The Seven-Step Intelligence Cycle
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Law Enforcement Intelligence (Chapter 5)
The Intelligence Process 5 CHAPTER FIVE The Intelligence Process In defining intelligence, it was previously noted that the key factor that transforms information to intelligence is analysis. The British National Crime Squad, when referring to intelligence, observed the following: The processing of reliable intelligence is the cornerstone of successful law enforcement. Analysis organizes and interprets the intelligence in a way that significantly enhances its value and the possibility of its success in combating organized crime. Analysis identifies and predicts trends, patterns or problem areas requiring action.69 57 Many larger law enforcement agencies have an intelligence unit, but in too many cases the unit is limited in its utility because of failures in structure or direction.70 Perhaps the most common limitation is that the unit collects, but does not analyze information. Instead, the information is stored in a database simply awaiting access. For example, in some agencies field interview reports are managed by the intelligence function. While this descriptive report on an intelligence subject typically is forwarded to the intelligence unit, too often it is only entered into a database. When information sits passively in an information system, its use will be limited. If, however, the intelligence unit closely examines, analyzes, and compares the field interview forms with other information, the information can be used more effectively. Having a group of people whose primary job is simply responding to information requests about possible wanted subjects but not providing proactive analysis is not a contemporary intelligence unit. 69 See All too frequently when an intelligence unit performs some type of analysis, http://www.nationalcrimesqua d.police.uk no distinction is made within the unit about the different types of 70 In a survey conducted by the intelligence outputs and how they can contribute to the agency's goals. -
National Criminal Intelligence Sharing Plan T S R T Global Justice a I P C
NT O E F M JU T S R T A I P C E E D United States Department of Justice Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 T O VersionEN 1.0F M JU National Criminal Intelligence Sharing Plan T S R T Global Justice A I P C E E D Information Sharing Initiative United States Department of Justice The National Criminal Intelligence Sharing Plan Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 National Criminal Intelligence Sharing Plan Version 1.0 This document was prepared under the leadership, guidance, and funding of the Bureau of Justice Assistance (BJA), Office of Justice Programs, U.S. Department of Justice, in collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative. The opinions, findings, and conclusions or recommendations expressed in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. This project was supported by Award No. 2000-LD-BX-0003, awarded by the Office of Justice Programs. Version 1.0 National Criminal Intelligence Sharing Plan Table of Contents Executive Summary .....................................................................iii Acknowledgements ................................................................... ix The Rationale for the National Criminal Intelligence Sharing Plan ...............................................................................1 -
Introduction
