Intelligence field
It has been suggested that this article be merged into Intelligence (information). (Discuss) Proposed since January 2026. |
| Part of a series on the |
| Intelligence field and Intelligence |
|---|
The intelligence field, also known as the intelligence business, the intelligence establishment, the intelligence complex, the intelligence industry, the field of intelligence, or the business of intelligence is the global industry revolving around intelligence in all of its forms.[1] The intelligence field is composed of people, groups, and organizations who deal – directly or indirectly – with intelligence, and/or support those people that do.[2] This industry contains; lawyers (not only those practicing intelligence law), professors and academics (not just those in intelligence studies), diplomats, biologists, chemists, astronomers, photographers, videographers, information technology specialists, historians, economists, data scientists, graphic designers, food service workers, psychologists and profilers, essayists, intelligence analysts, c-suite executives, hackers, coders, and software developers, among others.[3][4][5][6] Individuals employed by intelligence organizations are usually fully employed officers of intelligence agencies called intelligence officers. Those persons popularly called "spies" make up only a small part of the intelligence field – so small that some scholars have even argued that the work of spying, called espionage, is anachronistic and unnecessary in the modern intelligence field.[7][8][9] In other words, just as not everyone in the film industry is an actor, not everyone in the intelligence field is a spy, or even deals with intelligence. Hager Ben Jaffel and Sebastian Larsson write that:
"In sum, doing intelligence today could mean anything from informing high politics and producing risk assessments, to dealing with the mundanities of the everyday labor of law enforcement, to managing vast databases involving intricate computerized surveillance solutions."[6]
One derogatory term that has been used to describe the intelligence field, especially in the United States, is the intelligence-industrial complex.[10]
Global industry leaders
[edit]
Due to the secretive, often covert, nature of the intelligence field, gaining accurate employment figures or profit and revenue figures in either the public sector or private sector anywhere is difficult for data scientists, human resources officers, or economists.[11][12] From an etymological perspective, when the professions of intelligence were being developed, the intelligence field deliberately chose words that were mundane and obtuse, so their enemies would not know what these jobs really were.[13] Job postings are even today often intentionally or unintentionally mislabeled by employers.[11][12] Most of the employment figures below are best-estimates.
The one thing that is not measured below is the effectiveness of the industry leaders, because, while those measurements are often performed within the industry, those reports are mostly kept secret or classified.
Public sector
[edit]Intelligence communities are the collective efforts of a country surrounding intelligence[14][15] – but confusingly, most of the employment studies today only measure the size of individual intelligence agencies. It is inadequate to measure individual agencies alone, because, for example, the Central Intelligence Agency (CIA) is only 1/18th of the entire United States Intelligence Community (USIC) – meaning that the CIA is only one of 18 intelligence agencies in the United States.[16] Comparing the size of the CIA to the size of the KGB is not adequate, because it does not include all of the other people in those governments employed in the industry.[17]
The following are, therefore, the top leading intelligence communities where figures are found. These rankings incorporate both the number of employees and the owned physical assets of these communities, like access to satellites and deployment times:[18][19]
| Rank | Intelligence Community | Estimated employees | Annual budget |
|---|---|---|---|
| 1[18] | United States Intelligence Community (USIC) | 100,000[20] –200,000 | $101.6 billion (+)[21] |
| 2[18] | Chinese intelligence community | ? | (allocated from defense budget) |
| 3[18] | Russian Intelligence Community | ? | (allocated from the ₽3.5[22] – ₽3.91 trillion[23] national defense budget) |
| 4[18] | Israeli intelligence community | ? | ₪20 billion |
| 5[18] | Indian intelligence community | ₹4,2343 crore[24] (+/- thousands) | |
| 6[19] | Pakistani Intelligence Community | 15-20% of ₨1.8[25] – 2.55 trillion[26] | |
| 7[19] | United Kingdom Intelligence Community (UKIC)[27] | 15,550 (+)[28] | £4.2 billion[29][30] |
| 8[19] | Australian Intelligence Community (NIC) | 7,000[31] – 10,000 | $44.6 million[32] – $2.05 billion[33] |
| 9[19] | France | 20,000[34] | €67 million[35] |
| 10[19] | Germany | 10,000 (+) | €1 billion |
| 11[19] | Japan | 5,000 | (allocated from defense budget) |
| 12[19] | South Korea | 60,000 | (allocated from defense budget) |
The ten most powerful government intelligence agencies, when compared to the relative size of their intelligence communities, are the following:
| Rank | Intelligence agency | Estimated employees | Annual budget | Country |
|---|---|---|---|---|
| 1[36] | Central Intelligence Agency | 21,575[37] – 22,000[38] | $15 billion (+) | United States |
| 2[36] | Secret Intelligence Service (MI6) | 3,500 (+)[39] | N/A (shares an account
with MI5 and GCHQ) |
United Kingdom |
| 3[36] | Mossad | 7,000 (+)[40] | ₪10 billion[41] | Israel |
| 4[36] | Research & Analysis Wing | 5,000 (+)[42] | $100 – 500 million | India |
| 5[36] | Federal Security Service | 200,000[43] – 500,000[44] | ? | Russia |
| 6[36] | Ministry of State Security | 800,000 (+)[45] | ? | China |
| 7[36] | Bundesnachrichtendienst | 6,500 (+)[46] | €1.6 billion (+)[47] | Germany |
| 8[36] | Inter-Services Intelligence | 10,000 (+)[48] | ₨200 – 300 billion[25] | Pakistan |
| 9[36] | Australian Secret Intelligence Service | Australia | ||
| 10[36] | Directorate General for External Security | 7,200[49] | €1 billion (+) | France |
Private sector
[edit]Many of the companies below are involved in more industries than only the intelligence field.[50] The following are the most powerful private sector intelligence agencies in the world:
Criminal intelligence
[edit]Where they do exist, the leading criminal intelligence organizations are the following:
| Rank | Name | Estimated size | Annual budget | Parent department |
|---|---|---|---|---|
| Beijing State Security Bureau | ? | ? | Ministry of State Security | |
| United States Postal Inspection Service | 2,500 | $150 million | United States Postal Service | |
| Counterterrorism and Intelligence Bureau | 360(+) | $230,000 | New York City Police Department | |
| SO15 | 1,800[69] | ? | Metropolitan Police | |
| Counter-Terrorism and Special Operations Bureau | 300(+) | $650,000 | Los Angeles Police Department | |
| Bureau of Counter Terrorism | 1,300 | $2.5 million[70] | Chicago Police Department | |
| Intelligence Bureau | ? | ? | Los Angeles County Sheriff's Department | |
| Regional Operations and Intelligence Center | ? | $250 million[71] | New Jersey State Police | |
| Specialized Investigations | ? | ? | Miami-Dade Police Department | |
| Police Intelligence Department | 15,000 | ? | Singapore Police Force |
Industrial cultivation
