Over the years, new models of intelligence collection have evolved transforming the information synthesis into different forms with the availability of the latest technology and modern tools. Broadly speaking, these models can be divided into three categories. The first model is purely based on human intelligence interaction, in which human sources, on the ground, intercept information from various quarters, including local population, critically analyse it and send it to the end-source for further refinement and analysis. The medium of sharing information involves the latest cyber instruments, such as software-based devices on secured and unsecured communication systems. It may also use a purely human resource channel for information communication, as has been frequently used by top Al Qaeda leadership in which human messengers are utilised to send or receive messages and share information through purely human connections. Sometimes they carry critical information in the form of a written message, abstract or actual, or stored in any digital tools to be used by the end source to decipher the details contained in it. The method involves both linear and non-linear information collection mechanism. In the linear process, the information is collected directly from the target and sent back through a similar mechanism to the end source. Whereas, in the nonlinear mechanism, we have several connectors in between the end source and the target for information sharing. To reach the target, one needs to go through some connectors to get the requisite information and relay it to the end source. The second model is based on cyber-based human activity for intelligence analysis. In this model, the cyber activity of a target is monitored and observed. It includes his or her facebook activity and other web-based actions. These activities then become a function of human thinking pattern and behaviour. Such a web-based approach can be used to collect critical cyber information which can then be restructured to determine the true character and conduct of a target. The number of e-connections of the target may also help us in determining the spectrum of his or her cyber social capital and the mode of affiliation he or she enjoys with them. We can also determine whether his or her cyber contacts are based in the country of his or her origin or they are situated outside the home country. This may also assist in extracting information about the nature of his or her relationship with these contacts. Sometimes, the e-mail boxes of the target are infected with multiple viruses to determine targets’ frequency of messages on various email addresses. The most frequent and least contacted email addresses need to be scrutinised for any important information. There exist, nowadays, software packages, which can infect the mailbox of a target and help see the messages stored as drafts and the number of times these messages have been accessed from different locations on various internet protocol addresses. The analysis of such metadata gives us the true picture of ones’ cyber-based activities, and the information can be shared with the end source for necessary action. For example, the number of websites formed online by various terrorists or terror groups has increased exponentially over the last 10 – 15 years. These websites have been used for a range of activities involving tutorials, exercises, discussions, lectures and debates in the form of uploaded and stored videos and messages. A study published in one of the leading newspapers in Pakistan in 2015 indicates different terror groups are utilising cyberspace quite freely. Interestingly Ahl-e-Sunnah-Wal-Jamat (ASWJ) was the leading organisation utilising cyberspace followed by Balochistan Student Organisation (BSO) (Dr Allah Nazar Group), Sipah-e-Muhammad Pakistan (SMP), Sipah Sahaba Pakistan (SSP), Tehrek-e-Islami (TeI), Jaish-e-Muhammad (JeM) and others in Pakistan. Current analysis in this regard might provide us with interesting details about many other religious-sectarian and militant groups operating freely in cyberspace and utilising it for multiple purposes. The mechanism of sifting details through cyber media has also been widely used by different security companies and organisations. Even embassies of developed nations are using web-based information of visa applicants to track their whereabouts during their stay in the visiting countries and their journey back to their destinations. Many applications are also rejected based on applicants’ web-based activities. The mechanism of sifting details through cyber media has been widely used by different security companies and organisations The third model of intelligence collection is through satellite and telecommunication messaging. In such a case, the data through satellite communication is sifted for analysis. The mobile communication information is often compromised through viruses and other available techniques of data hacking and spoofing. A recent report by a Canadian Company sheds light on fake smartphone applications, laden with the variegated virus, which is being employed to target smartphone data in Pakistan. Such a technique can easily accumulate data from a series of targets and then systematically use it for further analysis. Such a mechanism utilises innovative ways of attracting a person through enticing messages. For example, a message based on any burning national issue can be sent to multiple targets for participation and activation such as independence of Indian occupied Kashmir (IoK). Similarly, messages laden with sensual details and pictures can be used to lure a reader into a trap. As the target clicks on an advertisement or message, the virus enters into his or her mobile phone and settles there permanently. It can then relay all the mobile phone-based activity of the target to the end source without his or her knowledge. Sometimes emotional and psychological based items appear on the mobile screen such as asking for donations, etc., which may get the attention of many persons. Hence as an advertisement of interest of a person appears on his or her mobile, he or she latches on to it unknowingly that it may infect the device permanently. The virus records all the activity and in certain cases jams the messages and blocks the contents in extreme situations. The future of intelligence collection may become simpler with more and more emphasis on device data eavesdropping. As the system becomes more advanced and the data transmission becomes faster, the scope of intelligence collection becomes wider. A stage may be reached when each person can easily be traced through his or her device and all his activities can be recorded automatically. It will be a stage of complete information extraction and total intelligence collection. The writer is a senior police officer and manager. He has done his MPA in International Security Policy (ISP) from Columbia University, NY