1 Introduction Intelligence collection is one of the earliest recorded organized human activ- ities, along with war. The earliest writing about intelligence collection dates from the seventh and sixth centuries BCE: Caleb the spy in the Book of Numbers and The Art of War by Sun Tzu. It is striking that two cultures, ancient Hebrew and Chinese, geographically remote from one another and undoubtedly unknown to one another, should both discuss the importance of intelligence collection at roughly the same time in an early part of human history. But the precept is elementary at its core—information confers power. Whoever is best at gathering (and exploiting) relevant information tends to win. In the twenty-fi rst century, the U.S. Intelligencedistribute Community (IC) is premier in its capabilities for doing both. Collection in the IC generally refers to fi ve ordisciplines (or sources): Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Signals Intel- ligence (SIGINT), Geospatial Intelligence (GEOINT), and Measurement and Signature Intelligence (MASINT). A great deal of mystery and myth surrounds the subject of those sources and the capabilities and uses implied. And many popular perceptions are far afi eld from reality. That is why we have written this book. Our intentionpost, is to give readers an approachable but detailed picture of U.S. intelligence collection capabilities. To that end, each chapter follows a similar construct. We discuss the unique origin and history of the INT, or intelligence collection discipline, which is important to under- stand in terms of both its development and how it is used today. We discuss the types of intelligencecopy, issues that each INT is best suited for and those for which it is of little help. -
Law Enforcement Intelligence: a Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition
U. S. Department of Justice Office of Community Oriented Policing Services Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University This project was supported by Cooperative Agreement #2007-CK-WX-K015 by the U.S. Department of Justice Office of Community Oriented Policing Services. Points of view or opinions contained in this publication are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice or Michigan State University. References to specific agencies, companies, products, or services should not be considered an endorsement by the author or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. Letter from the COPS Office January 2009 Dear Colleague: This second edition of Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement captures the vast changes that have occurred in the 4 years since the first edition of the guide was published in 2004 after the watershed events of September 11, 2001. At that time, there was no Department of Homeland Security, Office of the Director of National Intelligence, Information-Sharing Environment, or Fusion Centers. Since the advent of these new agencies to help fight the war on terror, emphasis has been placed on cooperation and on sharing information among local, state, tribal, and federal agencies. -
Law Enforcement Intelligence: a Guide for State, Local, and Tribal Law Enforcement Agencies
David L. Carter, Ph.D. School of Criminal Justice Michigan State University Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies November 2004 David L. Carter, Ph.D. This project was supported by Cooperative Agreement #2003-CK-WX-0455 by the U.S. Department of Justice Office of Community Oriented Policing Services. Points of view or opinions contained in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice or Michigan State University. Preface The world of law enforcement intelligence has changed dramatically since September 11, 2001. State, local, and tribal law enforcement agencies have been tasked with a variety of new responsibilities; intelligence is just one. In addition, the intelligence discipline has evolved significantly in recent years. As these various trends have merged, increasing numbers of American law enforcement agencies have begun to explore, and sometimes embrace, the intelligence function. This guide is intended to help them in this process. The guide is directed primarily toward state, local, and tribal law enforcement agencies of all sizes that need to develop or reinvigorate their intelligence function. Rather than being a manual to teach a person how to be an intelligence analyst, it is directed toward that manager, supervisor, or officer who is assigned to create an intelligence function. It is intended to provide ideas, definitions, concepts, policies, and resources. It is a primer- a place to start on a new managerial journey. Every effort was made to incorporate the state of the art in law enforcement intelligence: Intelligence-Led Policing, the National Criminal Intelligence Sharing Plan, the FBI Intelligence Program, the array of new intelligence activities occurring in the Department of Homeland Security, community policing, and various other significant developments in the reengineered arena of intelligence. -
