The Security Intelligence Gathering Debate between Human Intelligence (Humint) versus Technological Intelligence (Techint)

Authors

  • Ade Mulya Sekolah Tinggi Ilmu Kepolisian, Jakarta, Indonesia
  • Semiarto Aji Purwanto Universitas Indonesia, Jawa Barat, Indonesia
  • Angel Damayanti Universitas Kristen Indonesia, Jakarta, Indonesia
  • Hizkia Yosias Polimpung Universitas Monash Malaysia, Subang Jaya, Malaysia
  • Yogha Restu Pramadi Cardiff University United Kingdom, Wales, United Kingdom
  • Prasetyo Adi Wibowo Putro Politeknik Siber dan Sandi Negara, Jawa Barat, Indonesia

DOI:

https://doi.org/10.38035/gijlss.v3i2.497

Keywords:

Intelligence Gathering, Security Intelligence, Technological Intelligence, Human Intelligence

Abstract

This article aims to compare security intelligence collection with humint and techint approaches to obtain intelligence information for security and public order purposes. The research on intelligence collection emphasizes the elements of intelligence focus, strengths, and challenges as well as prospective trends in intelligence application, by examining it from micro, meso and macro perspectives. The approach was adopted with interviews of security intelligence officers and literature review based on secondary sources, combined with an analysis of the challenges of intelligence collection faced in dealing with security threats and the evolving intelligence technology landscape and the role of humans in the future. The findings reveal that intelligence collection has made great strides due to the impact of information, communication and computer technology. However, human intelligence remains indispensable and continues to coexist with technological advancements due to the unique and irreplaceable qualities of humans compared to devices and machines.

References

Aldrich, R. J. (2015). The 100 billion dollar brain: Central intelligence machinery in the UK and the US. International Affairs, 91(2), 393–403. https://doi.org/10.1111/1468-2346.12242

Andrew, C. (2004). Intelligence, International Relations and “Under-theorisation.” Intelligence and National Security, 19(2), 170–184. https://doi.org/10.1080/0268452042000302949

Berman, E. (2014). Regulating Domestic Intelligence Collection. Washington and Lee Law Review, 71(1), 3–91. http://scholarlycommons.law.wlu.edu/wlulr/vol71/iss1/5/

Bilgi, ?. (2016). Intelligence cooperation in the european union: An impossible dream? In All Azimuth (Vol. 5, Issue 1). https://doi.org/10.20991/allazimuth.167342

Brodeur, J.-P. (2007). High and Low Policing in Post-9/11 Times. Policing, 1(1), 25–37. https://doi.org/10.1093/police/pam002

Crelinsten, R. (2021). Terrorism, Democracy, and Human Security; A Communication Model; First Edition. Routledge Taylor and Fr.

Creswell, J. W., & Poth, C. N. (2018). Qualitative Inquiry Research Design: Choosing Among Five Approaches (4th ed., Vol. 13, Issue 1). SAGE Publications.

Crosston, M., & Valli, F. (2017). An Intelligence Civil War: “HUMINT’” vs. “TECHINT”, Cyber, Intelligence, and Security, Vol. 1, Issue 1, Spring 2017. Intelligence, and Security |, 1(1), 67–82. http://www.inss.org.il/he/wp-content/uploads/sites/2/systemfiles/An Intelligence Civil War “HUMINT’” vs. “TECHINT”.pdf

Davies, P. (2013). MI6 and the Machinery of Spying: Structure and Process in Britain’s Secret Intelligence. http://books.google.co.uk/books?id=TTW2h5GHlWkC

Deery, P. (2010). Australian Security Intelligence Organisation. In Spies, Wiretaps, and Secret Operations: an Encyclopedia of American Espionage: volumes 1-2 (Vols. 1–2, pp. 59–60).

Downing, J. (2023). Social Media, Digital Methods and Critical Security Studies. New Security Challenges, 71–108. https://doi.org/10.1007/978-3-031-20734-1_3

Gill, P., Marrin, S., & Phythian, M. (2008). Intelligence theory: Key questions and debates. In Intelligence Theory: Key Questions and Debates (Vol. 9780203892). https://doi.org/10.4324/9780203892992

Heimeriks, K. H., Klijn, E., & Reuer, J. J. (2009). Building Capabilities for Alliance Portfolios. Long Range Planning, 42(1), 96–114. https://doi.org/10.1016/j.lrp.2008.10.005

Jensen, M. A. (2012). Intelligence failures: What are they really and what do we do about them? Intelligence and National Security, 27(2), 261–282. https://doi.org/10.1080/02684527.2012.661646

Juneau, T., Massie, J., & Munier, M. (2023). Intelligence Cooperation under Multipolarity: Non-American Perspectives. In J. Massie & M. Munier (Eds.), Intelligence Cooperation under Multipolarity: Non-American Perspectives. University of Toronto Press.

