SlideShare a Scribd company logo
1 of 6
WAI LECTURE 2
CIVIL INTELLIGENCEGATHERING AND INFORMATION MANAGEMENT
‘THE WAI BRIGADEPERSPECTIVE’, BY CHIEF SUPERINTENDENT OKOLIESEBASTINE. (P.S.OEDUCATION.)ON THE4TH
CAMPING PROGRAMMEOF WAI BRIGADENIGERIA, LAGOS STATECOMMND 2016
INTRODUCTION
Intelligenceis derived from the Latin verb intelligere,whichis to comprehendor perceive.
Intelligencehas generallybeen described by differentScholarsas the abilityto perceive
and/orretain knowledgeor informationandapplyit to itselfor other instancesof
knowledgeor informationcreatingreferableunderstandingmodelsofany size,density or
complexity,due to anyconsciousor subconsciousimposedwill orinstructionto do so.
Intelligenceis mostwidely studiedin humansbuthas equallybeen observed inNon human
animals.
And informationisthatwhich informsi.e. That fromwhich datacan be derived. At its most
fundamental,informationisanypropagationofcauseandeffect withina system.
Informationisconveyed either as the content of a message or throughdirect or indirect
observationofsomething. That which isperceived can be construedas a message inits
own right,and inthat sense, informationisalwaysconveyed asthe content ofa message.
Information canbe encoded into various formsfor transmissionandinterpretation.
Information canbe encoded into signsandtransmittedvia signals.
 Information resolvesuncertainty.Theuncertainty of an eventis measured by its probability
of occurrence and is inversely proportionalto that.The moreuncertain an event,the more
information isrequired to resolve uncertainty of thatevent.The conceptthatinformation is
the messagehasdifferentmeaningsin differentcontexts.This,theconceptof information
becomesclosely related to notionsof constraint,communication,control,data form,
instruction,knowledge,meaning,understanding,mentalstimuli,pattern,perception,
representation and entropy. Forany organization to effectively gatherintelligence and
manageitsinformation properly,itmustadoptthe managementskillsin businessand
organization which isthe art thatcoordinatestheeffortsof peopleto accomplish goalsand
objectivesusing availableresourcesefficiently and effectively.
AIM:
The aim of this presentation isto critically look atmethodsof intelligence gathering and
relate it withthe managementof information;asboth intelligenceand information are
related,as oneis a process thatlead to the other.It is alsointendedtoenhance the
applicationof intelligence gatheringabilityof officersof WAIBRIGADEin the performance of
theirdailyactivities.
SCOPE:
This paperwill attemptto cover;
 Definition of terms;
 Sourcesof information gathering;
 Principles of information collection;
 Meansof intelligence gathering;
 Intelligence cycle principle;
 Level of intelligence;
 Information management;and
 Conclusion.
DEFINITION OFTERMS:
INTELLIGENCE
Intelligence hasequally been defined in many differentwaysasa term of ones capacity for
logic, abstractthought,understanding,self – awareness,communication,learning,
emotionalknowledge,memory,planning,creativity and problemsolving.Regardlessof
which aspect of intelligence one hasin mind,product,process,mission or organization,the
bottomline is that good governmentaldecision rely on accurate,complete,unbiased and
timely information aboutthecapabilitiesand intentionsof an enemy or a subversivegroup.
INFORMATION
Information isalso an unevaluated material of every description including thatderived from
observations,reports,rumour,imagery and othersourceswhich when processed may produce
intelligence. So simply put,information isthe raw material while intelligence is the finished
productready foruseby the consumer.
INFORMATIONMANAGEMENT
Information Managementon theotherhand,isthe collation and managementof
information fromoneormore sourcesand distribution of thatinformation to oneormore
audiences.Thissometime involvesthosewho havea stakein ora right to thatinformation.
The Wikipedia free encyclopedia definesit asa corporateresponsibility thatneedsto be
addressed and followed fromtheuppermostseniorlevels of managementto thefrontline
worker.Organization mustbe held and musthold its employeesaccountableto capture,
manage,store,share,preserveand deliverinformation appropriately and responsibly.
MANAGEMENT
Managementmeanstheorganization and controlovertheplanning,structureand
organization,controlling,processing,evaluatingand reporting of information activitiesin
orderto meet clients’ objectivesand to enable cooperatefunctionsin thedelivery of
information.
SOURCESOF INFORMATIONGATHERING
 Interview;
 Surveillance;
 Elicitation;
 Record examination;
 Forensicanalysis;
 Arrest and searches;
