U.S. having the largest number and variety.
The National Technical Information Service (NTIS) involves various fields such as energy, aerospace, and military. Its published reports collect, organize, and utilize secret technological materials from key countries.
The Armed (AD) report is primarily based on research reports from various cooperating units of the U.S. Department of Defense.
The National Aeronautics and Space Administration (NASA) report focuses on aerospace and space science technology, while also involving many basic disciplines.
The Department of Energy (DOE) report mainly covers energy development research activities, almost encompassing the entire energy field and its applications.
Among the four major reports in the U.S., the publicly available and declassified AD, NASA, and DOE reports are collected and publicly issued by the National Technical Information Service, with an annual issuance volume of over 60,000 copies, accounting for about 80% of the total global scientific and technical reports.
4. Government Publications
Countries such as the UK, the US, France, Japan, Germany, and Canada have systematic government publications, which are important materials for in-depth research on the political, economic, cultural, social, and technological conditions of other countries and have significant reference value.
For example, the "National Security Strategy Report" submitted by the U.S. President to Congress is a very reliable basis for studying and understanding U.S. national security strategy, from which one can study the key points and evolution process of its national strategy.
Japan has a large number of government publications, including "Official Gazette," "Economic and Financial White Paper," "White Paper on Maritime Disputes," "Report of the National Language Council," and various types of publications, all of which are important channels for foreigners to understand official information about Japan.
To facilitate the retrieval and use of government publications, various countries have published catalogs, monthly reports, and other documents, such as:
-
The U.S. compiles the "Monthly Catalog of U.S. Government Publications";
-
The "Index to Publications of the U.S. Congress";
-
The UK compiles "A Guide to British Government Publications," etc.
5. Archives
Archival materials are an important resource for studying a country's diplomatic and military policies. When discussing how to obtain intelligence, U.S. Cold War strategist George Kennan stated in a New York Times article on May 18, 1997, "95% of what we need to know can be obtained through careful and thorough research of the vast amount of documents and archives we have."
Archives contain a wealth of content and clues, and systematic research on them can yield many key intelligence pieces. In April 2002, the U.S. National Security Archive released secret documents from the Cuban government, including internal reports, memoranda, and handwritten samples of telegrams. This information can promote the U.S. understanding of Cuba's role in international events.
In addition to the aforementioned forms of documents, there are also patents, standards, conference documents, theses, product samples, and gray literature, all of which play varying roles in the intelligence collection process.
In determining intelligence sources, intelligence personnel should select according to the characteristics of various documents and specific issues in the security field.
Intelligence collection not only emphasizes the comprehensive use of multiple intelligence sources but also places great importance on obtaining intelligence from open sources. Thomas Fingar of the U.S. National Intelligence Council pointed out that open channels can provide up to 90% of the information for most U.S. intelligence agencies, so fully utilizing this information is very important and should be part of our work.
In fact, the effectiveness of obtaining intelligence from open sources has been confirmed over time. Robin Winks pointed out that 90% of the required foreign intelligence can be obtained from open intelligence sources. Arthur S. Hulnick believes that in a typical analytical report, about 80% of the content comes from open intelligence sources. From these figures, it can be seen that open-source intelligence has become the main source of intelligence acquisition.
Regarding the classification of open-source intelligence, the "U.S. Army Battlefield Manual 2-22.9 Open Source Intelligence" broadly categorizes numerous open sources into:
-
Academic institutions;
-
Government and non-government organizations;
-
Commercial and public information service agencies;
-
Libraries and research centers;
-
Individuals and groups;
-
Dividing first-hand open-source media into public speaking forums;
-
Public documents;
-
Public broadcasts;
-
Websites (Internet sites).
According to classification, open-source intelligence is divided into print media, electronic media, display media, outdoor media, object media, Web 2.0 era media, and other media (government data, etc.).
The U.S. Information Security Association divides open intelligence sources into: media, web-based communities and user-generated content, public data, and professional and academic categories. Different bases have different classification methods, and currently, open intelligence sources have not formed a widely recognized classification.
In addition to open intelligence sources, according to the FBI's intelligence collection theory, intelligence sources also include human intelligence sources, signal intelligence sources, image intelligence sources, measurement and signature intelligence sources.
Among them, human intelligence sources are one of the commonly used intelligence sources in competitive intelligence, public security intelligence, etc., while other intelligence sources involve covert means.
Before the advent of the Internet, the main sources of open-source intelligence were books, magazines, newspapers, journals, broadcasts, television, radio, news media, and publicly available information and data from government and non-government organizations. As the Internet gradually developed, it became the primary means of obtaining open-source intelligence.
Internet intelligence sources can be obtained in the following three ways:
-
Networked products containing the aforementioned traditional intelligence;
-
Geospatial intelligence websites and services represented by Google Earth;
-
Online communities—social media websites, video sites, encyclopedias, blogs, forums, shopping websites, etc.
As early as 2006, the U.S. launched the National Open Source Initiative, focusing on collecting publicly available information related to national military, defense, social, and economic aspects. In the military field, security departments and intelligence agencies around the world have invested a lot of manpower and resources to research and apply computer network intrusion and counter-intrusion technologies, mainly including computer acquisition technology and computer penetration technology.
The rapid development of the Internet has made it possible for individuals and groups to conduct global research. In addition to the exponential growth of Internet users, the frequency of use of Internet-connected devices has also increased significantly, thus providing intelligence personnel with immense intelligence value.