Leigh, I., & Wegge, N. (2018). Intelligence and oversight at the outset of the twenty-first century. In Intelligence Oversight in the Twenty-First Century: Accountability in a Changing World (1st ed., pp. 7–24). Routledge. https://doi.org/10.4324/9781351188791-2

Mulya, A., Ismail, M., & Jumaeng, S. (2023). Perspective Of Security Intelligence in Law Enforcing Terrorism in Indonesia. International Journal of Social Service and Research, 3(12), 3125–3136. https://doi.org/10.46799/ijssr.v3i12.620

Mulya, A., Marzuki Ismail, R. Bayu Yuliantoro, & Heriyanto Kandati. (2022). Dampak Implementasi Lawfull Interception pada Pemberantasan Tindak Pidana Terorisme. Formosa Journal of Multidisciplinary Research, 1(2), 367–382. https://doi.org/10.55927/fjmr.v1i2.551

Nunan, J. (2020). Developing an Evidenced-Based Approach to Enhance the Collection of Intelligence from Covert Human Intelligence Sources Declaration. December.

O’Neil, A. (2017). Australia and the ‘Five Eyes’ intelligence network: the perils of an asymmetric alliance. Australian Journal of International Affairs, 71(5), 529–543. https://doi.org/10.1080/10357718.2017.1342763

Pasmore, W. A. (1995). Social Science Transformed: The Socio-Technical Perspective. Human Relations, 48(1), 1–21. https://doi.org/10.1177/001872679504800101

Robert, R., & R, U. A. R. (2023). Konstruktivisme Bruno Latour dan Implikasinya Terhadap Ide Keagenan Sosiologi. Masyarakat: Jurnal Sosiologi, 28(2). https://doi.org/10.7454/MJS.v28i2.13565

Sheptycki, J. (2017a). Liquid modernity and the police métier; thinking about information flows in police organisation. Global Crime, 18(3), 286–302. https://doi.org/10.1080/17440572.2017.1313734

Sheptycki, J. (2017b). The police intelligence division-of-labour. Policing and Society, 27(6), 620–635. https://doi.org/10.1080/10439463.2017.1342645

Sims, J. E. (2006). Foreign Intelligence Liaison: Devils, Deals, and Details. International Journal of Intelligence and CounterIntelligence, 19(2), 195–217. https://doi.org/10.1080/08850600500483657

Sood, A., & Enbody, R. (2014). Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware. Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware, 1–142. https://doi.org/10.1016/C2013-0-14275-4

Stottlemyre, S. A. (2015). HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence. International Journal of Intelligence and CounterIntelligence, 28(3), 578–589. https://doi.org/10.1080/08850607.2015.992760

Tatnall, A., & Davey, B. (2019). Rise of the Non-Human Actors: the Internet of Things. In Analytical Frameworks, Applications, and Impacts of ICT and Actor-Network Theory.

Telep, C. W., Ready, J., & Bottema, A. J. (2018). Working towards intelligence-led policing: The Phoenix Police Department intelligence officer program. Policing (Oxford), 12(3), 332–343. https://doi.org/10.1093/police/pax094

Turing, A. M. (2023). Computing Machinery and Intelligence. Brain Physiology & Psychology, LIX(236), 212–240.

Walsh, P. F., & Miller, S. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security, 31(3), 345–368. https://doi.org/10.1080/02684527.2014.998436

Wirtz, J. J. (2016). Understanding intelligence failure: Warning, response and deterrence. In Understanding Intelligence Failure: Warning, Response and Deterrence. https://doi.org/10.4324/9781315673295

Published

2025-08-26

How to Cite

Mulya, A., Purwanto, S. A., Damayanti, A., Polimpung, H. Y., Pramadi, Y. R., & Putro, P. A. W. (2025). The Security Intelligence Gathering Debate between Human Intelligence (Humint) versus Technological Intelligence (Techint). Greenation International Journal of Law and Social Sciences, 3(2), 572–588. https://doi.org/10.38035/gijlss.v3i2.497