 Agents(informants);
 Interrogation;
 Investigation/Questioning of suspects;
 Issuing of Questionnaires;
 Organized communityforums/Town hallmeetings;
 Espionage;
 Pastrecord analysis;
 Media etc.
PRINCIPLESOF IMFORMATION COLLECTION:
 Planning;
 Exploitation of all sources;
 Time;
 Relevancy;
 Control;
 Access;and
 Flexibility
MEANS OF INTELLIGENCEGATHERING:
 Coverthuman intelligence source,theseare agentswho arenon membersof the
organization;
 Directed surveillance which involvesobserving target;
 Interception of communication;
 Intrusivesurveillancei.e. eavesdropping in someoneshome,caretc;
 Human intelligence which is derived fromhuman sources,synonymousto espionageand
clandestineactivities; and
 Signalintelligence derived fromsignal interception (communication intelligence,electronic
intelligence, foreign instrumentation,signalintelligence(radar) etc.
INTELLIGENCE GATHERING PRINCIPLES: Collection.Analysisand Processing.Production.
Dissemination
LEVELS OFINTELLIGENCE
Intelligences arein variouslevel and theseare;
i. Strategic(National),thisdiscusstheinformation aboutcapabilitiesand intentionsof foreign
countries;
ii. Tactical which is operationalorcombatintelligence, information required by military field
Commanders;and
iii. Counterintelligence, which is aimed at protecting and maintaining thesecrecy of a country’s
intelligence operation.
iv. INFORMATIONMANAGEMENT
Information managementisthecollection and managementof information fromoneor
moresourcesand distribution of that information to oneormore audiences.Thissometimes
involvesthosewho havea stakein or a right to that information.So information
managementisabout;
v. Management;
vi. Storing;
vii. Share;
viii. Preserve;and
ix. Appropriateinformation delivery.
For informationmanagement,wemustensurethat;
The covertsource (agent) who isthe sourceof information isprotected fromexposure.
Indiscriminatedissemination of information orintelligenceshould be adequately guardednot
to unduly endangeran informant/agent/source;
Properrecruitmentprocessshould be adopted to ensurethatthe rightpersonsare recruited
into theorganization;
Also,there should bea propervetting of staff already recruited into thesector and where
information managementisinvolved,thepersonsso entrusted to handledocumentshould
be with proven integrity;
The registry departmentorrecord officeshould be staffed with properly vetted personswho
are well trained in documentorrecord handling;
x. The transmission of information should bedoneusing themostappropriatemedium/means;
xi. Information/intelligenceto be disseminated should beclassified (Top Secret,Secret,
Confidential,Restricted);
xii. The principle of need to knowin information managementisvery vital to any organization.
When a restriction order is placed,a staff fromtheonsetknowshis/herlimit to having access
to a document.Theneed to know,takeand retain principle should be adopted;
xiii. The addressing mustbeclear and unambiguous,so thatthedisseminated information does
notget into the wrong hands, which may eitherdestroy it or giveit to a rival organization.
CONCLUSION
In conclusion,itwill be appropriateto state that intelligence gathering is key to any organization, be
it securitybody,business,foreign policy,technology advancement etc when the right intelligence are
obtained ,analyzed and properly utilized to the advantageof thesector,theagency concerned will be
better off in all ramifications. Organization is bound to succeed if the right intelligence are gathered
and utilized for policy formulations. Since information brings about intelligence, the proper
management of such information is equally key and vital. For successful information management,
the right personnel/staff must be charged with the handling of the information or document. If
proper selection of staff is not done, then the sector stand to lose to its competitors, should he
becomean agentforthe opponent? Itisbetter to manageinformation very wellforthe benefitof the
sector you represent. And above all, training and retraining of staff should not be compromised
because knowledge is vital to planning. Every WAI BRIGADE OFFICER is by this training expected to
havea clear perception of how to engagein intelligence gathering asthis is the role you are expected
to play in the re-positioning of this uniformed Para-military organization. You must report
suspicious activity.. Describe specifically what you observed, including:
 Who or what you saw;
 When you saw it;
 Where it occurred; and
 Why it's suspicious.
‘’IF YOUSEE SOMETHING ,SAYSOMETHING’’
THANK YOU FOR LISTENING AND ANY QUESTIONS?
CIVIL INTELLIGENCE GATHERING AND INFO MANAGEMENT

