INA 3305 Intelligence Collection: Sources and Challenges
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Law Enforcement Intelligence (Chapter 5)
The Intelligence Process 5 CHAPTER FIVE The Intelligence Process In defining intelligence, it was previously noted that the key factor that transforms information to intelligence is analysis. The British National Crime Squad, when referring to intelligence, observed the following: The processing of reliable intelligence is the cornerstone of successful law enforcement. Analysis organizes and interprets the intelligence in a way that significantly enhances its value and the possibility of its success in combating organized crime. Analysis identifies and predicts trends, patterns or problem areas requiring action.69 57 Many larger law enforcement agencies have an intelligence unit, but in too many cases the unit is limited in its utility because of failures in structure or direction.70 Perhaps the most common limitation is that the unit collects, but does not analyze information. Instead, the information is stored in a database simply awaiting access. For example, in some agencies field interview reports are managed by the intelligence function. While this descriptive report on an intelligence subject typically is forwarded to the intelligence unit, too often it is only entered into a database. When information sits passively in an information system, its use will be limited. If, however, the intelligence unit closely examines, analyzes, and compares the field interview forms with other information, the information can be used more effectively. Having a group of people whose primary job is simply responding to information requests about possible wanted subjects but not providing proactive analysis is not a contemporary intelligence unit. 69 See All too frequently when an intelligence unit performs some type of analysis, http://www.nationalcrimesqua d.police.uk no distinction is made within the unit about the different types of 70 In a survey conducted by the intelligence outputs and how they can contribute to the agency's goals. -
National Criminal Intelligence Sharing Plan T S R T Global Justice a I P C
NT O E F M JU T S R T A I P C E E D United States Department of Justice Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 T O VersionEN 1.0F M JU National Criminal Intelligence Sharing Plan T S R T Global Justice A I P C E E D Information Sharing Initiative United States Department of Justice The National Criminal Intelligence Sharing Plan Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 National Criminal Intelligence Sharing Plan Version 1.0 This document was prepared under the leadership, guidance, and funding of the Bureau of Justice Assistance (BJA), Office of Justice Programs, U.S. Department of Justice, in collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative. The opinions, findings, and conclusions or recommendations expressed in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. This project was supported by Award No. 2000-LD-BX-0003, awarded by the Office of Justice Programs. Version 1.0 National Criminal Intelligence Sharing Plan Table of Contents Executive Summary .....................................................................iii Acknowledgements ................................................................... ix The Rationale for the National Criminal Intelligence Sharing Plan ...............................................................................1 -
Intel Management Model for Europe
INTELLIGENCE MANAGEMENT MODEL FOR EUROPE PHASE ONE Guidelines for standards and best practice within the analysis function Contents Foreword 5 Acknowledgements 6 1. Executive Summary 7 Recruitment 8 Trainee Analyst - The Benefits 9 Training Programme for Police Analysts 10 Intelligence Training for Law Enforcement Personnel 10 Career Structure for Analyst Personnel 11 2. Recruitment 12 Person Specification 12 Pre-Selection 15 The Interview 15 3. Trainee Analyst - The Benefits 17 The Police Service of Northern Ireland 17 Belgian Federal Police 19 4. Training Programme for Police Analysts 20 Approach 1: The Police Service of Northern Ireland 20 Approach 2: The Belgian Federal Police 21 Approach 3: National Criminal Intelligence Service (NCIS) UK 22 5. Intelligence Training for Law Enforcement Personnel 23 Probationary Officers 23 Intelligence Officers 24 Analyst Managers 26 6. Career Structure for Analyst Personnel 28 7. Recommended References 30 3 List of Figures Figure 1: The Intelligence Cycle 7 Figure 2: Person Specification for Intelligence Analyst 14 Figure 3: PSNI Analyst Development Programme 18 Figure 4: Organisational Structure for Analysts - Strathclyde Police 28 Figure 5: Organisational Structure for Analysts - PSNI 29 4 Foreword The first tentative steps towards the development of an Intelligence Management Model for Europe were taken during early 2001. It was then that consideration was given to a proposed agenda for the forthcoming European Heads of Training Conference to be held in Scotland in June that same year. Many such conferences, in all disciplines, provide useful guidance and information to those in attendance. Often however there is little or no resultant legacy in terms of actual and tangible continuous development. -
Open Source Intelligence (OSINT)
ATP 2-22.9 Open-Source Intelligence July 2012 DISTRIBUTION RESTRICTION: Unlimited Distribution Headquarters, Department of the Army *ATP 2-22.9 Army Techniques Publication Headquarters No. 2-22.9 (FMI 2-22.9) Department of the Army Washington, DC, 10 July 2012 Open-Source Intelligence Contents Page PREFACE.............................................................................................................. iv INTRODUCTION .................................................................................................... v Chapter 1 OPEN-SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS ........................ 1-1 Definition and Terms .......................................................................................... 1-1 Characteristics .................................................................................................... 1-1 The Intelligence Warfighting Function ................................................................ 1-2 The Intelligence Process .................................................................................... 1-3 The Planning Requirements and Assessing Collection Process ........................ 1-4 The Military Decisionmaking Process ................................................................ 1-4 Intelligence Preparation of the Battlefield ........................................................... 1-5 Chapter 2 PLANNING AND PREPARATION OF THE OSINT MISSION ............................. 2-1 Section I – Planning OSINT Activities ........................................................... -