1. Search Engine Intelligence Collection
Search engines are one of the important channels for people to obtain information in the Internet era and are also the simplest and fastest way to gather intelligence in a specific field. Due to the vast amount of information, some companies obtain Internet information through crawling methods, providing services in the form of keyword searches based on established indexes.
In summary, using regional search engines to collect intelligence in specific languages often yields better results than global search engines.
- Global Universal Search Engines
Website—http://www.google.com
Bing
Website—http://www.bing.com
Search engines are tools for finding information via the Internet. Google and Bing are the most widely used search engines globally, covering almost all fields of information, from news to science, from life to work, and even including competitive intelligence in various industries.
As an intelligence analyst, you must frequently use these two search engines to obtain the required intelligence, analyze market trends, and competitors' strategies. At the same time, they also provide many useful tools and features, such as Google Maps, Google Translate, Google Docs, etc., facilitating collaboration and sharing results among analysts.
DuckDuckGo
Website—https://duckduckgo.com
A privacy-focused Internet search engine. "When you watch a gorilla at the zoo, the gorilla is actually watching you." Similarly, when you obtain information through a search engine, the website records your search history through cookies and other means. This historical information can be used to provide more accurate search results, but it also exposes your intelligence-gathering intentions.
With the popularization and development of the Internet, people increasingly rely on online search engines for information. However, this also brings the risk of privacy leakage. For users, they may not want to be tracked by search engines, which record their search history and personal information, which is precisely what DuckDuckGo emphasizes.
The anonymity of this search engine protects users' privacy and somewhat alleviates privacy leakage issues. In addition to protecting privacy, DuckDuckGo has other advantages. Compared to other search engines, its search results are more neutral.
On the search results page, it does not give priority to advertisements or specific websites but ranks results based on the relevance of search keywords. Additionally, DuckDuckGo offers some extra features, such as encrypted searches and blocking intrusive advertisements.
However, DuckDuckGo also has some shortcomings. Since it does not record users' search histories, it cannot provide personalized search results like other search engines. Moreover, compared to the user base of other search engines, DuckDuckGo's user numbers are still relatively small, and the content it covers is also relatively limited.
While these issues are not fatal flaws, they do limit DuckDuckGo's application scenarios and audience. Overall, DuckDuckGo's anonymity is its biggest feature and the main reason users choose it. Whether for privacy-sensitive users or those seeking neutral search results, it is a search engine worth trying.
2. Regional Search Engines
China
These two search engines do not need much introduction, as everyone is very familiar with them.
Baidu http://baidu.com
Sogou http://sogou.com
To meet the growing data demands of domestic netizens, domestic Internet companies have continuously developed and launched their own search engines, such as Baidu Search, 360 Search, Sogou Search, etc.
These search engines have localized characteristics and can more accurately meet the needs of domestic netizens, thus being very popular. In our daily work, we often need to use search engines to query relevant information, especially in fields that require learning and research, where search engines are indispensable.
Through search engines, we can quickly find information and materials related to our work, thus speeding up work progress and improving work efficiency. At the same time, search engines also help us obtain a wide range of knowledge and information, thereby broadening our horizons and thinking.
Russia
In Russia, Yandex has some unique features. For example, it provides an online shopping comparison platform called Yandex.Market, allowing users to search for and compare prices and products from different merchants.
In addition, Yandex also offers a mapping service similar to Google Maps, allowing users to search for and navigate to destinations, as well as view local weather conditions and nearby landmarks and restaurants. Yandex also provides a voice assistant service, which can be used similarly to Siri or Alexa to query information, play music, control home devices, etc.
Although Yandex's main market is in Russia and neighboring countries, it also has a certain user base in other countries, such as Turkey and Eastern Europe.
In the search engine market for Russian speakers, Yandex has long been the market leader, with some data showing that it holds about 50% of the search market in Russia. Additionally, Yandex went public on NASDAQ in 2018, becoming one of the first Russian technology companies to be listed in the U.S.
Yandex
Website—http://www.yandex.ru
South Korea
Naver
Website—http://www.naver.com
Naver holds about 70% of the search market in South Korea, and its search results and service quality are widely recognized and trusted. In addition to basic search functions, Naver also provides various services such as finance, shopping, entertainment, and social networking, making it an important part of Internet life in South Korea.
In addition, Naver also has its own email system, news, and knowledge Q&A platform, providing users with comprehensive services. Especially its Q&A platform is the largest knowledge-sharing community in South Korea, with a large user base and professional intellectuals, being hailed as "Korea's Baidu Know."
Naver has also launched its own mobile applications, such as maps, music, translation, voice recognition, and smart assistants, performing outstandingly in the mobile market. At the same time, Naver has also been deeply cultivating overseas markets, such as launching the "LINE" social application in Japan, becoming one of the most popular communication tools locally, and successfully entering markets in neighboring countries like China.
Overall, Naver is one of the leaders in South Korea's Internet industry, with a strong user base and extensive service coverage, holding an important position and influence in the Internet market in South Korea and Asia.
Japan
Goo
Website—http://goo.ne.jp
Goo is the regional search engine for Google in Japan. Goo is Japan's Internet search engine and portal site, mainly providing search services and belonging to the NTT Group.
In addition to search, maps, dictionaries, transfers, news, and shopping services, Goo also offers many other tools and features, such as translation, coupons, stock information, weather forecasts, recipes, and medical information. The translation function supports multiple languages, including Japanese, English, Chinese, Korean, French, German, and Spanish, enabling easy text, voice, and image translation.