More Related Content

Similar to CIVIL INTELLIGENCE GATHERING AND INFO MANAGEMENT

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceSyed Peer
 
A Counterintelligence Analysis Typology
A Counterintelligence Analysis TypologyA Counterintelligence Analysis Typology
A Counterintelligence Analysis TypologySara Alvarez
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxClintonKelvin
 
Amanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paperAmanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paperamanda Kaster
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection RecommendationsAlienVault
 
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in CybersecurityRole of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in CybersecurityRachit Shah
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable InformationToya Shamberger
 
Ricerca documentaria specialistica
Ricerca documentaria specialisticaRicerca documentaria specialistica
Ricerca documentaria specialisticamariasquarcione
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...inventionjournals
 
Information Overload in the Attention Economy
Information Overload in the Attention EconomyInformation Overload in the Attention Economy
Information Overload in the Attention EconomyOlivier Serrat
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Proactive Crisis Management Through Internal Crowdsourcing
Proactive Crisis Management Through Internal CrowdsourcingProactive Crisis Management Through Internal Crowdsourcing
Proactive Crisis Management Through Internal CrowdsourcingMissionMode
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 

Similar to CIVIL INTELLIGENCE GATHERING AND INFO MANAGEMENT (20)

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
A Counterintelligence Analysis Typology
A Counterintelligence Analysis TypologyA Counterintelligence Analysis Typology
A Counterintelligence Analysis Typology
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptx
 
Amanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paperAmanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paper
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
E2112733
E2112733E2112733
E2112733
 
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in CybersecurityRole of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable Information
 
Ricerca documentaria specialistica
Ricerca documentaria specialisticaRicerca documentaria specialistica
Ricerca documentaria specialistica
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
IS2 - Adamec
IS2 - AdamecIS2 - Adamec
IS2 - Adamec
 
AKM PPT C1FOUNDATION OF KNOWLEDGE
AKM PPT C1FOUNDATION OF KNOWLEDGEAKM PPT C1FOUNDATION OF KNOWLEDGE
AKM PPT C1FOUNDATION OF KNOWLEDGE
 
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Information Overload in the Attention Economy
Information Overload in the Attention EconomyInformation Overload in the Attention Economy
Information Overload in the Attention Economy
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Proactive Crisis Management Through Internal Crowdsourcing
Proactive Crisis Management Through Internal CrowdsourcingProactive Crisis Management Through Internal Crowdsourcing
Proactive Crisis Management Through Internal Crowdsourcing
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 