Law Enforcement Intelligence: a Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition
U. S. Department of Justice Office of Community Oriented Policing Services Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University This project was supported by Cooperative Agreement #2007-CK-WX-K015 by the U.S. Department of Justice Office of Community Oriented Policing Services. Points of view or opinions contained in this publication are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice or Michigan State University. References to specific agencies, companies, products, or services should not be considered an endorsement by the author or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. Letter from the COPS Office January 2009 Dear Colleague: This second edition of Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement captures the vast changes that have occurred in the 4 years since the first edition of the guide was published in 2004 after the watershed events of September 11, 2001. At that time, there was no Department of Homeland Security, Office of the Director of National Intelligence, Information-Sharing Environment, or Fusion Centers. Since the advent of these new agencies to help fight the war on terror, emphasis has been placed on cooperation and on sharing information among local, state, tribal, and federal agencies. -
Considering the Creation of a Domestic Intelligence Agency in the United States
HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. -
Outsourcing Intelligence Analysis: Legal and Policy Risks
STUDENT NOTE Outsourcing Intelligence Analysis: Legal and Policy Risks Joshua R. Storm* INTRODUCTION Intelligence reduces uncertainty in con¯ict, whether in trade negotiations between allies with similar, but individual interests, or in combat operations against a foreign state or terrorist group.1 Providing this intelligence involves col- lecting, processing, analyzing, and disseminating information to decision mak- ers.2 Key among these is analysis, de®ned by the R AND Corp. as ªthe process by which the information collected about an enemy is used to answer tactical ques- tions about current operations or to predict future behavior.º3 Beyond the tactical level, analysis is also necessary to provide the strategic and operational intelli- gence required to establish overarching policies and to develop operational plans to execute those policies. 4 In this manner, analysis is one of the most critical func- tions provided by the civilian and military entities that make up the intelligence community (IC). At the same time, analysis often is not performed by govern- ment personnel. For example, of core contract personnel within the intelligence community, 19 percent directly supported analysis and production as of 2007.5 This note explores the rise of outsourcing in the intelligence community and examines the legal and policy implications of outsourcing intelligence analysis in particular. First, it discusses the organizational and operational pressures that led to the increased use of contractors in the intelligence community after the September 11, 2001 attacks. Next, it identi®es the origins of the inherently gov- ernmental function test, used to determine when a government activity be out- sourced. -
The Intelligence Cycle*
Open Journal of Political Science, 2018, 8, 35-46 http://www.scirp.org/journal/ojps ISSN Online: 2164-0513 ISSN Print: 2164-0505 The Intelligence Cycle* Antonella Colonna Vilasi Centro studi Uni, Rome, Italy How to cite this paper: Colonna Vilasi, A. Abstract (2018). The Intelligence Cycle. Open Jour- nal of Political Science, 8, 35-46. Focusing on the Information Cycle, reference is made to the distribution ar- https://doi.org/10.4236/ojps.2018.81003 chitectures and the pathways that the various Intelligence products (journals, reports, alerts, forecasts) produce to the Administration (Intelligence Cycle). Received: November 9, 2017 Accepted: December 26, 2017 An introduction to any study on the Information loop needs a brief digression Published: December 29, 2017 to clarify concepts such as data, news, and information. Events mean any event or action that has been established to be true and/or has occurred and Copyright © 2018 by author and Scientific Research Publishing Inc. whose knowledge is assigned an information value; the information is the un- This work is licensed under the Creative clear cognition of a fact and/or a significant event related to topics of interest; Commons Attribution-NonCommercial information, in turn, is the product resulting from data following a frame of International License (CC BY-NC 4.0). processing, analysis, interpretation, comparison, reasoned integration and http://creativecommons.org/licenses/by-nc/4.0/ Open Access evaluation. Keywords Intelligence, Security, Intelligence Cycle, Politics, Society 1. Introduction According to the U.S. Marine Corps handbook: Counterintelligence (U.S. MARINE CORPS, 2007), “The Intelligence Cycle is a procedure frame work for the development of mission-focused Intelligence support. -
Perspectives and Opportunities in Intelligence for U.S. Leaders
Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE September 2018 CORTNEY WEINBAUM, JOHN V. PARACHINI, RICHARD S. GIRVEN, MICHAEL H. DECKER, RICHARD C. BAFFA Perspectives and Opportunities in Intelligence for U.S. Leaders C O R P O R A T I O N Contents 1. Introduction ................................................................................................. 1 2. Reconstituting Strategic Warning for the Digital Age .................................5 3. Unifying Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Across the U.S. Intelligence Community ...............16 4. Managing Security as an Enterprise .........................................................25 5. Better Utilizing Publicly Available Information ..........................................31 6. Surging Intelligence in an Unpredictable World .......................................44 7. Conclusion .................................................................................................56 Abbreviations ................................................................................................57 References ....................................................................................................58 Acknowledgments ........................................................................................64 About the Authors .........................................................................................64 The RAND Corporation is a research organization that develops solutions to public policy challenges to help make -
ATP 2-33.4 Intelligence Analysis
ATP 2-33.4 Intelligence Analysis JANUARY 2020 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes ATP 2-33.4, dated 18 August 2014. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *ATP 2-33.4 Army Techniques Publication Headquarters No. 2-33.4 Department of the Army Washington, DC, 10 January 2020 Intelligence Analysis Contents Page PREFACE............................................................................................................. vii INTRODUCTION ................................................................................................... xi PART ONE FUNDAMENTALS Chapter 1 UNDERSTANDING INTELLIGENCE ANALYSIS ............................................. 1-1 Intelligence Analysis Overview ........................................................................... 1-1 Conducting Intelligence Analysis ........................................................................ 1-5 Intelligence Analysis and Collection Management ............................................. 1-8 The All-Source Intelligence Architecture and Analysis Across the Echelons ..... 1-9 Intelligence Analysis During Large-Scale Ground Combat Operations ........... 1-11 Intelligence Analysis During the Army’s Other Strategic Roles ........................ 1-13 Chapter 2 THE INTELLIGENCE ANALYSIS PROCESS .................................................. -
Going Dark: Impact to Intelligence and Law Enforcement and Threat Mitigation
GOING DARK: IMPACT TO INTELLIGENCE AND LAW ENFORCEMENT AND THREAT MITIGATION Bonnie Mitchell Krystle Kaul G. S. McNamara Michelle Tucker Jacqueline Hicks Colin Bliss Rhonda Ober Danell Castro Amber Wells Catalina Reguerin Cindy Green-Ortiz Ken Stavinoha ACKNOWLEDGEMENTS We would like to first thank the Office of the Director of National Intelligence (ODNI) for its generous funding and support for our study and learning journey to the DEFCON hacking conference. We are also very grateful to the Department of Homeland Security (DHS) for its support during the duration of the program. We could not have completed this study without the unwavering support and dedication of Ms. Bonnie Mitchell, ODNI Deputy National Intelligence Manager for the Western Hemisphere and the Homeland, our devoted Team Champion who steered us throughout this study and helped turn an idea into a product. We would like to acknowledge and thank each member of our public-private sector working group for their tireless efforts from around the U.S., which includes Krystle Kaul, G. S. McNamara, Michelle Tucker, Jacqueline Hicks, Colin Bliss, Rhonda Ober, Danell Castro, Amber Wells, Catalina Reguerin, Cindy Green- Ortiz and Ken Stavinoha. We are very thankful for all the unique insight we received from interviewees who contributed to this report by educating our group on the many aspects of ‘going dark,’ and we take full responsibility for any and all errors of fact or interpretation implied or explicit in this paper. Our interviewees include the Village sponsors at DEF CON, private sector industry experts and government officials. We are thankful for the interesting and diverse perspectives particularly from senior government officials and private sector experts. -
Espionage and Intelligence Gathering Other Books in the Current Controversies Series
Espionage and Intelligence Gathering Other books in the Current Controversies series: The Abortion Controversy Issues in Adoption Alcoholism Marriage and Divorce Assisted Suicide Medical Ethics Biodiversity Mental Health Capital Punishment The Middle East Censorship Minorities Child Abuse Nationalism and Ethnic Civil Liberties Conflict Computers and Society Native American Rights Conserving the Environment Police Brutality Crime Politicians and Ethics Developing Nations Pollution The Disabled Prisons Drug Abuse Racism Drug Legalization The Rights of Animals Drug Trafficking Sexual Harassment Ethics Sexually Transmitted Diseases Family Violence Smoking Free Speech Suicide Garbage and Waste Teen Addiction Gay Rights Teen Pregnancy and Parenting Genetic Engineering Teens and Alcohol Guns and Violence The Terrorist Attack on Hate Crimes America Homosexuality Urban Terrorism Illegal Drugs Violence Against Women Illegal Immigration Violence in the Media The Information Age Women in the Military Interventionism Youth Violence Espionage and Intelligence Gathering Louise I. Gerdes, Book Editor Daniel Leone,President Bonnie Szumski, Publisher Scott Barbour, Managing Editor Helen Cothran, Senior Editor CURRENT CONTROVERSIES San Diego • Detroit • New York • San Francisco • Cleveland New Haven, Conn. • Waterville, Maine • London • Munich © 2004 by Greenhaven Press. Greenhaven Press is an imprint of The Gale Group, Inc., a division of Thomson Learning, Inc. Greenhaven® and Thomson Learning™ are trademarks used herein under license. For more information, contact Greenhaven Press 27500 Drake Rd. Farmington Hills, MI 48331-3535 Or you can visit our Internet site at http://www.gale.com ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage retrieval systems—without the written permission of the publisher.