The coupon function provides various brands' discount coupons, vouchers, and free trial coupons for users to collect and use online. The stock information function provides the latest news, K-line charts, and market analysis related to stocks, helping users stay updated on stock market dynamics.
The weather forecast function supports real-time weather queries and forecasts for various cities, including temperature, humidity, wind speed, air pressure, and precipitation.
The recipe function provides various delicious recipes for users to reference and learn. The medical information function provides knowledge related to health and advice to help users prevent diseases and maintain health.
In summary, Goo is a very practical and comprehensive online service platform that can provide users with various assistance and support in life, work, and study.
France
Qwant
Website—http://qwant.com
Qwant is a rapidly developing and unique search engine in Europe that has its own index. The characteristic of the Qwant website is its emphasis on protecting user privacy and never collecting user information. During each search, it only generates temporary cookies, and data is not stored, meaning it is an anonymous search engine that also provides versions in 13 languages.
3. Meta Search Engines
Meta search engines, also known as aggregated search engines, are characterized by combining multiple individual search engines into one unified search page, submitting users' search keywords to multiple independent search engines, and retrieving multiple databases. The results are then processed based on the results from multiple independent search engines (deduplication, sorting, etc.) before being output to users.
Info
Website—http://www.info.com
Info is a meta search engine, ranking as the 10th search engine, providing search results applicable to Google, Yahoo!, Yandex, Ask, Kanoodle, etc.
Due to space constraints, subsequent content will be updated gradually, providing detailed introductions and usage methods for each category of Internet intelligence collection.
4. Special Search Engines
SearchCode
Website—https://searchcode.com
SearchCode is a free source code search engine that indexes and provides search services for source code (free software) repositories. The website offers search services for 200 billion lines of code from 7 million projects, including real examples of functions, APIs, and libraries in over 90 languages from more than 10 sources. These open-source projects include GitHub, Bitbucket, Google Code, Codeplex, Sourceforge, Fedora Project, GitLab, etc.
Users only need to enter the search keyword, and the interface will display the matching results. Keywords can include function names, constants, variable names, or referenced package names.
ZoomEye
Website—https://www.zoomeye.org
ZoomEye is a search engine for retrieving nodes in cyberspace. Through a distributed crawling engine on the backend, it analyzes global nodes and identifies the characteristics of each node, thus obtaining information such as device type, firmware version, distribution location, and open port services. ZoomEye positions itself as a cyberspace search engine.
5. Other Search Engines
WorldWideScience (Scientific Literature Search Engine)
Website—https://worldwidescience.org
WorldWideScience is a global scientific search engine (academic database and search engine) aimed at accelerating scientific discovery and progress by speeding up the sharing of scientific knowledge. Through multilateral partnerships, it enables anyone with Internet access to perform single-query searches across national scientific databases and portals from over 70 countries or regions, covering all inhabited continents and three-quarters of the global population.
WorldWideScience implements unified searches to cover global scientific research results. The unified search technology allows information sponsors to search multiple data sources in real-time through a single query. It provides synchronized access to "deep web" scientific databases that are typically not searchable through commercial search engines. In June 2010, WorldWideScience implemented multilingual translation capabilities. Using Microsoft's Bing Translator, WorldWideScience enables users to search databases in 10 languages and then translate the results into the user's preferred language. It can perform "one-to-many" and "many-to-one" machine translations in Arabic, Chinese, English, French, German, Japanese, Korean, Portuguese, Russian, and Spanish.
WorldWideScience provides scientific search through various features, including:
-
Clustering results by subject or date to help users determine search targets;
-
Wikipedia results related to the user's search terms;
-
Scientific news results related to the user's search terms;
-
Options to tag and send results via email to friends and colleagues;
-
Enhanced information related to the user's real-time searches;
-
Alert services;
-
Multilingual translation.
2. Social Media Intelligence Collection#
With the popularity of social media, more and more people are using it not only for social interaction but also as a tool for intelligence collection. On social media, users can convey information to the outside world through activities such as posting content, liking, and commenting.
This information may contain personal information about certain individuals, news in specific fields, social hot topics, etc., all of which are valuable resources for intelligence collection. First, to obtain valuable intelligence, it is necessary to choose suitable social media platforms.
Today, major social media platforms each have their unique characteristics and user groups. Choosing the right platform can make it easier and more accurate to obtain valuable intelligence. Secondly, it is essential to establish a clear intelligence collection goal. This can help us focus more on collecting information related to the target.
For example, if we want to understand the opinions, preferences, or whereabouts of a specific group, we can follow their social media accounts or search for topics related to them, allowing us to collect intelligence on that group more precisely.
Most importantly, attention must be paid to protecting personal information and privacy. On social media, personal information can be leaked at any time. Therefore, when collecting intelligence, it is essential to comply with relevant laws and regulations and not violate others' privacy rights and human rights. At the same time, we must also protect our personal privacy and avoid excessive exposure. We can choose to use pseudonyms, conceal personal information, and other methods to protect our privacy.
Major Global Social Networks
Website: https://www.facebook.com/
Meta Platforms, Inc. (commercial name: Meta) is an American Internet technology company that operates social networking services, virtual reality, and metaverse products, headquartered in Menlo Park, California. It owns social software such as Facebook, Instagram, and WhatsApp.