CIVIL INTELLIGENCE GATHERING AND INFO MANAGEMENT

  • 1. WAI LECTURE 2 CIVIL INTELLIGENCEGATHERING AND INFORMATION MANAGEMENT ‘THE WAI BRIGADEPERSPECTIVE’, BY CHIEF SUPERINTENDENT OKOLIESEBASTINE. (P.S.OEDUCATION.)ON THE4TH CAMPING PROGRAMMEOF WAI BRIGADENIGERIA, LAGOS STATECOMMND 2016 INTRODUCTION Intelligenceis derived from the Latin verb intelligere,whichis to comprehendor perceive. Intelligencehas generallybeen described by differentScholarsas the abilityto perceive and/orretain knowledgeor informationandapplyit to itselfor other instancesof knowledgeor informationcreatingreferableunderstandingmodelsofany size,density or complexity,due to anyconsciousor subconsciousimposedwill orinstructionto do so. Intelligenceis mostwidely studiedin humansbuthas equallybeen observed inNon human animals. And informationisthatwhich informsi.e. That fromwhich datacan be derived. At its most fundamental,informationisanypropagationofcauseandeffect withina system. Informationisconveyed either as the content of a message or throughdirect or indirect observationofsomething. That which isperceived can be construedas a message inits own right,and inthat sense, informationisalwaysconveyed asthe content ofa message. Information canbe encoded into various formsfor transmissionandinterpretation. Information canbe encoded into signsandtransmittedvia signals.  Information resolvesuncertainty.Theuncertainty of an eventis measured by its probability of occurrence and is inversely proportionalto that.The moreuncertain an event,the more information isrequired to resolve uncertainty of thatevent.The conceptthatinformation is the messagehasdifferentmeaningsin differentcontexts.This,theconceptof information becomesclosely related to notionsof constraint,communication,control,data form, instruction,knowledge,meaning,understanding,mentalstimuli,pattern,perception, representation and entropy. Forany organization to effectively gatherintelligence and manageitsinformation properly,itmustadoptthe managementskillsin businessand organization which isthe art thatcoordinatestheeffortsof peopleto accomplish goalsand objectivesusing availableresourcesefficiently and effectively. AIM: The aim of this presentation isto critically look atmethodsof intelligence gathering and relate it withthe managementof information;asboth intelligenceand information are related,as oneis a process thatlead to the other.It is alsointendedtoenhance the applicationof intelligence gatheringabilityof officersof WAIBRIGADEin the performance of theirdailyactivities. SCOPE: This paperwill attemptto cover;
  • 2.  Definition of terms;  Sourcesof information gathering;  Principles of information collection;  Meansof intelligence gathering;  Intelligence cycle principle;  Level of intelligence;  Information management;and  Conclusion. DEFINITION OFTERMS: INTELLIGENCE Intelligence hasequally been defined in many differentwaysasa term of ones capacity for logic, abstractthought,understanding,self – awareness,communication,learning, emotionalknowledge,memory,planning,creativity and problemsolving.Regardlessof which aspect of intelligence one hasin mind,product,process,mission or organization,the bottomline is that good governmentaldecision rely on accurate,complete,unbiased and timely information aboutthecapabilitiesand intentionsof an enemy or a subversivegroup. INFORMATION Information isalso an unevaluated material of every description including thatderived from observations,reports,rumour,imagery and othersourceswhich when processed may produce intelligence. So simply put,information isthe raw material while intelligence is the finished productready foruseby the consumer. INFORMATIONMANAGEMENT Information Managementon theotherhand,isthe collation and managementof information fromoneormore sourcesand distribution of thatinformation to oneormore audiences.Thissometime involvesthosewho havea stakein ora right to thatinformation. The Wikipedia free encyclopedia definesit asa corporateresponsibility thatneedsto be addressed and followed fromtheuppermostseniorlevels of managementto thefrontline worker.Organization mustbe held and musthold its employeesaccountableto capture, manage,store,share,preserveand deliverinformation appropriately and responsibly. MANAGEMENT Managementmeanstheorganization and controlovertheplanning,structureand organization,controlling,processing,evaluatingand reporting of information activitiesin orderto meet clients’ objectivesand to enable cooperatefunctionsin thedelivery of information.
