1) The document discusses methods of intelligence gathering and information management from the perspective of the WAI Brigade in Nigeria. It defines key terms like intelligence, information, and information management.
2) It describes various sources of intelligence gathering like interviews, surveillance, records examination, and agents. It also outlines principles of information collection and means of intelligence gathering.
3) The document discusses different levels of intelligence from strategic to tactical. It emphasizes the importance of properly managing information through collection, storage, sharing, and appropriate dissemination. Effective intelligence gathering and information management are crucial for any organization to succeed.
This document discusses intelligence sources and the elements of intelligence. It describes intelligence as a process of collecting, analyzing, and disseminating information, as well as conducting covert actions. The four main elements of intelligence are identified as collection, analysis, dissemination, and covert action. The key intelligence collection disciplines discussed are human intelligence, signals intelligence, open-source intelligence, and geospatial intelligence.
This document summarizes and analyzes concepts related to intelligence analysis. It discusses a 2008 book that assesses the state of US intelligence analysis after 9/11 and proposes improvements. It also explains the intelligence cycle of planning, collection, processing, analysis, and dissemination. Additionally, it covers sources of intelligence like OSINT, HUMINT, SIGINT, GEOINT, and MASINT. Key aspects of analysis like denial and deception, the counterintelligence function, and applying the intelligence cycle to competitive business intelligence are also summarized.
This document discusses how data mining can be used as an active solution for crime investigation in Nigeria. It suggests that law enforcement agencies could analyze large volumes of data using data mining techniques to detect patterns related to criminal activities and predict future crime trends. Specifically, data mining algorithms could be used to cluster populations sizes to impute missing values, cluster changes in crime rates between years to forecast future trends, and detect deceptive identities by criminals through comparing identity fields across criminal records. The goal is to help security agencies prevent, arrest, and investigate crimes like terrorism more effectively.
A series of books have been published by DG RELEX on the topic of EU conflict prevention, crisis management and peace building. The aim is to ensure target groups are kept well informed about developments in EU crisis response capacity and the actions undertaken by the EU in conflicts around the world.
The Significance of Counterintelligence in National Security.docxNoraRoberts5
Counterintelligence plays a crucial role in protecting national security by identifying threats from foreign intelligence services, terrorists, and other malicious actors. It focuses on safeguarding sensitive information, detecting and neutralizing insider threats through monitoring and background checks. Counterintelligence also counters espionage attempts and foreign influence campaigns to protect democratic processes and a nation's autonomy. As threats continue evolving, counterintelligence remains essential to preserving national interests and values.
Information Gathering in Intelligence AgenciesNora A. Rahim
Information gathering and sharing between agencies is critical for preventing threats like terrorism, yet involvement of classified information makes studying the relationship between information science and intelligence work difficult. The document discusses the differences between information and intelligence, the intelligence cycle of collecting, analyzing and using information to produce finished intelligence for policymakers, and various types of intelligence including current, estimative, warning, research, and scientific/technical intelligence. It concludes by recommending better information retrieval and an understanding of information science to provide timely intelligence while reducing pressure on analysts.
This document provides an overview of intelligence concepts for first responders. It defines intelligence as information gathered and analyzed about foreign entities. The intelligence cycle is described as the process of developing raw information into finished intelligence reports through planning, collection from sources like signals and imagery, processing, analysis, and dissemination. The guide also lists the members of the United States Intelligence Community and their roles in collecting, analyzing, and sharing intelligence.
This document discusses intelligence sources and the elements of intelligence. It describes intelligence as a process of collecting, analyzing, and disseminating information, as well as conducting covert actions. The four main elements of intelligence are identified as collection, analysis, dissemination, and covert action. The key intelligence collection disciplines discussed are human intelligence, signals intelligence, open-source intelligence, and geospatial intelligence.
This document summarizes and analyzes concepts related to intelligence analysis. It discusses a 2008 book that assesses the state of US intelligence analysis after 9/11 and proposes improvements. It also explains the intelligence cycle of planning, collection, processing, analysis, and dissemination. Additionally, it covers sources of intelligence like OSINT, HUMINT, SIGINT, GEOINT, and MASINT. Key aspects of analysis like denial and deception, the counterintelligence function, and applying the intelligence cycle to competitive business intelligence are also summarized.