[edit]
The global intelligence field, and especially the private sector, is today increasingly diversified in its portfolio, moving away from its core industrial production and management.[6] This industry has often branched-out into secondary and tertiary goods and services, such as union busting, policy recommendation, estimates and planning, sanctioned assassinations, mass surveillance programs, malware production and deployment, and so on. One common adage for the intelligence field is that "intelligence is as intelligence does."[72]
However, the singular product which remains at the core of this industry is intelligence. Intelligence as information is to have some secret knowledge of something. To governments and the public sector, this information is knowledge of and/or belonging to the enemy, which will often gain an advantage in armed conflict.[73] To the private sector, intelligence is ususally knowledge of a competitor, and/or "trade secrets" belonging to that competitor – such as blueprints and patents. However, because governments are often liable if they get caught spying on their own citizens, they will often hire-out private intelligence agencies to perform that same intelligence.[74][75]
Unlike coffee, which is the core product of the coffee industry, or sugar, which is the core product of the sugar industry – intelligence is not a manufactured product, but it is nevertheless collected and cultivated in some manner.
Intelligence work can be conducted by government intelligence agencies, police forces, and military intelligence units. This work can also be engaged by private organizations, including; private intelligence agencies, multinational corporations, private investigators, drug cartels, narcotic cartels, terrorist groups, and others.
Intelligence collection (also known as espionage)
[edit]
The traditional manner in which intelligence has been cultivated, gathered, or collected throughout history, is by using contractual agents known as "spies." It is the job of a spy to gather this information, and their career field is known as espionage. For governments, spying occurs during both wartime and peacetime, so to say that intelligence is knowledge of the enemy is an incomplete definition, because intelligence collection also occurs against allies.[76] Spies are often single and mission-specific solitary contracting agents who are commonly known as "secret agents."
Espionage, as an occupation, is older than the intelligence field by thousands of years. Espionage is so old that it is often jokingly called "the world's second oldest profession."[77] However, and especially with the advancement of modern technologies – the collection of information has grown far beyond the capabilities of the traditional spy.[9][78]
Surveillance and mass surveillance
[edit]
Surveillance is often considered as either a tool or a method, and it is one of the newer and non-traditional forms of intelligence collection, which has grown with the advent of modern technologies, such as the printing press and postal systems. The first mass surveillance systems ever created were those post offices in response to the proliferation of written correspondences after the former barriers to communication were lowered. While governments and companies provided the service of carrying the post and dispatches, they also engaged in postal censorship.[79] In fact, the oldest law enforcement agency in the world was the Post Office Investigation Branch – until the British Royal Mail was privatized in 1996, splintering from Post Office Limited.[80][81]
After centuries, newer communications technologies were invented using radio frequencies, especially the telegraph and the telephone. One such radio device was called a bug. The Thing was a famous bug deployed by the NKGB shortly after the end of World War II. It was a gift of the Soviet Union to US Ambassador W. Averell Harriman, and hung on the walls of the Embassy of the United States in London from 1945 to 1951.[82]
Today, mass surveillance is carried out over the internet. Computer programs, softwares, and malware – like keyloggers and spyware – are deployed by any interested party in collecting massive pattern of life profiles through the monitoring of digital footprints.[83] Revelations discovered after the Snowden disclosures by the former US government contract employee revealed that the National Security Agency (NSA) had already deployed malware against American citizens without their knowledge or consent.[84][85]

Surveillance has also become the progenitor of over one billion surveillance cameras scattered around the world, which are video cameras designed for the purposes of monitoring human movements. Mostly, these cameras are used by police departments or security services, but they are also often incorporated into the capabilities of the intelligence field. Greater London was once known as the surveillance capitol of the world, and there remains a surveillance camera on nearly every street corner there.[86] Over 50% of all the world's surveillance cameras are in China.[87]
Today, video camera surveillance uses facial recognition systems and gait analysis to identify "suspected" individuals. In London, for example, the Metropolitan Police officers working at video monitors use facial recognition to match a list of suspects – as many as 6,000 or more within the city alone – to those "matches" identified by the system.[86][88] The surveillance network of the United Kingdom is overseen by the Biometrics and Surveillance Camera Commissioner.[89]
Open-source intelligence collection and management
[edit]
Open-source intelligence (often abbreviated as OSINT) is the information that has been collected through means that are publicly available to anyone and collating that information into consumable intelligence products. OSINT collection is considered to be one of the more traditional crafts within intelligence, dating back to at least the 16th century and the Council of Ten.[90]
Through much of history, after the creation of publicly available information to be found in newspapers, journals, and news magazines – the job of an OSINT officer was to sit for hours every day reading those relevant publications.[90] OSINT still maintains that core principle, but has also become inundated with the rapid and constant flow of modern information on the internet with ever-shrinking news cycles.[91]
OSINT has become so integrated into intelligence collection that some scholars of intelligence studies write that it is "the lifeblood of intelligence." In order to sift through the massive amounts of raw data nearly overwhelming the basic wage government employees of intelligence agencies, the Central Intelligence Agency created In-Q-Tel to raise the capital for private intelligence agencies that would manage OSINT for them.[92]

After the 2010's, the definition of OSINT collection often incorporates the website Wikipedia somewhere in that definition, or conversation – because this website itself is built as an open source information platform. Wikipedia is now often considered a first-base for OSINT collectors, and veteran analysts will train their newer recruits to use this website.[93] While the information here is sometimes wrong, leaders train that it is important for an OSINT collector to know where a Wikipedian got their information, because the information landscape here represents knowledge in the popular zeitgeist.