The Intelligence Cycle*
Open Journal of Political Science, 2018, 8, 35-46 http://www.scirp.org/journal/ojps ISSN Online: 2164-0513 ISSN Print: 2164-0505 The Intelligence Cycle* Antonella Colonna Vilasi Centro studi Uni, Rome, Italy How to cite this paper: Colonna Vilasi, A. Abstract (2018). The Intelligence Cycle. Open Jour- nal of Political Science, 8, 35-46. Focusing on the Information Cycle, reference is made to the distribution ar- https://doi.org/10.4236/ojps.2018.81003 chitectures and the pathways that the various Intelligence products (journals, reports, alerts, forecasts) produce to the Administration (Intelligence Cycle). Received: November 9, 2017 Accepted: December 26, 2017 An introduction to any study on the Information loop needs a brief digression Published: December 29, 2017 to clarify concepts such as data, news, and information. Events mean any event or action that has been established to be true and/or has occurred and Copyright © 2018 by author and Scientific Research Publishing Inc. whose knowledge is assigned an information value; the information is the un- This work is licensed under the Creative clear cognition of a fact and/or a significant event related to topics of interest; Commons Attribution-NonCommercial information, in turn, is the product resulting from data following a frame of International License (CC BY-NC 4.0). processing, analysis, interpretation, comparison, reasoned integration and http://creativecommons.org/licenses/by-nc/4.0/ Open Access evaluation. Keywords Intelligence, Security, Intelligence Cycle, Politics, Society 1. Introduction According to the U.S. Marine Corps handbook: Counterintelligence (U.S. MARINE CORPS, 2007), “The Intelligence Cycle is a procedure frame work for the development of mission-focused Intelligence support. -
Perspectives and Opportunities in Intelligence for U.S. Leaders
Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE September 2018 CORTNEY WEINBAUM, JOHN V. PARACHINI, RICHARD S. GIRVEN, MICHAEL H. DECKER, RICHARD C. BAFFA Perspectives and Opportunities in Intelligence for U.S. Leaders C O R P O R A T I O N Contents 1. Introduction ................................................................................................. 1 2. Reconstituting Strategic Warning for the Digital Age .................................5 3. Unifying Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Across the U.S. Intelligence Community ...............16 4. Managing Security as an Enterprise .........................................................25 5. Better Utilizing Publicly Available Information ..........................................31 6. Surging Intelligence in an Unpredictable World .......................................44 7. Conclusion .................................................................................................56 Abbreviations ................................................................................................57 References ....................................................................................................58 Acknowledgments ........................................................................................64 About the Authors .........................................................................................64 The RAND Corporation is a research organization that develops solutions to public policy challenges to help make -
Development of Surveillance Technology and Risk of Abuse of Economic Information