Founded by Mark Zuckerberg and his roommates, Harvard students Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, and Chris Hughes, the original name was TheFacebook.com, later simplified to Facebook, and on October 28, 2021, Zuckerberg announced the name change to Meta.
In addition to social networking services, Meta provides other products and services, including Facebook Messenger, Facebook Watch, and Facebook Portal. It has also successively acquired Instagram, WhatsApp, Oculus, Giphy, and Mapillary, and holds a 9.9% stake in Jio Platforms.
Meta is one of the most valuable companies globally and is considered one of the five major tech companies alongside Microsoft, Amazon, Apple, and Alphabet.
Meta (formerly Facebook)
Web version: https://about.meta.com/
Meta (the metaverse) is one of the largest social media websites globally, formerly known as Facebook, founded by Mark Zuckerberg and headquartered in Menlo Park, California. As a social networking service center, Meta generates a massive flow of information daily, with approximately 900 million users covering different age groups and identities.
On the Meta platform, users can share information in various forms, including text, photos, and voice, while also achieving real-time location sharing through the built-in map function. The birth of Meta has ushered in the era of the metaverse, allowing people to interact and explore infinite possibilities in a virtual world.
Website: https://twitter.com/home
Twitter is a microblogging social platform that has conquered the globe, headquartered in San Francisco, USA. Its main function is to allow users to publish and share information in no more than 140 characters. Both ordinary users and government agencies and officials have found their stage on Twitter.
As of 2018, Twitter had over 350 million active users, with the number of tweets published daily reaching as high as 400 million, fully demonstrating Twitter's strong influence in information dissemination and social interaction.
On October 27, 2022, Elon Musk acquired Twitter for $44 billion, gaining control of the platform. Since the acquisition, the platform has faced criticism for promoting content that includes hate speech.
On December 20, 2022, Musk announced that he would resign as CEO once a replacement was found. On May 12, 2023, Musk announced that he would resign as CEO in about six weeks, and Linda Yaccarino, former advertising sales chief at NBCUniversal, would become the new CEO.
Website: https://www.linkedin.cn/
LinkedIn is the world's largest professional social platform, headquartered in Mountain View, California, USA. It aims to provide a one-stop career development platform for individuals and businesses. As of 2020, LinkedIn had over 600 million users across more than 200 countries and regions.
In China, LinkedIn has over 40 million users and has established deep cooperation with Chinese companies in high-tech, Internet, finance, manufacturing, communication, and other industries. LinkedIn has now become an essential social tool for professionals in China, helping them expand their network resources and career development opportunities.
Discord
Web version: https://discord.com/
Discord is a free online real-time communication software and digital distribution platform designed for communities, primarily targeting gamers, educators, friends, and business people. Users can communicate through messages, images, videos, and audio in the software's chat channels. This software can run on Microsoft Windows, macOS, Android, iOS, Linux, and the web.
As of 2021, the service had over 350 million registered users and over 150 million monthly active users.
In the intelligence leak incident in April of this year, the Discord social website was involved.
Web version: https://www.instagram.com/
Instagram, also known as "photo wall," is a social application and platform primarily focused on sharing photos on mobile devices, acquired by Facebook in 2012. Instagram has a vast user base, surpassing 1 billion users by 2018.
Instagram also contains many social elements, in addition to establishing friendships and general functions such as replying or sharing, there are also features such as name tagging for quick interaction with strangers.
Web version: https://www.pinterest.com/
Pinterest is a globally renowned image-sharing social website headquartered in Palo Alto, California, USA. It not only allows for multi-tag classification by theme but also serves as a highly creative personal image collection and visual exploration tool.
Similar to Twitter, users can save images of interest on Pinterest and share them with other netizens. This makes Pinterest a popular social application, attracting millions of users worldwide with its innovation and interactivity.
VKontakte
Web version: https://vk.com/
VKontakte, abbreviated as VK, is a well-known online social website originating from Russia, headquartered in the Virgin Islands. It is one of the largest websites in Russia, with the majority of its users being citizens of Russian-speaking countries.
VK's functions are very similar to Facebook, allowing users to post their dynamic blogs, including images, videos, audio, and location information, while also allowing other users to leave public comments or messages.
Tumblr
Web version: https://www.tumblr.com/
Founded in 2007, Tumblr is one of the largest microblogging websites globally, headquartered in New York, USA. It combines the strengths of traditional blogs and microblogs, characterized by stream-of-consciousness narratives, allowing users to record their daily lives in short blogs and share multimedia and other content.
In addition to common functions such as comments and sharing, blog authors can enjoy many interesting features in Tumblr's dashboard. In this innovative way, Tumblr has played a very important role in the establishment and development of microblogging websites.
Snapchat
Web version: https://www.snapchat.com/
Snapchat is a multimedia social instant messaging application focused on mobile devices. Users can easily use it on Android and iOS platforms. One of its most attractive features is its "self-destruct" function, which limits the lifespan of each message to within 10 seconds.
Initially, Snapchat was dedicated to photo sharing between users, but now it not only allows users to process photos and videos using built-in rich filters, lenses, and stickers but also provides user stories and discovery features, which are arranged chronologically, along with many interesting features such as augmented reality.
Web version: https://www.whatsapp.com/
WhatsApp Messenger, abbreviated as WhatsApp, is a free messaging application owned by Facebook that enables cross-platform messaging and voice transmission between smartphones and PCs. Users can send text, voice, and video messages through the application, sharing media such as images, documents, and locations.