OSINT collection is merely the practice of observing the information provided by a source, but it is no longer considered OSINT collection when those collectors decide to contribute information to Wikipedia – that is when it becomes information warfare.[94][95] In 2007, for example, one incident that violated the Wikipedia terms of service occurred when users at IP addresses registered to computers owned by the Federal Bureau of Investigation (FBI) and the CIA were discovered having edited several pages, violating the conflict of interest.[96]
Another concern for the industry is that enemies and "bad actors" might use open sources to send hidden communications. For example, since anyone is allowed to edit Wikipedia, something that might appear as random editing or vandalism might actually be a coded message to sleeper agents, stay-behind networks, or other spies deployed in the field.[92] This is called steganography – one famous example was the secret code broadcast over the radio in Rwanda which signaled to the militia that the Rwandan genocide had begun, and that they needed to begin fighting: "It's time to cut down the tall trees."[97]
Collection management
[edit]There are two types of intelligence officers that typically "manage" spies in the field. One is called a Case officer, who is assigned to "handle" agents. The other works in the field of collection management, and is usually some form of subject matter expert who is entrusted to verify the veracity of claims.[98] In the United States, these officers might be called Reports Officers (ROs) or Collection Management Officers (CMOs).[99] In other countries, these people might be called Collection Managers or Collection Strategists.[100]
Counterintelligence
[edit]In order to counteract any enemy activities, counterintelligence (CI) exists to ensure that the information has not been contaminated in some way by moles or rats. Counterintelligence officers, as they are called, are not assigned to collect intelligence about the enemy, but about the enemy's ability to collect intelligence. The primary subfield of CI is known as counterespionage (CE), and it is the job of CE to hunt, find, and catch other spies.
Industrial production, from produce to product
[edit]
Theories of management
[edit]There are several working theories as to how intelligence management should work, and how the intelligence field should be structured around that process. During the French Revolution, certain approaches to professionalizing the approach to working with the products produced by espionage were invented, laying many of the foundations to the modern intelligence management approach. Many years later, during World War I, further advancements were made on both sides of the war.[101]
In 1948, the intelligence cycle was theorized in the United States by Phillip Davidson and Robert R. Glass while they were serving as staffers at the United States Army Command and General Staff College.[102] The theory first spread throughout the United States Intelligence Community, where it was then absorbed by most of the intelligence field. Today, the intelligence cycle, and its accompanying theory of intelligence cycle management, is the predominate working theory in nearly every modern intelligence agency.[102] The intelligence cycle is not, however, a law of human nature that must be followed everywhere, it is only a theoretical model of how some scholars and practitioners think that the industry should operate. In those countries that follow the cycle model, you will find their intelligence communities structured around it. Elsewhere, intelligence communities might appear different, and with different priorities.[102]
Many scholars of intelligence studies have identified faults in the standard theory of the intelligence cycle, and have created alternatives.[103] Art Hulnick created the Matrix Model, for example.[104] The Target-Centric Approach To Intelligence is another breakaway from the intelligence cycle invented by Robert M. Clark.

Processing raw intelligence
[edit]Similar to how raw hops collected from the field must be processed and distilled to create beer, and how many other crops must be processed into products prior to consumption – when raw intelligence is collected from the field, or gathered by other methods, it must also be properly processed. This is literally called intelligence processing, and it is the intermediary step in between collection and analysis.[106] Often, case officers and collection managers do a decent enough job at processing that they are able to pass on field reports directly to analysts. But in the modern era, digital technologies also scoop-up thousands of bits of secret information every second; telephone intercepts, text messages, satellite photographs, emails, laser mic surveillance transcripts, are all in need of processing by intelligence managers.[106]
When Michael Hayden, then the Director of the National Security Agency, was asked what his major problems were shortly after the September 11 attacks, the pithy aphorism that he gave in response was: "I have three: processing, processing, and processing."[106][107]
Raw intelligence is pure and unfiltered, meaning that it might be written in another language that needs to be translated into the working language of that intelligence community, or it might need to be deciphered if it is something written in code. Intelligence comes in to headquarters or field bases from every method of collection and gathering, and sometimes even from all-source intelligence.[106]
Much of these processing responsibilities have in recent decades been taken out of public sector intelligence agencies and hired-out to contractors in Big Tech.[108]
Analyzing that intelligence
[edit]
After raw intelligence is adequately processed, it is passed to intelligence analysts. Analysts make up the bulk of intelligence work throughout the world. Analysis is effectively the thinking stage of the intelligence process, where creativity is often considered a paramount trait for an effective analyst, alongside quick thinking and wisdom. The industry prefers to hire those people called "the best brains possible" as intelligence analysts.[106]
While traditional spies are often hired straight out of the Marines or the infantry, and are not necessarily depended upon for their book smarts, but for their street smarts – intelligence analysts must be smart. They are almost always required to be college graduates and deep thinkers.[106]
However, as the world of intelligence tends to shift focus from one primary fascination, such as from the "evil virus of Satan"[109] that was either Capitalism or Communism during the Cold War, to the illusive threat of terrorism with the rise of groups like Al-Qaeda – it takes time to train analysts on new topics, new geographies and demographies, and new cultures. Especially within government intelligence work, analysts serve at the pleasure of their bosses, and are often given work that lies outside of their expertise because new situations develop. It is preferable for intelligence communities to also hire recent graduates with language proficiencies in the region or area where they might be operating.[106]
While in the corporate sector, analysts might be valued more for their opinions than merely their assessments – most government analysts are expected to be dispassionate in their work. It is impossible for humans not to feel emotion, but the objective of public sector intelligence analysis is to avoid what is called political spin. When analysts succumb to the pressures of politicians, the resulting products are called "intelligence to please," which is generally frowned upon by the rest of the intelligence field. Government intelligence does not exist to tell politicians what they want to hear, it exists to tell them the truth about their enemies.[106]
If analysts do not work quickly enough, their work might receive something called an OBE, which means that the intelligence was "overtaken by events."[106]
Clientele and target market
[edit]
The relationship between the intelligence field and their clients changes depending on whether the work is in the public sector or the private sector, because the CEOs of companies and the politicians of governments usually want different things, and expect different outcomes.