6&,(17,),&∃1∋7(&+12/2∗,&∃/237,216∃66(660(17 672∃ ∋(9(/230(172)6859(,//∃1&( 7(&+12/2∗<∃1∋5,6.2)∃%86( 2)(&2120,&,1)250∃7,21 9ΡΟ 3ΥΗςΗΘΛΡΘΘΓ∃ΘΟ∴ςΛς 3ΥΗςΗΘΛΡΘΡΙΚΗΙΡΞΥςΞΓΛΗς ∃ΘΟ∴ςΛς∋ΣΥΡΗΦΛΡΘΘΓΚΞΠΘΥΛϑΚςΛΘΚΗ(ΞΥΡΣΗΘ8ΘΛΡΘΘΓΚΗ ΥΡΟΗΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ ∋ΡΦΞΠΗΘΓΗΥΨΛΟΣΡΞΥΟΗ3ΘΗΟ672∃ /Ξ[ΗΠΕΡΞΥϑ∋ΗΦΗΠΕΗΥ 3(9ΡΟ(1 QA-ST-OA-132-EN-N &ΟΡϑΞΛΘϑΓ 7ΛΟΗ 9ΡΟ3ΥπςΗΘΛΡΘΗΘΟ∴ςΗ 3ΥπςΗΘΛΡΘΓΗςΤΞ∆ΥΗπΞΓΗς ∃ΘΟ∴ςΗΣΥΡΗΦΩΛΡΘΓΗςΓΡΘΘπΗςΗΩ∋ΥΡΛΓΗΟ+ΡΠΠΗΓΘς Ο 8ΘΛΡΘ(ΞΥΡΣπΗΘΘΗΗΥ{ΟΗΓΞ3∆ΥΟΗΠΗΘ(ΞΥΡΣπΗΘ :ΡΥΝΣΟΘ5ΗΙ (3,9%672∃ 3ΞΕΟΛςΚΗΥ (ΞΥΡΣΗΘ 3ΥΟΛΠΗΘ ∋ΛΥΗΦΡΥΗ ∗ΗΘΗΥΟΙΡΥ5ΗςΗΥΦΚ ∋ΛΥΗΦΡΥΗ ∃ 7ΚΗ672∃3ΥΡϑΥ∆ΠΠΗ ∃ΞΚΡΥ 3Ηϑϑ∴%ΗΦΝΗΥΨΛςΛΛΘϑΥΗςΗ∆ΥΦΚΗΥ 8ΘΓΗΥΚΗςΞΣΗΥΨΛςΛΡΘΡΙ∋ΛΦΝ+ΡΟΓςΖΡΥΚ +ΗΓ ΡΙΩΚΗ672∃7ΗΠ (ΓΛΡΥ0Υ ∋ΛΦΝ+2/∋6:257+ +ΗΓΡΙ672∃8ΘΛ ∋Η 2ΦΡΕΥΗ 3(ΘΞΠΕΗΥ 3(9ΡΟ(1 7ΚΛςΓΡΦΞΠΗΘΛςΖΡΥΝΛΘϑ∋ΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ,ΩΛςΘΡΘΡΙΙΛΦΛΟΣΞΕΟΛΦΛΡΘΡΙ 672∃ 7ΚΛςΓΡΦΞΠΗΘΓΡΗςΘΡΘΗΦΗςςΥΛΟ∴ΥΗΣΥΗςΗΘΚΗΨΛΗΖςΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ &217(176 3ϑΗ ,ΘΥΡΓΞΦΛΡΘ 3∆Υ2ΘΗ 3ΥΗςΗΘΛΡΘΡΙΚΗΙΡΞΥςΞΓΛΗς 6ΞΓ∴2ΘΗ 7ΚΗςΩΗΡΙΚΗ∆ΥΛΘ&ΡΠΠΞΘΛΦ∆ΛΡΘς,ΘΗΟΟΛϑΗΘΦΗ &20,17ΡΙ ∆ΞΡΠΗΓΣΥΡΦΗςςΛΘϑΙΡΥΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗςΡΙΛΘΗΥΦΗΣΗΓ ΕΥΡΓΕΘΓΠΞΟΛΟΘϑΞϑΗΟΗ∆ςΗΓΡΥΦΡΠΠΡΘΦ∆ΥΥΛΗΥς∴ςΗΠςΘΓΛς ΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘΛΘΦΟΞΓΛΘϑςΣΗΗΦΚ ΥΗΦΡϑΘΛΛΡΘ 6ΞΓ∴7ΖΡ (ΘΦΥ∴ΣΛΡΘΘΓΦΥ∴ΣΡς∴ςΗΠςΛΘΗΟΗΦΩΥΡΘΛΦςΞΥΨΗΛΟΟΘΦΗ∆ςΞΥΨΗ∴ΡΙ ΚΗΗΦΚΘΡΟΡϑ∴ςςΗςςΠΗΘΛςςΞΗς 6ΞΓ∴7ΚΥΗΗ 7ΚΗΟΗϑ∆ΟΛ∴ΡΙΚΗΛΘΗΥΦΗΣΛΡΘΡΙΗΟΗΦΩΥΡΘΛΦΦΡΠΠΞΘΛΦ∆ΛΡΘς ΦΡΘΦΛςΗςΞΥΨΗ∴ΡΙΚΗΣΥΛΘΦΛΣΟΟΗϑ∆ΟΛςςΞΗςΘΓΛΘςΥΞΠΗΘςΞΘΓΗΥ ΛΘΗΥΘΛΡΘΟ(ΞΥΡΣΗΘΘΓΘΛΡΘΟΟΖ 6ΞΓ∴)ΡΞΥ 7ΚΗΣΗΥΦΗΣΛΡΘΡΙΗΦΡΘΡΠΛΦΥΛςΝςΥΛςΛΘϑΙΥΡΠΚΗΣΡΗΘΛΟ ΨΞΟΘΗΥΕΛΟΛ∴ΡΙΗΟΗΦΥΡΘΛΦΦΡΠΠΗΥΦΛ∆ΟΠΗΓΛΡΛΘΗΥΦΗΣΛΡΘ 3∆Υ7ΖΡ ∃ΘΟ∴ςΛς±∋ΣΥΡΗΦΛΡΘΘΓΚΞΠΘΥΛϑΚςΛΘΚΗ(ΞΥΡΣΗΘ8ΘΛΡΘΘΓΚΗ -
National Incident Management System: Intelligence/Investigations
NATIONAL INCIDENT MANAGEMENT SYSTEM Intelligence/Investigations Function Guidance and Field Operations Guide October 2013 NIMS: Intelligence/Investigations Function Guidance and Field Operations Guide Table of Contents Intelligence/Investigations Function Guidance ................................................................ 1 Introduction.................................................................................................................................... 3 Intelligence/Investigations Function ............................................................................................ 7 Use and Organization of Groups .................................................................................................. 8 Use and Organization of Branches ............................................................................................... 9 Summary ...................................................................................................................................... 10 Intelligence/Investigations Function Field Operations Guide ....................................... 11 Intelligence/Investigations Functional Overview ...................................................................... 12 Groups and Structure within the Intelligence/Investigations Section .................................... 19 List of Abbreviations and Glossary of Key Terms ......................................................... 31 List of Abbreviations .................................................................................................................. -
Signal and Information Technology in Service of Homeland Security
b...... b...... b...... b...... 1. 0. WIR VERSTEHEN DIE ZEICHEN DER ZElT Signal and Information Technology in Service of Homeland Security FUSION The implementation of Fusion Centres and Intelligence Sharing procedures are important initiatives to improve homeland security today. MEDAV offers a comprehensive spectrum of products and engineering services covering all needs to support military forces, security agencies, police forces and intelligence services with state of the art radio and communication reconnaissance and information technology. The collection, processing and analysis of information from different sources are integrated functions. The fusion of raw intelligence, the content processing and analysis are essential part of the systems, delivered from one hand. It's tough to make predictions, especially about the future. (Yogi Berra) The Dar>er focuses on such solutions and svstems which are deliverable within short time. htroduction..,,...... ,,,. ........ -....... ........... *................* .. 3 2 Company Overview ........................................ ,...................,..*.*..*.*.......... ,., .....*..........4 3 Issues of Today ................................................................................. .......... 6 3.1 Current Discussions in the Security Community .,................. ,. ....... ................ 6 3.2 Consequence: No Operation Wiout Information ! ..................................................... 6 3.3 Integrated Information Intelligence Fusion System (13FS) .......................................... -
Intelligence Sharing: Getting the National Counterterrorism Analysts on the Same Data Sheet
Intelligence Sharing: Getting the National Counterterrorism Analysts on the Same Data Sheet Colonel Daniel Putbrese U.S. Air Force Atlantic Council Senior Fellow Occasional Paper October 2006 THE ATLANTIC COUNCIL OF THE UNITED STATES The Atlantic Council promotes constructive U.S. leadership and engagement in international affairs based on the central role of the Atlantic community in meeting the international challenges of the 21st century. The Council embodies a nonpartisan network of leaders who aim to bring ideas to power and to give power to ideas by: stimulating dialogue and discussion about critical international issues with a view to enriching public debate and promoting consensus on appropriate responses in the Administration, the Congress, the corporate and nonprofit sectors, and the media in the United States and among leaders in Europe, Asia and the Americas; conducting educational and exchange programs for successor generations of U.S. leaders so that they will come to value U.S. international engagement and have the knowledge and understanding necessary to develop effective policies. Disclaimer The views expressed in this academic research paper are those of the author(s) and do not reflect the official policy or position of the U.S. government or the Department of Defense. In accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the United States government. Table of Contents Disclaimer............................................................................................................................................... -
FM 34-52 Intelligence Interrogation, May 1987
Field Manual *FM 34-52 NO 34-52 HEADQUARTERS DEPARTMENT OF THE ARMY Washington. DC. 8 May 1987 INTELLIGENCE INTERROGATION Table of Contents Page Preface ................................................................................iii Chapter 1 Interrogation and the Interrogator .......................................... 1-0 Principles of Interrogation ................................................. 1-0 Sources of Information ......................................................1-1 Personal Qualities ......................................................... 1-2 Specialized Skills and Knowledge .......................................... 1-4 Chapter 2 Role of the Interrogator ..................................................... 2-0 Commander's Mission Under Air-Land Battle .............................. 2-0 Military Intelligence and Intelligence Preparation of the Battlefield ............................................. 2-0 Intelligence and Electronic Warfare Operations ............................. 2-2 Counterintelligence ........................................................ 2-4 Electronic Warfare ......................................................... 2-6 Capabilities and Limitations of Interrogators ............................... 2-6 Chapter 3 Interrogation Process ...................................................... 3-0 Screening Sources ..........................................................3-0 Interrogating Procedures ...................................................3-3 Chapter 4 Processing Captured Enemy Documents