This document discusses how data mining can be used as an active solution for crime investigation in Nigeria. It suggests that law enforcement agencies could analyze large volumes of data using data mining techniques to detect patterns related to criminal activities and predict future crime trends. Specifically, data mining algorithms could be used to cluster populations sizes to impute missing values, cluster changes in crime rates between years to forecast future trends, and detect deceptive identities by criminals through comparing identity fields across criminal records. The goal is to help security agencies prevent, arrest, and investigate crimes like terrorism more effectively.
A series of books have been published by DG RELEX on the topic of EU conflict prevention, crisis management and peace building. The aim is to ensure target groups are kept well informed about developments in EU crisis response capacity and the actions undertaken by the EU in conflicts around the world.
The Significance of Counterintelligence in National Security.docxNoraRoberts5
Counterintelligence plays a crucial role in protecting national security by identifying threats from foreign intelligence services, terrorists, and other malicious actors. It focuses on safeguarding sensitive information, detecting and neutralizing insider threats through monitoring and background checks. Counterintelligence also counters espionage attempts and foreign influence campaigns to protect democratic processes and a nation's autonomy. As threats continue evolving, counterintelligence remains essential to preserving national interests and values.
Information Gathering in Intelligence AgenciesNora A. Rahim
Information gathering and sharing between agencies is critical for preventing threats like terrorism, yet involvement of classified information makes studying the relationship between information science and intelligence work difficult. The document discusses the differences between information and intelligence, the intelligence cycle of collecting, analyzing and using information to produce finished intelligence for policymakers, and various types of intelligence including current, estimative, warning, research, and scientific/technical intelligence. It concludes by recommending better information retrieval and an understanding of information science to provide timely intelligence while reducing pressure on analysts.
This document provides an overview of intelligence concepts for first responders. It defines intelligence as information gathered and analyzed about foreign entities. The intelligence cycle is described as the process of developing raw information into finished intelligence reports through planning, collection from sources like signals and imagery, processing, analysis, and dissemination. The guide also lists the members of the United States Intelligence Community and their roles in collecting, analyzing, and sharing intelligence.
Speaker at the IDC IT Security Roadshow 2017 in Doha. It was a one day event bringing together some Security Vendors and End User folks to present and discuss security related topics. The event midway was split into two tracks A - Threat Intelligence and B - Securing the Endpoint to the cloud. My End User Presentation (Track A) covered Threat Intelligence. There were some some interesting speakers and audience Q & A discussions followed by a networking lunch to boot. The venue at the Shangri La Hotel in Doha provided a great space and good networking opportunity.
A Counterintelligence Analysis TypologySara Alvarez
This document discusses a proposed typology of counterintelligence (CI) analysis that divides it into four types based on the customers served, targets pursued, and nature of analysis. The four types are: 1) foreign intelligence threat analysis which assesses threats from foreign intelligence activities, 2) counter-counterintelligence analysis which provides advice to help collectors avoid foreign counterintelligence, 3) CI operational and investigative analysis which facilitates CI investigative and operational activities, and 4) strategic foreign intelligence analysis which explores relationships between foreign intelligence activities and strategic decision-making. The typology aims to clarify the discipline of CI analysis and inform intelligence transformation by identifying required skills and optimal organizational structures for each analytic type.
Cybersecurity Risk Management Tools and Techniques (1).pptxClintonKelvin
A database containing sensitive information on ongoing criminal investigations is hacked and confidential case details are leaked online. The incident response plan would provide guidelines on immediate actions to contain the breach, secure remaining systems, notify relevant stakeholders, and initiate forensic analysis to identify the source of the attack.
The document discusses the role of information sharing and safeguarding officers within the Office of the Director of National Intelligence (ODNI). These officers organize meetings between intelligence agencies to securely share important information. They communicate new findings and program changes. The officers ensure confidential information is securely protected using new procedures. Meetings follow a pyramid structure, with agency directors making decisions passed down to other employees and eventually the public. Information sharing officers must consider cultural differences to maintain trust when informing diverse audiences. Their role is important to facilitate cooperation between agencies and keep the public informed while protecting classified details.
Role of Sentiment Analysis in CybersecurityRachit Shah
This PPT includes the basic information of Sentiment Analysis & how it is related to Cybersecurity. How we can use Emotional Intelligence in to beef up Cybersecurity.
