Sources of information - these systems, the components of which provide accommodation, integrity and availability of information on its purpose.
Depending on the type of object you are interested, the sources can be somehow classify.
Types of information sources
1. open or relatively affordable;
2. half-open (not entirely classified, but controlled by someone else);
3. closed.
sources of information can be:
1. knowledgeable people;
2. documents;
3. means of wired and wireless communications.
Knowers persons are those people who are directly or potentially have the right information.These are sources of information like:
1) Experts, ieindividuals whose professional contacts and knowledge (work, hobbies) allows to navigate in the questions.They can give base materials lead to new information sources.
2) Informants - a person of the enemy force, supplying the material on the activities of his employer.The veracity of the materials provided by them can be quite high.
3) Scared - all knowledgeable people who provide information under pressure.In this case, truth imparted is not guaranteed.
4) Agents - a trusted people who are surrounded by the object.The reliability of the data supplied depends on their individual qualities.
sources of information, which serve people in the know, there may be other persons accidentally owning the necessary data.
documents as sources of information:
1) Official documents describing the object.
2) Archives and business papers.
3) Carriers of computer information - databases, disks, flash drives, etc., From which you can print out the information you need.
4) Personal archives and paper - notebooks, notes in the calendar, etc.
5) Garbage - accidentally lost or discarded drafts and writing.
6) published data - is published in newspapers, on Internet sites, TV and radio stories read by someone lectures and performances.
Technical communications
sources of information can be a means of wired and wireless communications (a variety of technical processing and transmission of information).
These include:
1) Corded phones.In this case, we provide information or it is heard by special services in order to find out what interests them.At the same time there is the possibility of wiretapping not alone telephone conversations, but what is said behind closed doors when the tube position on the lever.
2) Mobile communication and pagers.Such devices are available for listening usual ethereal intercept corresponding scanner if there is no special protection.
3) Telegraph, fax, TTY.On channels such vehicles circulating graphic and symbolic information that appears on paper is very convenient for business connections and relationships.
4) Personal radios, which are used for civil and radio service.If the object does not provide special protection, the intercept signals from a radio does not make much effort.
5) Computer networks.Many organizations have a local network for communication between computers connected to the Internet.This enables to connect the cable and the "count" information which is stored in the memory of the computer itself, and one which is transmitted over the network.
Keep in mind that the information needed to make the right decision, usually either expensive or not available at all.The cost information is necessary to include the time spent by managers and subordinates to its collection.Therefore, to decide how significant benefit from this information.