Source is a person or thing from which information of value may be extracted. All types of Sources are broadly grouped into following types: (a) Based on means: covert source. overt source and technical source fall within this type. (b) Based on direction: directed. undirected and casual sources fall within this type. (a) Based on means: 1. Covert sources: a. Employment of agents. informants. contacts. double agents b. Secret censorship. c. Interception of correspondence. d. Eaves dropping devices. e. Surveillance. f. Clandestine photography. g. Secret search~ 2. Overt sources: a. Diplomatic list b. Official information from the foreign office such as' notification of changes of address and movement6s of diplomats and their families. c. Newspapers. magazines. periodicals etc. d. Telephone. professional & commercial directories. e. Official records. f. Over searches g. Over investigation 3. Technical source: a. Telephone tapping. b. Cell phone tracking. c. Signal intelligence. d. . Imagery intelligence. e. Technical intelligence. f. Measurement and signature intelligence (b) Based on deletion: 1. Directed sources: Sources which can be tasked by an intelligence officer to provide answer to his questions. Followings can be directed sources: a. Security. forces camp. patrol. etc b. Air photo/air reconnaissance c. local police/local administration/local journalist d. Locally raised village defense party (VDP)/ Ansars e. Field staff of intelligence organizations f'; Psychological warfare staff/interrogation staff g. Operation/surveillance devices/clandestine devices h. Signal intelligence. 2. Undirected sources : Often known as open source, which contains about 80% of information. Sources which provide information but an intelligence officer has no control over them are known as undirected source. In general undirected sources consist of written material of all sorts and radio or television broadcasts, ..elating to security forces and areas of operations, actual Or potential. which may contain useful information. Examples areas followings: a. Newspaper and periodicals: containing details 0f personalities and current events. or political and economic developments. This includes local national and foreign newspapers. . b. Maps, charts, town plan, guide book, directories: contains detailed information from various government departments. c. Annual reports: annual reports of commercial concerns. state-owned and private commercial agencies, and imitational enterprises and so on. containing indications of industrial and economic capabffities, growth and development potential. d. Scientific and technical Journals and papers: containing detailed studies of activities in their respective fields. e. Reference books: containing a variety of detailed expert opinion. f. TV & Radio: Mortaring TV and Radio is a good source of information. 3. Casual sources: a. All rank of security forces: All ranks of the security forces must be provided with basic intelligence on all aspects of terrorism and of the conditions in which they will operate. Without a proper understanding of ¬the situation they will not be able to see the significance of events or incidents or to recognize what is unusual and potentially dangerous. b. Captured and surrendered persons: Although trained person may carryout tactical questioning at unit level. it is of the great importance that captured or surrendered terrorists are handed over to trained interrogators with the least possible delay. However. an officer of the concerned security forces should be kept with the interrogation team as local expert. c. Local inhabitant: After screening of suspects information of value may be obtained by questioning during any operation. Local inhabitants should also be encouraged to private .information. . d. Kidnapped persons: They can also provide good information but use of terror by the terrorists must be kept in mind. e. Captured documents, equipment and store: These are valuable sources of information to intelligence staffs. Documents found from a suspect tan be extremely useful since, among other things, they provide investigative points for interrogators. Captured equipment is always of value to technical intelligence specialists. f. Terrorist p~opaganda literature: These provide basis for own psychological warfare theme and may be used for assessing Terrorist’s present state as well as future plan.
অনলাইনে ছড়িয়ে ছিটিয়ে থাকা কথা গুলোকেই সহজে জানবার সুবিধার জন্য একত্রিত করে আমাদের কথা । এখানে সংগৃহিত কথা গুলোর সত্ব (copyright) সম্পূর্ণভাবে সোর্স সাইটের লেখকের এবং আমাদের কথাতে প্রতিটা কথাতেই সোর্স সাইটের রেফারেন্স লিংক উধৃত আছে ।