Those persons at intelligence organizations who are assigned to interact or face with their clientele are called briefers, and their specific responsibility is to present intelligence briefings (which is similar, but different to a debriefing).[111] Most intelligence analysts are not usually assigned to provide briefings. Intelligence briefings are usually in some form of presentation, in addition to some form of written intelligence product called finished intelligence.
Policymakers
[edit]
For government agencies, the primary client and consumer of intelligence products are the politicians somewhere at the top of that governmental structure – every government is different, but usually, the decision makers are often elected officials or members of the monarchy. Intelligence products exist to support that policymaking and decision-making. These decisions primarily revolve around matters related to national security, military affairs, law enforcement, and international relations.[112]
United States President's Daily Brief
[edit]
The most well-known intelligence briefing in the history of the intelligence field is the United States President's Daily Brief (PDB), of which intelligence analysts have been assigned as briefers to the President of the United States over the years, to present the daily product of the largest intelligence community in the world.[113] The PDB has existed for over half-a-century, and every US President has had different methods of consuming the intelligence. Some Presidents have preferred to arrange full briefing sessions with several people in the room and a question-and-answer session, while other Presidents have preferred to consume the PDB as a written product silently by the fireplace.[113]

During his first term, Donald Trump notoriously refused to partake in many of the PDB's that had been tasked specifically for him, preferring to pass on this responsibility and give it to people more qualified, often because he could not understand the concepts that had already been simplified for him.[114][115][116] Many people assumed that Trump could not read well enough to consume the written products, and on the rare occasions that he attended, he preferred to receive his briefings orally.[117][118] He did look at the pictures.[119] When he did attend, he would sometimes receive verifiable information that he dismissed immediately, preferring to believe foreign leaders over his own CIA staff, especially concerning an incident where Trump was informed that Russia had ordered bounties on US servicemembers stationed in Afghanistan.[120][121][122] During his second term, he has nearly scrapped the PDB altogether.[123]
The Chinese and the Russians have similar variations on the theme of the PDB, received at Zhongnanhai and the Kremlin.
Military leadership
[edit]
In militaries, and especially in the world of military intelligence (MI), the consumers of large intelligence products are usually the Generals and Admirals in charge of the order of battle or some form of military echelon. However, military intelligence is incorporated into every level of command, and clients are not limited to the highest ranks – even Butterbars and Landlubbers barely out of officer training school consume intelligence products when they are assigned to their units.[124]
C-suite executives
[edit]
In the corporate world, intelligence products are used for an even broader set of decisions than in the realm of governments and politicians. The primary client here is usually the C-Suite business executive, or perhaps the Board of directors of a large company.[78] As opposed to the primary objective of public sector intelligence, which is mostly to gain an advantage over a perceived enemy, the objective the private sector is to serve the executive's agenda.[126] Private intelligence often fails when executives do not understand the purpose of intelligence, and expect their intelligence analysts to perform predictive judgements, which are often outside of their core function.[127]
Despite the fact that there are large private intelligence agencies that specialize in performing intelligence operations, most multinational corporations maintain some staff of corporate intelligence, sometimes a staff of only a few analysts.[128] The Coca-Cola Company, for example, maintains their Global Intelligence Division (GID), as of 2026 led by Matthew Howe. However, Coca Cola also hires private intelligence agencies such as Stratfor to provide intelligence on potential oppositional forces, such as in 2007, when they hired Stratfor to investigate members of PETA in Canada.[129]
Police departments
[edit]
In what has often been called mission creep, the leading criminal intelligence bureaus and departments in cities around the world often change their core mission set depending on what Art Hulnick called the threat du jour.[130] Threat du jour, in this respect, follows that when the perceived threat against society was Communism, criminal intelligence units focused on suppressing Communist organizations. Similarly, when the USSR was created and the Okhrana was dissolved, Russian criminal intelligence focused on suppressing what they called the Capitalist disease there. When that threat became organized crime, these units shifted to largely become gang units, and when narcotics became the threat du jour, those gang units became anti-narcotics task forces.
Today, criminal intelligence organizations have largely been absorbed into counterterrorism bureaus, with terrorism becoming the new threat du jour.[131] The same work might be performed, but around the world, more money and effort has been allocated to counterterrorism over standard intelligence collection since the start of the Global War On Terror. Specifically in the United States, however, that relationship goes back much further, to the 1980's, when William Colby created the Counterterrorism Task Force.[132] London's former Special Branch, for example, which was the single-largest municipal criminal intelligence branch in the world, was absorbed into the Counter Terrorism Command in 2006.[133] Los Angeles's Counter-Terrorism and Criminal Intelligence Bureau was merged in 2010 with the former Special Operations Bureau to create the Counter-Terrorism and Special Operations Bureau.[134] Chicago's Bureau of Organized Crime (which was designed to hunt gangsters like Al Capone), is now the Bureau of Counter Terrorism.[70]
History
[edit]This section needs expansion. You can help by adding missing information. (January 2026) |
Despite the fact that espionage is thousands of years old, the intelligence field as it is known today is roughly 100–200 years old. The original definition of intelligence (in English) was as to be synonymous with journalism and news, and has morphed and transformed into whatever uses it has today. Hence the name of many newspapers today still called The Intelligencer. At least by the 1600's in the English language, intelligence officers were categorized into several categories, to include spies, scouts, and intelligencers.[135]
See also
[edit]References
[edit]- ^ Macartney, John (December 1988). "Intelligence: A consumer's guide∗". International Journal of Intelligence and CounterIntelligence. 2 (4): 457–486. doi:10.1080/08850608808435077. ISSN 0885-0607.
