29 Jul 2025

Security is reliant on intelligent technologies and HUMINT

Global issues impact security locally and local issues could impact globally.

Security practitioners may subscribe to technologically driven intelligence resources which could be investigating internationally or locally.

There are providers that could be selling subscriptions for alert-updates and have a compliment of analysts.

Some suppliers could be providing big data software, perhaps risk management software or security management software that do tap into the above-mentioned alert update service provider.

The suppliers may train the end users on how upload and how to use their software using search parameters.

We need to consider the fact that the technologies are only as good as the users. The issue here is that an intelligent person knows that they need knowledge and skills to comprehend the intelligence.

HUMINT [Human Intelligence] is the key factor and not only the intelligence to use the technologies. They key factor is the critical thinking ability and level of situational awareness. The users may have many certificates, but the soft skills ensure relevancy. Critical thinking ability is key to getting the most out of the technologies.

HUMINT is also used to obtain all the reliable and truthful information be it from software or intelligence providers besides their own teams on the ground.

Let us address 2 points. How to get the most out of the tech and from the team on the ground,

1. Intelligence has evolved! Successful software dealers are always looking for new ideas to ensure that their clients are getting the best results so that they can obtain references and referrals to new clients.

It is not the bells and the whistles that should be the main object. Sure, the software should look good, but it is the smartest users that cement their success.

2. Team on the ground HUMINT

We know a few things,
1. People lie, hide information or volunteer information for their own agenda.
2. There could be sleeper or recently recruited insider threats.
3. People could be providing information or acting under duress by others blackmailing or bullying them.
Concluding that knowing what is truly happening on the ground is key especially when the users are in a sector that could be compromised by terror, gangs, extortionists, or for any nefarious reasons that could invite reputational damage.

Clients could manage life impacting or deadly incidents, so we take this very seriously. If a software supplier is not adding critical thinking training to the user training, then user should ensure their training department subscribes to such. Trust the suppliers that know how to get best result by adding CT.

Security success depends on the critical thinking ability of the team and their level of situational awareness (Kirsten, J 2018)

Do view HIM Tool