Using the service requires users to provide a standard cellular mobile phone number for registration. As of 2018, WhatsApp has covered Brazil, India, Pakistan, and most of Europe, with over 1.5 billion users worldwide.
Skype
Web version: https://www.skype.com/en/
Skype is an instant messaging application that provides video and voice calling services between connected devices, including mobile phones, tablets, and other internet-connected systems. Users can send and receive instant messages, transfer files, send and receive multimedia information, and conduct video conferences through Skype.
Telegram
Web version: https://telegram.org/
Telegram is a Russian instant messaging software released in 2013, with one of its founders being the founder of the Russian social platform VK. Telegram allows users to exchange encrypted messages and "self-destructing" messages, with messages in various formats, including photos, videos, and audio.
Flickr
Website: https://www.flickr.com/
Flickr is an image hosting and video hosting service platform created in 2004. Flickr offers two types of accounts: free and professional. The free version currently only allows storage of 1,000 photos and videos, while the length of videos is limited to 3 minutes, whereas the professional version has unlimited storage space.
When users upload images to Flickr, the images form a "photo stream," and all photo streams can be displayed in a reasonable view and can be shown as a slideshow. Users can use titles and text descriptions to tag their images, making them easy to search within Flickr.
Users can organize Flickr photos into "albums," and Flickr also provides the functionality to embed albums into blogs, websites, and forums. Flickr albums represent a form of classified metadata rather than a physical hierarchy.
Flickr can apply geotags to photos in albums, and users can use imapflickr to associate any geotagged album with a map. The generated map can be embedded into websites. Flickr albums can be organized into "collections," which can themselves be further organized into higher-level collections.
Meetup
Website: https://www.meetup.com/
Meetup is a service platform for organizing online groups, established in 2002 and headquartered in New York, USA. The platform hosts face-to-face events for people with similar interests, making it easier to start and operate communities with shared regions or interests. Users can communicate online with others who share similar hobbies through Meetup, and Meetup also provides a rich variety of organizational forms such as seminars and events.
Additionally, the time, location, and theme of events can be determined by users themselves, and users can search for and participate in interest groups that align with common goals by searching postal codes, activity areas, and interest tags on the website.
Mixi
Web version: https://mixi.co.jp/en/
Mixi is an online social networking service platform in Japan, established in 1999 and headquartered in Shibuya, Tokyo. It is the most popular and widely covered social platform in Japan, with a focus on community entertainment, allowing users to meet new friends based on shared interests.
Unlike Facebook, young people in Japan, especially young women, prefer to use Mixi as a private way to connect with close friends rather than a public network like Facebook. Registering for Mixi requires a valid Japanese phone number, which strictly limits the social scope to within Japan.
Odnoklassniki
Web version: https://ok.ru/
OK, short for Odnoklassniki, is a social networking service platform from Russia, primarily targeting classmates and old friends, and has been operating for 15 years. It is very popular in Russia and former Soviet countries, ranking among the top ten websites in Russia by traffic.
Although the user base is second only to VK, OK also has a wide coverage, reaching a broad age range, with a user age limit of 7 years and older.
Facebook Information Retrieval and Analysis
Facebook Advanced Search
Website: https://fb-search.com
Facebook Advanced Search is a powerful free tool that helps you easily find various content on Facebook. Just enter keywords (a word or a group of words) in the search bar, and you can quickly find the content you need.
However, before using this search engine, you need to log in to your Facebook account. If you want to find friends, just enter their names and select "People" from the dropdown menu to start searching. In addition to searching for people, you can also search for groups, pages, posts, events, and applications.
Lookup-ID
Website: https://lookup-id.com
Lookup-ID helps users find their Facebook ID for personal profiles or online forums. The Facebook ID is a multi-digit number.
Facebook Like Checker
URL: http://www.fblikecheck.com
Facebook Like Checker is a free application that allows users to check the likes of any Facebook Page in any country or region, making it an excellent tool for statistics on Facebook Pages. This application allows businesses to see where their Facebook page is popular based on likes.
Twitter Information Retrieval and Analysis
Tweet Tunnel
Website: http://tweettunnel.com
Tweet Tunnel is a very interesting website because it adds some features to Twitter that Twitter itself does not have. These features can not only enhance the user's social experience but also bypass some official Twitter restrictions. For example, the message box feature allows users to send messages to people they do not follow, while the old tweets feature allows users to view up to 3,200 tweets posted by a person.
In addition, the friend circle feature can help users discover who is interacting with whom, while the photo library feature allows users to easily obtain photos and background images posted by other users. Additionally, the DM ALL feature allows users to send messages to all followers, while the long tweet feature breaks the 140-character limit of Twitter, allowing users to freely express their thoughts.
However, it should be noted that some features may involve privacy issues, and users need to use them with caution.
Twitonomy
Website: http://www.twitonomy.com
Twitonomy is a powerful Twitter social information visualization analysis tool that can provide you with detailed visual analyses of any user's tweets, retweets, replies, mentions, and hashtags.
With Twitonomy, you can easily browse, search, filter, and understand the insights of users you follow and those who follow you. Additionally, Twitonomy offers one-click backup, export of tweets, retweets, mentions, and other features, allowing you to stay updated on your Twitter activities and monitor interactions with other users.
If you want to dig deeper into Twitter information, Twitonomy will be an indispensable tool for you. Give it a try!