- ^ Lowenthal, Mark M. (2017). Intelligence : from secrets to policy 7th Edition. Internet Archive. Los Angeles, California : CQ Press, an Imprint of SAGE Publications, Inc. ISBN 978-1-5063-4256-6.
- ^ "Explore Intelligence Community careers". United States Intelligence Community. Retrieved January 22, 2026.
- ^ "Careers | SIS". www.sis.gov.uk. Retrieved 2026-01-22.
- ^ "Technology Careers with ASIO". Australian Security Intelligence Organisation. Retrieved January 22, 2026.
- ^ a b c Ben Jaffel, Hager; Larsson, Sebastian (2024-04-02). "Why Do We Need a New Research Agenda for the Study of Intelligence?". International Journal of Intelligence and CounterIntelligence. 37 (2): 727–750. doi:10.1080/08850607.2023.2222342. ISSN 0885-0607.
- ^ "Rethinking Espionage in the Modern Era | Chicago Journal of International Law". cjil.uchicago.edu. Retrieved 2026-01-21.
- ^ "Old school spying is obsolete, says one expert. Blame technology". NBC News. 2021-10-07. Retrieved 2026-01-22.
- ^ a b O'Connell, Gregory F. Treverton; Kevin M. "Reshaping the intelligence business". Tampa Bay Times. Retrieved 2026-01-25.
{{cite web}}: CS1 maint: multiple names: authors list (link) - ^ Tyler, Randy (2010-07-22). ""Top Secret America" Sheds Light on the Intelligence-Industrial Complex". ACLU of Washington. Retrieved 2026-01-22.
- ^ a b "Private Sector Intelligence Careers: Analyzing Job Titles and Professional Trends | The Belfer Center for Science and International Affairs". www.belfercenter.org. 2025-07-23. Retrieved 2026-01-22.
- ^ a b German, Mike (February 6, 2015). "The U.S. Intelligence Community is Bigger Than Ever, But is It Worth It? | Brennan Center for Justice". www.brennancenter.org. Retrieved 2026-01-23.
- ^ Words Unravelled (2026-01-20). What does 'espionage' actually mean?. Retrieved 2026-01-23 – via YouTube.
- ^ "Intelligence Community". www.rand.org. Retrieved 2026-01-23.
- ^ "Intelligence Community: Understanding Its Legal Definition | US Legal Forms". legal-resources.uslegalforms.com. Retrieved 2026-01-23.
- ^ "Intelligence community (IC) | Emerging Technology Policy Careers". 2024-11-18. Retrieved 2026-01-23.
- ^ LLC, Madison Education Group (2026-01-23). "US Intelligence Agencies: Too Many? Not Enough?". Madison Education Group LLC. Retrieved 2026-01-23.
- ^ a b c d e f "5 Countries with Best Intelligence Agencies". Insider Monkey. Retrieved 2026-01-23.
- ^ a b c d e f g h "12 Countries with Best Intelligence Agencies". Yahoo Finance. Archived from the original on 2025-12-05. Retrieved 2026-01-23.
- ^ Kness, Ron (2025-08-01). "The True Scale of U.S. National Security: Inside the Defense and Intelligence Community". ClearanceJobs. Retrieved 2026-01-22.
- ^ "Intelligence Community Spending Trends" (PDF). congress.gov. Congressional Research Service. September 26, 2024.
- ^ Stalczynski, Mark (2025-06-26). The Russian Federal Budget 2025–2027 (Report).
- ^ "Kremlin plans record spending hike on law enforcement and security agencies". The Kyiv Independent. 2025-09-30. Retrieved 2026-01-23.
- ^ "Big Cut For Intelligence Units In Nirmala Sitharaman's Budget 2025". www.ndtv.com. Archived from the original on 2025-06-01. Retrieved 2026-01-25.
- ^ a b Verma, Shivam. "Pakistan's ISI agency is funded by..., large part of this money is used for..." DNA India. Retrieved 2026-01-23.
- ^ "Pakistan announces defence budget increase". Default. 2025-06-12. Retrieved 2026-01-23.
- ^ "UK Intelligence Community: An Overview". Grey Dynamics. Retrieved 2026-01-23.
- ^ "Work in the intelligence services: get a job in MI5, MI6 and GCHQ | Prospects.ac.uk". www.prospects.ac.uk. Retrieved 2026-01-23.
- ^ "China/France/Kazakhstan/United Kingdom/Vietnam • London hikes spy budget, Ablyazov case in Senate, Vietnamese spy olympics, CNAM chair open, Guoanbu recommendations for BRICS - 04/11/2024". Intelligence Online. 2024-11-04. Retrieved 2026-01-23.
- ^ "Security and Intelligence Agencies Financial Statement 2023-24 (HTML)". GOV.UK. Retrieved 2026-01-23.
- ^ Dobell, Graeme (2017-09-24). "Oz intelligence review: the new community". The Strategist. Retrieved 2026-01-26.
- ^ Media, Sekuro (2025-04-01). "Is the 2025 Federal Budget Dropping the Ball on Australian Cybersecurity?". Sekuro. Retrieved 2026-01-25.
- ^ Leben, William (2025-03-28). "Australia's international spending reveals uneven ambition". The Strategist. Retrieved 2026-01-25.
- ^ "France • French intelligence career mobility stagnating - 20/03/2025". Intelligence Online. 2025-03-20. Retrieved 2026-01-25.