  • 3. SOURCESOF INFORMATIONGATHERING  Interview;  Surveillance;  Elicitation;  Record examination;  Forensicanalysis;  Arrest and searches;  Agents(informants);  Interrogation;  Investigation/Questioning of suspects;  Issuing of Questionnaires;  Organized communityforums/Town hallmeetings;  Espionage;  Pastrecord analysis;  Media etc. PRINCIPLESOF IMFORMATION COLLECTION:  Planning;  Exploitation of all sources;  Time;  Relevancy;  Control;  Access;and  Flexibility MEANS OF INTELLIGENCEGATHERING:  Coverthuman intelligence source,theseare agentswho arenon membersof the organization;  Directed surveillance which involvesobserving target;  Interception of communication;
  • 4.  Intrusivesurveillancei.e. eavesdropping in someoneshome,caretc;  Human intelligence which is derived fromhuman sources,synonymousto espionageand clandestineactivities; and  Signalintelligence derived fromsignal interception (communication intelligence,electronic intelligence, foreign instrumentation,signalintelligence(radar) etc. INTELLIGENCE GATHERING PRINCIPLES: Collection.Analysisand Processing.Production. Dissemination LEVELS OFINTELLIGENCE Intelligences arein variouslevel and theseare; i. Strategic(National),thisdiscusstheinformation aboutcapabilitiesand intentionsof foreign countries; ii. Tactical which is operationalorcombatintelligence, information required by military field Commanders;and iii. Counterintelligence, which is aimed at protecting and maintaining thesecrecy of a country’s intelligence operation. iv. INFORMATIONMANAGEMENT Information managementisthecollection and managementof information fromoneor moresourcesand distribution of that information to oneormore audiences.Thissometimes involvesthosewho havea stakein or a right to that information.So information managementisabout; v. Management; vi. Storing; vii. Share; viii. Preserve;and ix. Appropriateinformation delivery. For informationmanagement,wemustensurethat; The covertsource (agent) who isthe sourceof information isprotected fromexposure. Indiscriminatedissemination of information orintelligenceshould be adequately guardednot to unduly endangeran informant/agent/source; Properrecruitmentprocessshould be adopted to ensurethatthe rightpersonsare recruited into theorganization;
  • 5. Also,there should bea propervetting of staff already recruited into thesector and where information managementisinvolved,thepersonsso entrusted to handledocumentshould be with proven integrity; The registry departmentorrecord officeshould be staffed with properly vetted personswho are well trained in documentorrecord handling; x. The transmission of information should bedoneusing themostappropriatemedium/means; xi. Information/intelligenceto be disseminated should beclassified (Top Secret,Secret, Confidential,Restricted); xii. The principle of need to knowin information managementisvery vital to any organization. When a restriction order is placed,a staff fromtheonsetknowshis/herlimit to having access to a document.Theneed to know,takeand retain principle should be adopted; xiii. The addressing mustbeclear and unambiguous,so thatthedisseminated information does notget into the wrong hands, which may eitherdestroy it or giveit to a rival organization. CONCLUSION In conclusion,itwill be appropriateto state that intelligence gathering is key to any organization, be it securitybody,business,foreign policy,technology advancement etc when the right intelligence are obtained ,analyzed and properly utilized to the advantageof thesector,theagency concerned will be better off in all ramifications. Organization is bound to succeed if the right intelligence are gathered and utilized for policy formulations. Since information brings about intelligence, the proper management of such information is equally key and vital. For successful information management, the right personnel/staff must be charged with the handling of the information or document. If proper selection of staff is not done, then the sector stand to lose to its competitors, should he becomean agentforthe opponent? Itisbetter to manageinformation very wellforthe benefitof the sector you represent. And above all, training and retraining of staff should not be compromised because knowledge is vital to planning. Every WAI BRIGADE OFFICER is by this training expected to havea clear perception of how to engagein intelligence gathering asthis is the role you are expected to play in the re-positioning of this uniformed Para-military organization. You must report suspicious activity.. Describe specifically what you observed, including:  Who or what you saw;  When you saw it;  Where it occurred; and  Why it's suspicious. ‘’IF YOUSEE SOMETHING ,SAYSOMETHING’’ THANK YOU FOR LISTENING AND ANY QUESTIONS?