Input keywords related to Internet open-source intelligence collection and analysis, and this website can generate Twitter-based search analysis based on those keywords or tags. Twitonomy also has some "sniffing features," such as quickly monitoring users you like and listing their detailed interaction reports.
OmniSci Tweetmap
Website: https://scl2-04-gpu03.mapd.com
OmniSci Tweetmap is a powerful interactive search and analysis website for tweets. Its GPU-driven database and visualization platform aim to provide users with lightning-fast data browsing experiences, quickly bridging the gap between analysts and data.
By leveraging the power of GPU supercomputing, OmniSci can browse billions of tweets from different regions in milliseconds and clearly present the geographical locations of these tweets on a map, helping users quickly understand the popularity or recognition of a topic or keyword in a specific area. This makes OmniSci Tweetmap the best choice for searching and analyzing large-scale Twitter data.
LinkedIn Information Retrieval and Analysis
Dux Soup
Website: https://www.dux-soup.com
Dux Soup is a LinkedIn automation tool that helps users use LinkedIn more intelligently and conveniently. With Dux Soup, users can easily find and attract potential customers, automate leads, and focus more on business development and closing deals.
Dux Soup automatically views users' LinkedIn potential customer profiles and follows their activities, sending personalized messages on behalf of users. Additionally, it can set up an automated follow-style advertisement for potential customers, which will automatically stop when the customer responds.
Moreover, Dux Soup also provides potential customer management functions, allowing users to keep notes and tags directly on the LinkedIn profiles they are viewing for easy searching and operation, and even allows searching and operating profiles of unconnected individuals. All of this makes Dux Soup an indispensable assistant for using LinkedIn.
Linkedin to Username
Website: https://github.com/initstring/linkedin2username
This open-source intelligence tool allows you to easily generate a list of usernames from companies on LinkedIn. This tool uses pure web crawling technology and does not require an API key.
Just log in using a valid LinkedIn username and password and specify a target company, and it will create a list of possible username formats for all employees of that company and crawl the results. For better results, it is recommended to use an account with multiple contacts and add the target company to the contact links. Using this tool, you can quickly and accurately obtain the intelligence you want.
Socilab
Website: http://socilab.com/#home
Socilab is a creative and practical website that provides efficient network visualization and analysis functions for LinkedIn users. As an open-source site, it has been widely used, providing users with interactive tutorials and important support for social resource and social network analysis.
Using Socilab, users can easily visualize and analyze their LinkedIn networks in the browser using social science research methods, which is extremely convenient and efficient, and is of great significance for both individuals and enterprises in network analysis.
Linked Helper
Website: https://linkedhelper.com
LinkedHelper is your secret weapon for mastering LinkedIn! This application can help newcomers to LinkedIn automate their work and gain thousands of targeted contacts. You can even send personalized invitation messages to second and third contacts, increasing the likelihood of them becoming your quality contacts.
Not only that, but it also has an automated email system, an auto-responder, and can send messages to first connections.
Community Forum Intelligence Collection#
Community forum intelligence is mainly divided into the following categories:
-
- Internet communities
-
- Comprehensive communities
-
- Q&A communities
-
- Vertical communities
-
- Regional communities
-
- Community information
A community is typically defined as a group of social groups or organizations that form an interrelated, interdependent group with shared values and goals in a specific field. As a basic component of social organisms, communities are also a microcosm of macro society. In such a group, people can help each other, communicate, develop together, and realize their self-worth. The construction of communities plays a crucial role in the development and progress of society. Online communities and real-world communities share certain commonalities, including specific places, certain populations, corresponding organizations, community member participation, and some common interests and cultural characteristics. The most important point is that online communities also provide various means of exchanging information, such as discussions, communications, and chats, enabling community residents to interact.
Online communities also have many differences from real-world communities: first, participants in online communities are not restricted by geographical location and can interact anytime and anywhere, making the population of online communities more diverse and broader. Second, members of online communities can maintain relative anonymity and privacy, allowing for freer discussions on certain topics. Third, the culture and interests of online communities are often more diverse and specialized, as online communities can accommodate more different types of people and interest groups, while the culture and interests of real-world communities are constrained by geographical and social factors. Online communities are communication spaces in the Internet world, including BBS, forums, bulletin boards, group discussions, online chats, dating, personal spaces, and wireless value-added services. Unlike social media, online communities gather users with shared interests, forming a network community around the same theme. The content of online communities is rich and varied, covering topics such as current political hotspots, sports news, family trivia, workplace experiences, scientific knowledge, stock investments, historical culture, real estate purchases, car driving, film and television entertainment, and music and art, all of which are topics people are eager to discuss. It can be said that any content people pay attention to in life is the discussion content of online communities. Because the content of online communities comes from the general public, it generally lacks authority, and many opinions are merely the personal views of community users. Many communities can promote content recognized by community members through means such as approval and voting.
Internet Community
Reddit Website: https://www.reddit.com
Reddit is a community website with endless charm, integrating entertainment, social interaction, and news. Standing at the forefront of the Internet, it provides users with a comprehensive content classification, including news, technology, video games, movies, sports, music, books, fitness, food, image sharing, etc. Here, users can not only enjoy the exciting content of the community but also create original works and share their stories and insights with users worldwide. On this platform, users can publish their content and receive votes and ratings from other users. Depending on the content, users can give different ratings, and content that scores highly has the opportunity to enter the homepage, gaining more exposure and attention. Additionally, users can comment and reply within the community, interacting and forming social circles.