- ^ "France • French intelligence largely spared from budgetary constraints - 30/04/2025". Intelligence Online. 2025-04-30. Retrieved 2026-01-25.
- ^ a b c d e f g h i j "Top 10 Most Powerful Intelligence Agencies in the World – Aljundi Journal – A Military & Cultural Monthly Magazine". United Arab Emirates Ministry of Defence. Al Jundi Journal. 2025-12-22. Retrieved 2026-01-23.
- ^ "Central Intelligence Agency Number of Employees, Statistics, Diversity, Demographics, and Facts - Zippia". www.zippia.com. 2022-03-25. Retrieved 2026-01-23.
- ^ "Trump administration plans major downsizing at U.S. spy agencies". The Washington Post. 2025-05-02. Archived from the original on 2025-06-06. Retrieved 2026-01-23.
- ^ "MI6 set to recruit 1,000 extra staff". BBC News. 2016-09-21. Retrieved 2026-01-23.
- ^ "Inside Mossad: Israel's Elite Spy Agency". spyscape.com. Retrieved 2026-01-22.
- ^ "Inside Mossad: Israel's Elite Spy Agency". spyscape.com. Retrieved 2026-01-23.
- ^ "Research and Analysis - Global Intelligence Knowledge". Global Intelligence Knowledge Network. Retrieved 2026-01-23.
- ^ "Russia's Foreign Intelligence Services". www.everycrsreport.com. Retrieved 2026-01-22.
- ^ Pringle, Robert W. (2010-09-02), "The Intelligence Services of Russia", The Oxford Handbook of National Security Intelligence, Oxford University Press, pp. 774–789, doi:10.1093/oxfordhb/9780195375886.003.0046, ISBN 0-19-537588-2, retrieved 2026-01-22
{{citation}}: CS1 maint: work parameter with ISBN (link) - ^ Greitens, Sheena Chestnut (2025-02-27). "Counter-Espionage and State Security: The Changing Role of China's Ministry of State Security | China Leadership Monitor". China Leadership. Retrieved 2026-01-23.
- ^ "Our Organisation | BND". BND. Archived from the original on 2024-10-11. Retrieved 2026-01-23.
- ^ "Bundesnachrichtendienst". Global Intelligence Knowledge Network. Retrieved 2026-01-23.
- ^ "Pakistan: How the ISI works". The Guardian. 2009-08-05. ISSN 0261-3077. Retrieved 2026-01-23.
- ^ "Who are we ? | DGSE". www.dgse.gouv.fr. Retrieved 2026-01-23.
- ^ Shorrock, Tim (2016-09-08). "5 Corporations Now Dominate Our Privatized Intelligence Industry". ISSN 0027-8378. Retrieved 2026-01-23.
- ^ a b c d "Private Spies: Inside the Covert World of Spooks for Hire". spyscape.com. Retrieved 2026-01-24.
- ^ "About Booz Allen Hamilton". careers.usnews.com. May 27, 2025.
- ^ Janney, Josh (2025-10-27). "Booz Allen Hamilton announces new round of layoffs". Virginia Business. Retrieved 2026-01-23.
- ^ a b c d e "Global private intelligence spy agencies (1) -- Knowlesys Open Source Intelligence System". Knowlesys Intelligence System. Retrieved 2026-01-24.
- ^ "Home - Constellis". constellis.com. Retrieved 2026-01-25.
- ^ "Hakluyt & Company Limited - Company Profile - Endole". open.endole.co.uk. Retrieved 2026-01-25.
- ^ "Annual Report Year Ended 30 June 2024" (PDF). Hakluyt. 2024.
- ^ a b "A Rundown of Israeli Spy Firms and Surveillance Outfits". CTECH - www.calcalistech.com. 2018-11-15. Archived from the original on 2021-03-08. Retrieved 2026-01-24.
- ^ "Client Challenge". www.ft.com. Retrieved 2026-01-25.
- ^ Friend, Tad (2023-05-15). "Earth League International Hunts the Hunters". The New Yorker. ISSN 0028-792X. Retrieved 2026-01-25.
- ^ "One of the region's biggest federal contractors just doubled its size". The Washington Post. 2016-08-16. ISSN 0190-8286. Retrieved 2026-01-23.
- ^ "Workforce Demographics". Leidos. Archived from the original on 2025-11-19. Retrieved 2026-01-23.
- ^ "Leidos Posts Strong Fourth Quarter and Fiscal Year 2024 Results". investors.Leidos.com. February 11, 2025.
- ^ "SAIC - About SAIC". jobs.saic.com. Retrieved 2026-01-25.
- ^ "SAIC Announces Third Quarter of Fiscal Year 2026 Results". December 4, 2025.
- ^ "Palantir Technologies Number of Employees 2020-2025 | Bullfincher". bullfincher.io. Retrieved 2026-01-25.
- ^ "Our People". 5 Stones intelligence. Retrieved 2026-01-25.
- ^ "Pinkerton - 2025 Company Profile & Team - Tracxn". tracxn.com. 2025-12-20. Retrieved 2026-01-25.
- ^ "Police Staff Information Pack Digital Specialist –Hardware" (PDF). counterterrorism.police.uk. Metropolitan Police Service. p. 7.
- ^ a b "Deep dive: A look at the proposed 2024 Chicago police budget - CBS Chicago". www.cbsnews.com. 2023-10-24. Retrieved 2026-01-27.
- ^ Boukadoum, Colin Kalmbacher, Iman (2022-04-20). "Op-Ed: Audit needed of NJ's ROIC intelligence center". NJ Spotlight News. Retrieved 2026-01-28.
{{cite web}}: CS1 maint: multiple names: authors list (link) - ^ Stout, Mark; Warner, Michael (2018-06-07). "Intelligence is as intelligence does". Intelligence and National Security. 33 (4): 517–526. doi:10.1080/02684527.2018.1452593. ISSN 0268-4527.