Personally identifiable information, or PII, refers to any data that could be used to identify a unique individual, such as sensitive details that could result in harm if compromised. PII is divided into sensitive and non-sensitive categories, with sensitive PII defined as information that could cause serious problems if lost, disclosed, or misused. Proper handling of PII is important to prevent identity theft, stalking, or other harms to an individual's privacy and security.
This document summarizes the key points from a presentation on specialized documentary research given by Maria Squarcione on April 17, 2018. It discusses the differences between data, information, and knowledge, and how data becomes information when received and interpreted. It also outlines the process of acquiring information literacy, including recognizing when information is needed, locating and evaluating sources, and using and communicating information ethically. Finally, it discusses some of the core competencies involved in information literacy like problem solving, digital skills, and lifelong learning.
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
The document discusses the current state of threat intelligence and provides recommendations for improvement. It notes that most threat intelligence programs lack proper structure, analysis, and adherence to intelligence tradecraft. Vendors often provide reports without proper sourcing, context, or credibility assessments. The document recommends building intelligence functions from the top down with a focus on people, process, and then technology. Proper analysis, long-term strategic work, and direct access to stakeholders are also emphasized over short-term reporting and technical focus. Adopting intelligence tradecraft standards from agencies like the CIA could help threat intelligence programs mature.
This document discusses implementing security governance in a multinational financial group. It begins by defining governance and information security governance. It then discusses the basic 3 steps to implementing a security governance process: 1) Get to know the various entities personally, 2) Set up communication rules and processes, 3) Define priorities and launch the governance process. Under each step, it provides further details on ways to approach them and tips for success. The overall goal is to turn the initial governance project into an ongoing process.
This document discusses the importance of agriculture and knowledge management in Ethiopia. It notes that agriculture makes up 85% of employment, 45% of GDP, and 90% of exports in Ethiopia. However, 70 million people still face food insecurity. The document defines knowledge and knowledge management, and discusses tacit vs explicit knowledge. It outlines the importance of knowledge management in agriculture for researchers, governments, and farmers. Finally, it discusses organizational knowledge management processes like knowledge creation, storage, transfer and application.
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...inventionjournals
We are now living in the information society and global village of which we are bombarded with huge sums of information which is not all relevant to us. It is therefore imperative to be well equipped with information literacy skills so as to curb the information explosion. Simply being exposed to a great deal of information will not make people informed citizens, they need information literacy skills. Information literacy comes as a ‘medicine’ in curing the information exposition. Information seekers can tackle information explosion by employing strategies such as information literacy education, development of information search skills, library education, user orientation, bibliographic user instruction, information fluency and all other information literacy competencies.
The document outlines how to build an effective cyber intelligence program. It discusses that cyber intelligence involves collecting, analyzing, and interpreting available cyber and internet information. It then describes the intelligence cycle process which includes planning requirements, collection of information, processing raw data, analysis to create finished intelligence reports, and dissemination of reports to leadership. The goal is to provide timely, accurate, usable, complete and relevant intelligence to support organizational decision making.
Information Overload in the Attention EconomyOlivier Serrat
Information has become ubiquitous because producing, manipulating, and disseminating it is now cheap and easy. But might perceptions of information overload have less to do with quantity than with the qualities by which knowledge is presented?
Proactive Crisis Management Through Internal CrowdsourcingMissionMode
Internal crowdsourcing is a relatively new way to use the eyes and ears of your employees to avert a crisis or reduce the impact of a crisis. (It does NOT involve social media.) Learn what it is and some strategies for using it in your organization.
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
This whitepaper discusses how social media monitoring tools can be applied as powerful and cost effective Open Source Intelligence (OSINT) platforms; and how they can support collection and analysis of relevant and targeted information relating to counter-terrorism, criminal and political open sources.
This document discusses the evolution of misinformation and proposes a framework called AMITT (Attribution, Mitigation, Incident and Technique Taxonomy) to analyze misinformation campaigns and incidents. It suggests populating the AMITT framework by cataloging historical misinformation examples. Finally, it notes that further work is needed to develop mitigations and counters, refine techniques, and share intelligence using the framework.
