In this 6 part series of articles for Canadian Security Magazine, part 1 explained the nature of security intelligence (SI) and its OPSEC challenges. Part 2 explained the OPSEC challenges facing security intelligence in an iconic commercial enterprise or location. Part 3 explained the important aspects of document control. Part 4 explained the best way to protect the computer network used for security intelligence.
This, the 5th part, explains that privacy and anonymity are different things entirely and how to manage the use of online personas to gather intelligence.