Quora Website: https://www.quora.com
Quora is an online Q&A community that allows you to obtain countless valuable questions and answers. The founders of the site aimed to create a strongly social online knowledge-sharing platform, providing users with a place to solve problems and share experiences and knowledge. Quora gathers a large number of questions and answers while allowing users to participate in the collaborative editing of questions and answers. Users can log in using their Google or Facebook accounts, ensuring that content is not indexed by search engines while allowing the public to participate.
Guokr Website: https://www.guokr.com
Guokr is China's leading pan-science interest community cultural platform, focusing on promoting scientific concepts, providing responsible and interesting scientific popularization content, and exploring and creating new forms and new consumption scenarios for scientific communication in the new era. Whether in media, education, health, cultural creativity, or consumption, Guokr has a strong business presence, becoming the preferred platform for the public to understand and explore science. In addition to being immersed in movies, music, and mobile phones, users can also become "long-legged machine bugs" in their spare time, exploring more stars and roadside plants, or using scientific knowledge to uncover the truth behind false online rumors. This not only enriches their knowledge reserves but also helps improve their quality of life and thinking level. Guokr has modules such as scientific people, Q&A, and groups. The Q&A section focuses on resolving technology-related confusions and advocates interpreting life from a scientific perspective, while the group section is mainly for community members to exchange interest topics and share new knowledge.
V2EX Website: https://www.v2ex.com
V2EX, as a community gathering designers, programmers, and creative individuals, is dedicated to giving thumbs up to technology and creativity. The original intention of this website is to establish different "nodes" through user-generated content to better organize and classify these contents and make them easier to search. Additionally, the website adopts a special arrangement method, determining the display priority on the homepage based on content activity. Whether you are interested in technology or creativity, V2EX can provide you with rich resources and a high-quality communication platform.
OSCHINA (Open Source China) Website: https://www.oschina.net
Open Source China was established in August 2008 and is one of the largest open-source technology communities in China, with over 2 million active members. The community revolves around open-source software libraries, code sharing, news, collaborative translation, code cloud, crowdsourcing, and recruitment, enabling IT developers to discover, use, and communicate about open-source technology. In 2013, Open Source China established a large comprehensive cloud development platform, Code Cloud, providing one-stop services for developers in China, including team collaboration, source code hosting, code quality analysis, code review, testing, and code demonstration platforms. Through Open Source China, you can easily access technical information, share personal code, and contribute to open-source projects, becoming an industry leader and technical elite.
SegmentFault Website: https://segmentfault.com
SegmentFault is China's leading developer community, gathering over 3 million registered users. Moreover, thousands of technical teams from Tencent, Alibaba, Baidu, Meituan, JD, Didi, 360, and others have stationed in the SegmentFault community. As one of the most active developer communities in China, SegmentFault provides a pure and high-quality technical exchange platform for Chinese developers and continuously pushes the latest industry dynamics to help more developers enhance their cognition and capabilities. Additionally, SegmentFault is also the organizer of the largest hackathon innovation competition in China. Whether you are a beginner or an experienced professional developer, SegmentFault can meet your needs and help you find your technical exchange space.
GitHub Website: https://github.com
GitHub is one of the largest open-source communities in the world, providing a platform for software source code hosting services with version control through Git. In addition to basic web management interfaces and Git code repository hosting functions, GitHub also offers subscription, discussion groups, text rendering, online file editors, collaborative graphs, and code snippet sharing functions, making it an ideal platform for developers to communicate and collaborate.
MathOverflow Website: https://mathoverflow.net
MathOverflow is an interactive mathematics website that is not just a collaborative blog but also a network community of mathematics professionals. Here, users can freely ask questions, answer questions, and vote and comment on other users' questions or answers, with these activities granting them badges and reputation points. The site provides a great platform for mathematics enthusiasts to exchange knowledge, share resources, and interact socially. MathOverflow focuses on research questions in mathematics, covering unsolved problems and new knowledge in various fields of modern mathematics. Mathematicians can discuss various issues here, publish articles, review articles, guide graduate students, and even obtain tenure. MathOverflow has many top mathematicians, so the site requires that questions posed must be clear and specific, and must have a definite answer, rather than being too vague or requiring lengthy discussions to answer. Unlike discussion forums, MathOverflow is designed more for problem-solving rather than soliciting opinions.
Zhihu Website: https://www.zhihu.com
Zhihu is a well-known interactive website in China. It is a network Q&A community that connects users from various industries. Here, people share their knowledge, experiences, and insights, providing a rich and colorful information resource for the Chinese Internet. Zhihu users can engage in in-depth discussions on topics of interest and follow and communicate with like-minded individuals. Unlike online encyclopedias that explain concepts, Zhihu's main feature lies in its integrated divergent thinking, allowing people to freely explore and think in the ocean of knowledge.
Douban Website: https://www.douban.com
Douban, a website that starts with books, movies, and music, provides users with a wealth of data about works. Users can not only find exciting descriptions and reviews of books, movies, and music but also enjoy various service functions such as recommendations for books, movies, and music, offline local activities, and group topic exchanges. These service functions make Douban not only a taste system but also a system for expression and communication. Douban attracts a group of young people with good educational backgrounds who love life, enjoy reading, watching movies, listening to music, and are enthusiastic about participating in Douban groups and small stations to engage in lively discussions about food, clothing, housing, and transportation. Here, you can freely express your comments on books, movies, and music, as well as search for others' recommendations.