Cyber Threat Intelligence is a process in which information from different sources is collected, then analyzed to identify and detect threats against any environment. The information collected could be evidence-based knowledge that could support the context, mechanism, indicators, or implications about an already existing threat against an environment, and/or the knowledge about an upcoming threat that could potentially affect the environment. Credit: Marlabs Inc
More Related Content
Similar to CIVIL INTELLIGENCE GATHERING AND INFO MANAGEMENT
Speaker at the IDC IT Security Roadshow 2017 in Doha. It was a one day event bringing together some Security Vendors and End User folks to present and discuss security related topics. The event midway was split into two tracks A - Threat Intelligence and B - Securing the Endpoint to the cloud. My End User Presentation (Track A) covered Threat Intelligence. There were some some interesting speakers and audience Q & A discussions followed by a networking lunch to boot. The venue at the Shangri La Hotel in Doha provided a great space and good networking opportunity.
A Counterintelligence Analysis TypologySara Alvarez
This document discusses a proposed typology of counterintelligence (CI) analysis that divides it into four types based on the customers served, targets pursued, and nature of analysis. The four types are: 1) foreign intelligence threat analysis which assesses threats from foreign intelligence activities, 2) counter-counterintelligence analysis which provides advice to help collectors avoid foreign counterintelligence, 3) CI operational and investigative analysis which facilitates CI investigative and operational activities, and 4) strategic foreign intelligence analysis which explores relationships between foreign intelligence activities and strategic decision-making. The typology aims to clarify the discipline of CI analysis and inform intelligence transformation by identifying required skills and optimal organizational structures for each analytic type.
Cybersecurity Risk Management Tools and Techniques (1).pptxClintonKelvin
A database containing sensitive information on ongoing criminal investigations is hacked and confidential case details are leaked online. The incident response plan would provide guidelines on immediate actions to contain the breach, secure remaining systems, notify relevant stakeholders, and initiate forensic analysis to identify the source of the attack.
The document discusses the role of information sharing and safeguarding officers within the Office of the Director of National Intelligence (ODNI). These officers organize meetings between intelligence agencies to securely share important information. They communicate new findings and program changes. The officers ensure confidential information is securely protected using new procedures. Meetings follow a pyramid structure, with agency directors making decisions passed down to other employees and eventually the public. Information sharing officers must consider cultural differences to maintain trust when informing diverse audiences. Their role is important to facilitate cooperation between agencies and keep the public informed while protecting classified details.
Role of Sentiment Analysis in CybersecurityRachit Shah
This PPT includes the basic information of Sentiment Analysis & how it is related to Cybersecurity. How we can use Emotional Intelligence in to beef up Cybersecurity.
Personally identifiable information, or PII, refers to any data that could be used to identify a unique individual, such as sensitive details that could result in harm if compromised. PII is divided into sensitive and non-sensitive categories, with sensitive PII defined as information that could cause serious problems if lost, disclosed, or misused. Proper handling of PII is important to prevent identity theft, stalking, or other harms to an individual's privacy and security.
This document summarizes the key points from a presentation on specialized documentary research given by Maria Squarcione on April 17, 2018. It discusses the differences between data, information, and knowledge, and how data becomes information when received and interpreted. It also outlines the process of acquiring information literacy, including recognizing when information is needed, locating and evaluating sources, and using and communicating information ethically. Finally, it discusses some of the core competencies involved in information literacy like problem solving, digital skills, and lifelong learning.
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
The document discusses the current state of threat intelligence and provides recommendations for improvement. It notes that most threat intelligence programs lack proper structure, analysis, and adherence to intelligence tradecraft. Vendors often provide reports without proper sourcing, context, or credibility assessments. The document recommends building intelligence functions from the top down with a focus on people, process, and then technology. Proper analysis, long-term strategic work, and direct access to stakeholders are also emphasized over short-term reporting and technical focus. Adopting intelligence tradecraft standards from agencies like the CIA could help threat intelligence programs mature.
This document discusses implementing security governance in a multinational financial group. It begins by defining governance and information security governance. It then discusses the basic 3 steps to implementing a security governance process: 1) Get to know the various entities personally, 2) Set up communication rules and processes, 3) Define priorities and launch the governance process. Under each step, it provides further details on ways to approach them and tips for success. The overall goal is to turn the initial governance project into an ongoing process.
