

This article is an excerpt from the Shortform summary of "Permanent Record" by Edward Snowden. Shortform has the world's best summaries of books you should be reading.
Like this article? Sign up for a free trial here .
What are the different methods for gathering intelligence? How were humint, sigint and other types of intelligence used by Edward Snowden? How have intelligence gathering techniques evolved?
Intelligence gathering techniques are the different methods for collecting information about people. Three common types of intelligence: HUMINT, SIGINT, and LOVEINT.
Learn more about the different intelligence gathering techniques and who uses them in Permanent Record: HUMINT (CIA); SIGINT (NSA); LOVEINT (personal use).
Intelligence Gathering Techniques
There are several different types of intelligence. Permanent Record refers to the three types: sigint, humint, and loveint.
Intelligence Gathering Method #1: SIGINT
NSA SIGINT is short for signals intelligence. This type of intelligence comes from intercepted communications such as phone, fax, and computers. Cyber intelligence specifically refers to intelligence gathered from the Internet. For the NSA, SIGINT is the focus.
Intelligence Gathering Method #2: HUMINT
HUMINT is short for human intelligence. This type of intelligence is collected by case officers (COs) who gather intelligence face-to-face, by talking to people. COs tend to be a particular brand of people—good liars, cynics, smokers, and drinkers. This is all HUMINT. CIA operatives focus on this technique.
Intelligence Gathering Method #3: LOVEINT
LOVEINT is short for love intelligence. This is an inside joke rather than a real intelligence type. LOVEINT refers to using surveillance for personal use, such as spying on your ex-girlfriend.
Evolution of Intel Gathering
Since the birth of the Internet, SIGINT has become more widely applicable than HUMINT. For example, before the Internet, if a spy wanted to get something off of someone’s computer, she had to find a way to physically access it. There was plenty of opportunity to get caught while downloading info or installing new hardware or software. After the Internet, if a spy wanted to access someone’s computer, all she had to do was send their target an email with malware. She didn’t have to try to bribe, turn, or coerce her target. Her target need never even know he was being spied on.

———End of Preview———
Like what you just read? Read the rest of the world's best summary of Edward Snowden's "Permanent Record" at Shortform .
Here's what you'll find in our full Permanent Record summary :
- What Ed Snowden discovered that caused him to completely lose faith in the government
- How Snowden led the bombshell reports of US mass surveillance
- How Snowden is coping with his treatment as both patriot and traitor