- ^ Troy, Thomas F. (December 1991). "The "correct" definition of intelligence". International Journal of Intelligence and CounterIntelligence. 5 (4): 433–454. doi:10.1080/08850609108435193. ISSN 0885-0607. Archived from the original on 2023-03-31.
- ^ "Scouts and Spies: The Covert Operations of Pinkerton's Secret Service in the Civil War". pinkerton.com. Retrieved 2026-01-26.
- ^ McPhail, Quinn (2020-05-20). "Pinkertons, Prostitutes, and Spies (2019)". Civil War Monitor. Retrieved 2026-01-26.
- ^ Toth, Robert C. (23 June 1986). "Spying on Allies – It's a Tradition" (PDF). cia.gov. Los Angeles Times.
- ^ hkandt (2014-11-19). "The Second Oldest Profession: A World History of Espionage". Department of History. Retrieved 2026-01-26.
- ^ a b JOSHI, SHASHANK (September 24, 2024). "How private intelligence companies became the new spymasters". Engelsberg ideas. Retrieved 2026-01-26.
- ^ "Surveillance, privacy and history". History & Policy. Retrieved 2026-01-26.
- ^ O'Driscoll, Julia; published, The Week UK (2024-01-11). "How the Post Office got its prosecution powers". The Week. Retrieved 2026-01-27.
- ^ Team, The Postal Museum (2019-10-02). "The Post Office Investigation Branch". The Postal Museum. Retrieved 2026-01-27.
- ^ "The Thing". www.cryptomuseum.com. Retrieved 2026-01-27.
- ^ SentinelOne (2022-12-11). "What Is Spyware? Types, Risks, and Prevention Tips". SentinelOne. Retrieved 2026-01-26.
- ^ Ciolacu, Lucian. "NSA`s Deployed Malware via Automated Tools to Enhance Spy Capabilities". Hot for Security. Retrieved 2026-01-26.
- ^ "How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept". The Intercept. 2014-03-12. Archived from the original on 2014-03-16. Retrieved 2026-01-26.
- ^ a b "Focus - Smile, you're on camera: Facial recognition becomes widespread in London". France 24. 2026-01-23. Retrieved 2026-01-26.
- ^ Cosgrove, Elly (2019-12-06). "One billion surveillance cameras will be watching around the world in 2021, a new study says". CNBC. Retrieved 2026-01-26.
- ^ Sandle, Paul (December 4, 2025). Kerry, Frances (ed.). "British police to ramp up facial recognition to catch criminals". reuters.com. Reuters.
- ^ "Biometrics and Surveillance Camera Commissioner". GOV.UK. 2025-12-04. Retrieved 2026-01-26.
- ^ a b Block, Ludo (2024-05-03). "The long history of OSINT". Journal of Intelligence History. 23 (2): 95–109. doi:10.1080/16161262.2023.2224091. ISSN 1616-1262.
- ^ Colley, Thomas; Dylan, Huw (2025-07-03). "The War on Open-Source Intelligence". The Washington Quarterly. 48 (3): 147–162. doi:10.1080/0163660X.2025.2554477. ISSN 0163-660X.
- ^ a b Hulnick, Arthur S. (November 2002). "The Downside of Open Source Intelligence". International Journal of Intelligence and CounterIntelligence. 15 (4): 565–579. doi:10.1080/08850600290101767. ISSN 0885-0607.
- ^ Fleischman, Amir (2022). "Effective Use of OSINT in the Russo-Ukrainian War: Collection and Disclosure of Reliable Information along with Refuting False Information". American Intelligence Journal. 39 (2): 66–79. ISSN 0883-072X.
- ^ Miller, Carl (2018-08-29). "Wikipedia has resisted information warfare, but could it fight off a proper attack?". New Statesman. Retrieved 2026-01-27.
- ^ Rindsberg, Clifford D. May, Ashley (2026-01-24). "Wikipedia Wars". FDD. Retrieved 2026-01-27.
{{cite web}}: CS1 maint: multiple names: authors list (link) - ^ Mikkelsen, Randall (August 16, 2007). "CIA and FBI computers used for Wikipedia edits". reuters.com. Reuters.
- ^ "Cut Down the Tall Trees". Burundi Film Center. 2007-07-05. Retrieved 2026-01-28.
- ^ Wippl, Joseph W.; D'Andrea, Donna (December 2014). "The Qualities That Make a Great Collection Management Officer". International Journal of Intelligence and CounterIntelligence. 27 (4): 806–814. doi:10.1080/08850607.2014.924821. ISSN 0885-0607.
- ^ "It's a Cultural Thing: Thoughts on a Troubled CIA, Part Two - Foreign Policy Research Institute". Retrieved 2026-01-29.
- ^ "HQ ARRC - Journal - April 2003". www.arrc.nato.int. Archived from the original on 2007-06-23. Retrieved 2026-01-29.
- ^ Davydoff, Daniil (January 2018). "RETHINKING THE INTELLIGENCE CYCLE FOR THE PRIVATE SECTOR" (PDF). ASIS International. p. 2.
- ^ a b c Muhić, Emir (December 7, 2025). "Transforming the Intelligence Cycle through Adapting to Complex Environments and the Operational Dynamics of Special Warfare" (PDF). www.acigjournal.com. Applied Cybersecurity & Internet Governance Journal.
- ^ "Intelligence Cycle". Silobreaker. 2023-06-17. Retrieved 2026-01-29.
- ^ Hulnick, Arthur S. (December 2006). "What's wrong with the Intelligence Cycle". Intelligence and National Security. 21 (6): 959–979. doi:10.1080/02684520601046291. ISSN 0268-4527.
- ^ Benham, Jenny (2024-12-31), Church, Stephen D.; Aird, Bill; Benham, Jenny; Bisson, Thomas N (eds.), "'A Little Bird Told Me … '. Spies and Espionage in the Norman World", Anglo-Norman Studies XLVI, Boydell and Brewer, pp. 185–202, doi:10.1515/9781805434276-014, ISBN 978-1-80543-427-6, retrieved 2026-01-29
{{citation}}: CS1 maint: work parameter with ISBN (link) - ^ a b c d e f g h i Johnson, Loch K. (ed.). "Handbook of Intelligence Studies". Routledge & CRC Press. Retrieved 2026-01-29.