Facebook Group Website: https://www.facebook.com/groups
In October 2010, Mark Zuckerberg highlighted the Facebook group feature at a highly publicized press conference. This feature not only allows users to easily connect but also to meet like-minded new friends, share knowledge, and seek help. On Facebook, individual users can easily create their own groups. This feature is widely used because group members can share various types of content, including links, media, questions, and events, and can edit and comment on documents. Whether you want to establish a small community or share industry insights with fellow professionals, Facebook groups are a very suitable choice. By creating a group, you can easily share your views with others, showcase your skills and knowledge, and build stronger connections with your audience. Groups have different levels of privacy settings: "Open" means that group information and discussion content are visible to the public (including non-members), and non-members need to join the group to participate in discussions.
Google Groups Website: https://groups.google.com
Google Groups is a platform that allows any user to engage in free topic discussions through the web or email. This forum includes at least two types of discussion groups: the first type is discussion groups specifically for Google Groups, similar to mailing lists; the second type is Usenet newsgroups accessible via NNTP, with Google Groups serving as its gateway and unofficial archive. You can easily participate in discussions on various topics and conveniently track topics of interest via email or the web. Whether you are a beginner or an expert, this forum will provide you with an opportunity to learn and communicate.
4chan Website: https://www.4chan.org
Related link: From Discord to 4chan: The Inside Story of the U.S. Intelligence Leak
4chan is a highly discussed anonymous discussion forum with a wide variety of topics and specialized boards. Whether you have a passion for anime, games, music, literature, fitness, politics, or sports, there is a corresponding community here. As an anonymous community, it allows you to express your views without reservation, share ideas with others around the world, and make new friends. 4chan does not require registration, and users typically post anonymously.
SomethingAwful Website: https://www.somethingawful.com
SomethingAwful is a comprehensive community website that combines blog articles, forums, feature articles, images, and humorous media reviews. Originally just a one-person website, it has grown over time with more contributors and content added continuously.
Q&A Communities
Answers Website: https://www.answers.com
Answers is a knowledge exchange community that gathers millions of user-generated questions and answers. Registered users can participate in interactions and discuss various questions with others. In addition to rich community Q&A and reference information, Answers has also launched a video library as part of a collaboration with video sites, providing users with a more vivid and intuitive way to present knowledge. Now, users can discuss any questions on the site, covering various categories such as science, mathematics, law, history, etc. Additionally, the homepage displays trending questions and unanswered questions in real-time, helping users quickly find content they are interested in.
Gutefrage Website: https://www.gutefrage.net
Gutefrage is a well-known German Q&A website established in July 2006. Its answers are all provided by users, with a high level of user contribution. The site ranks among the top 20 in Alexa and is very popular among German users. Whether seeking answers to questions or sharing their knowledge and experiences, Gutefrage is a great platform.
Stack Exchange Website: https://stackexchange.com
Stack Exchange is a network of Q&A websites covering various topics, with each site focusing on a specific subject. Each Stack Exchange site has a common goal of providing users with a platform to post questions and answers. Through this platform, users can vote on questions and answers posted by themselves and others, earning reputation points as a gamified element of the community. These points are not just a symbol of reputation but can also grant users privileges such as voting, commenting, and managing the site. Additionally, all questions, answers, and users must adhere to the reputation point system, ensuring the order and quality of the site, allowing users to better obtain knowledge and assistance.
Vertical Communities
BlackHatWorld Website: https://www.blackhatworld.com
BlackHatWorld (abbreviated as BHW) is an Internet forum focused on black hat search engine optimization techniques and services. On this forum, you can communicate with black hat SEO experts from around the world, sharing their latest tips and strategies. The services provided by this site are diverse, including copywriting, graphic design, web design, SEO, and more. Moreover, they excel in optimizing both internal and external websites, social media marketing, application development, and other fields. BlackHatWorld is considered one of the largest online forums for digital marketing.
DigitalSpy Website: https://forums.digitalspy.com
DigitalSpy is a leading entertainment, television, and movie website based in the UK, with a globally renowned brand. Since its establishment in 1999, DigitalSpy has been dedicated to providing viewers with the latest, most interesting, and valuable entertainment news related to television programs, movies, and performance businesses. In addition to the content on the website, the DigitalSpy forum also has an active community, including discussion areas for film, sports, entertainment, and games, as well as general discussion areas covering current affairs, food, pets, and more. At DigitalSpy, no matter what you are interested in, you can find a community that shares your love for movies, television, and entertainment, sharing exclusive information and perspectives with other enthusiasts.
GameFAQs Website: https://gamefaqs.gamespot.com
GameFAQs is a comprehensive website aimed at providing information related to video games, founded by Jeff Veasey in November 1995. On this site, users can access game data, cheat codes, game reviews, save data, game images, and screenshots. Most of this data comes from user submissions. All submitted content is published on the site after being screened by administrators. Additionally, authors retain copyright for submitted materials, and their names are listed in the site's "Contributors" section. GameFAQs is a very active community, with each game having its own independent discussion board. Whether you are a beginner or an experienced player, you can freely discuss game strategies and other game-related topics here. Moreover, the community also provides various sections for you to explore more topics. Whether you want to share gaming insights, find game strategies, or discuss gaming culture, GameFAQs is a great choice.
NeoGAF Website: https://www.neogaf.com
NeoGAF is a forum focused on video game topics, covering discussions on games, communities, current affairs, trending topics, and other interesting subjects