Collection
In the collection phase of the intelligence life cycle, the focus of the analyst shifts to collecting relevant, timely, and actionable threat intelligence. During this stage, data is collected and organized so that you can analyze that data and transform it into intelligence. The second phase of the intelligence life cycle, collection, plays a foundational role in creating an organization's collection management function. Apart from collecting data, threat intelligence collection is often an art mixed with science.
In response to the GIRs and Prioritized Collection Requirements (PCRs) that are being developed and the aforementioned policies and guidelines, data collection can begin. Data can be collected from several sources, ranging from humans to open source intel, including messaging apps such as Telegram. This data is often collected both manually and via automated means, such as an API. Processing is also included in the collection phase. Once the data has...