- ^ Johnson, Loch K. (2002). Bombs, Bugs, Drugs, and Thugs. NYU Press. ISBN 978-0-8147-7173-0.
- ^ "The Role of Private Corporations in the Intelligence Community | The Belfer Center for Science and International Affairs". www.belfercenter.org. 2025-04-25. Retrieved 2026-01-29.
- ^ bill wurtz (2017-05-10). history of the entire world, i guess. Retrieved 2026-01-29 – via YouTube.
- ^ "Inside Putin's Mind: Portrait of a KGB Spy". spyscape.com. Retrieved 2026-01-28.
- ^ "On the Job with the Director's Briefer". Federal Bureau of Investigation. Retrieved 2026-01-28.
- ^ Hulnick, Arthur S. (May 1986). "The intelligence producer – policy consumer linkage: A theoretical approach". Intelligence and National Security. 1 (2): 212–233. doi:10.1080/02684528608431850. ISSN 0268-4527.
- ^ a b Helgerson, John L. (1996). Getting to Know the President: CIA Briefings of Presidential Candidates, 1952-1992. Center for the Study of Intelligence, Central Intelligence Agency. ISBN 978-1-4563-1741-6.
- ^ "Trump has sat for only 12 'daily' intelligence briefings since taking office". POLITICO. 2025-05-10. Retrieved 2026-01-28.
- ^ Lillis, Katie Bo (2021-11-29). "US intelligence community 'struggled' to brief Trump, CIA study says | CNN Politics". CNN. Retrieved 2026-01-28.
- ^ Luscombe, Richard (2021-11-29). "Trump's 'fact-free' approach caused briefing challenges, CIA report says". The Guardian. ISSN 0261-3077. Retrieved 2026-01-28.
- ^ Graham, David A. (2018-01-05). "The President Who Doesn't Read". The Atlantic. Retrieved 2026-01-28.
- ^ "Opinion | Which is scarier — that Trump doesn't read his daily intel briefing, or that Jared Kushner does?". The Washington Post. 2018-02-11. ISSN 0190-8286. Retrieved 2026-01-28.
- ^ Mark, Michelle. "Trump doesn't read his intelligence reports, but looks at the graphs, charts, and tables". Business Insider. Retrieved 2026-01-28.
- ^ McCarthy, Tom (2020-06-30). "'Russian bounties' intelligence was in Trump written daily briefing – reports". The Guardian. ISSN 0261-3077. Retrieved 2026-01-28.
- ^ "White House briefs 'Gang of 8' on Russia-Taliban bounty intel". 2020-07-02. Retrieved 2026-01-28.
- ^ Calia, Mike (2020-06-30). "Trump was briefed on Russian bounties earlier than thought, reports say". CNBC. Retrieved 2026-01-28.
- ^ Cohen, Katie Bo Lillis, Kylie Atwood, Zachary (2025-04-10). "Trump administration has tightly restricted access to president's daily intelligence brief | CNN Politics". CNN. Retrieved 2026-01-28.
{{cite web}}: CS1 maint: multiple names: authors list (link) - ^ "The Different Levels Of Military Intelligence". www.governmentprocurement.com. Retrieved 2026-01-28.
- ^ Noordam, Barend (2015), Flüchter, Antje; Schöttli, Jivanta (eds.), "Military Intelligence and Early Modern Warfare: The Dutch East India Company and China 1622–1624", The Dynamics of Transculturality: Concepts and Institutions in Motion, Cham: Springer International Publishing, pp. 113–135, doi:10.1007/978-3-319-09740-4_6, ISBN 978-3-319-09740-4, retrieved 2026-01-28
{{citation}}: CS1 maint: work parameter with ISBN (link) - ^ Gilad, Benjamin (2020-05-12). "When the Consumer of Intelligence is a CEO, Does it Matter?". The Strategy Bridge. Retrieved 2026-01-28.
- ^ "Intelligence Analysis in the Private Sector: Growth, Challenges, and Applications". securityexecutivecouncil.com. Security Executive Council. 2023. Archived from the original on 2026-01-27. Retrieved 2026-01-27.
- ^ Gioe, Dorothea; Parkhurst, Jeremey; Gioe, David V. (14 August 2023). "Can Private Sector Intelligence Benefit from U.S. Intelligence Community Analytic Standards?". International Journal of Intelligence and CounterIntelligence. 37 (4): 1145–1163. doi:10.1080/08850607.2023.2235078. ISSN 0885-0607.
- ^ "Spooky Business: U.S. Corporations Enlist Ex-Intelligence Agents to Spy on Nonprofit Groups". Democracy Now!. Retrieved 2026-01-28.
- ^ "Book Reviews". Contemporary Security Policy. 26 (1): 160–184. April 2005. doi:10.1080/13523260500127353. ISSN 1352-3260.
- ^ Hafetz, Jonathan (2023-03-19). "Homeland Security's fusion centers show the dangers of mission creep". The Hill. Archived from the original on 2025-05-11. Retrieved 2026-01-28.
- ^ Hulnick, Arthur S. (September 1997). "Intelligence and law enforcement: The "spies are not cops" problem". International Journal of Intelligence and CounterIntelligence. 10 (3): 269–286. doi:10.1080/08850609708435350. ISSN 0885-0607.
- ^ O'Neill, Sean (2006-10-03). "Special Branch absorbed into counter terror unit". www.thetimes.com. Retrieved 2026-01-27.
- ^ "Counter-Terrorism and Special Operations Bureau - LAPD Online". LAPD Online. Archived from the original on 2025-09-18. Retrieved 2026-01-27.
- ^ "intelligencer: Meaning & Use". Oxford English dictionary. 2010.