This document discusses the importance of agriculture and knowledge management in Ethiopia. It notes that agriculture makes up 85% of employment, 45% of GDP, and 90% of exports in Ethiopia. However, 70 million people still face food insecurity. The document defines knowledge and knowledge management, and discusses tacit vs explicit knowledge. It outlines the importance of knowledge management in agriculture for researchers, governments, and farmers. Finally, it discusses organizational knowledge management processes like knowledge creation, storage, transfer and application.
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...inventionjournals
We are now living in the information society and global village of which we are bombarded with huge sums of information which is not all relevant to us. It is therefore imperative to be well equipped with information literacy skills so as to curb the information explosion. Simply being exposed to a great deal of information will not make people informed citizens, they need information literacy skills. Information literacy comes as a ‘medicine’ in curing the information exposition. Information seekers can tackle information explosion by employing strategies such as information literacy education, development of information search skills, library education, user orientation, bibliographic user instruction, information fluency and all other information literacy competencies.
The document outlines how to build an effective cyber intelligence program. It discusses that cyber intelligence involves collecting, analyzing, and interpreting available cyber and internet information. It then describes the intelligence cycle process which includes planning requirements, collection of information, processing raw data, analysis to create finished intelligence reports, and dissemination of reports to leadership. The goal is to provide timely, accurate, usable, complete and relevant intelligence to support organizational decision making.
Information Overload in the Attention EconomyOlivier Serrat
Information has become ubiquitous because producing, manipulating, and disseminating it is now cheap and easy. But might perceptions of information overload have less to do with quantity than with the qualities by which knowledge is presented?
Proactive Crisis Management Through Internal CrowdsourcingMissionMode
Internal crowdsourcing is a relatively new way to use the eyes and ears of your employees to avert a crisis or reduce the impact of a crisis. (It does NOT involve social media.) Learn what it is and some strategies for using it in your organization.
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
This whitepaper discusses how social media monitoring tools can be applied as powerful and cost effective Open Source Intelligence (OSINT) platforms; and how they can support collection and analysis of relevant and targeted information relating to counter-terrorism, criminal and political open sources.
This document discusses the evolution of misinformation and proposes a framework called AMITT (Attribution, Mitigation, Incident and Technique Taxonomy) to analyze misinformation campaigns and incidents. It suggests populating the AMITT framework by cataloging historical misinformation examples. Finally, it notes that further work is needed to develop mitigations and counters, refine techniques, and share intelligence using the framework.
Cyber Threat Intelligence is a process in which information from different sources is collected, then analyzed to identify and detect threats against any environment. The information collected could be evidence-based knowledge that could support the context, mechanism, indicators, or implications about an already existing threat against an environment, and/or the knowledge about an upcoming threat that could potentially affect the environment. Credit: Marlabs Inc
Similar to CIVIL INTELLIGENCE GATHERING AND INFO MANAGEMENT (20)
1. WAI LECTURE 2
CIVIL INTELLIGENCEGATHERING AND INFORMATION MANAGEMENT
‘THE WAI BRIGADEPERSPECTIVE’, BY CHIEF SUPERINTENDENT OKOLIESEBASTINE. (P.S.OEDUCATION.)ON THE4TH
CAMPING PROGRAMMEOF WAI BRIGADENIGERIA, LAGOS STATECOMMND 2016
INTRODUCTION
Intelligenceis derived from the Latin verb intelligere,whichis to comprehendor perceive.
Intelligencehas generallybeen described by differentScholarsas the abilityto perceive
and/orretain knowledgeor informationandapplyit to itselfor other instancesof
knowledgeor informationcreatingreferableunderstandingmodelsofany size,density or
complexity,due to anyconsciousor subconsciousimposedwill orinstructionto do so.
Intelligenceis mostwidely studiedin humansbuthas equallybeen observed inNon human
animals.
And informationisthatwhich informsi.e. That fromwhich datacan be derived. At its most
fundamental,informationisanypropagationofcauseandeffect withina system.
Informationisconveyed either as the content of a message or throughdirect or indirect
observationofsomething. That which isperceived can be construedas a message inits
own right,and inthat sense, informationisalwaysconveyed asthe content ofa message.
Information canbe encoded into various formsfor transmissionandinterpretation.
Information canbe encoded into signsandtransmittedvia signals.
Information resolvesuncertainty.Theuncertainty of an eventis measured by its probability
of occurrence and is inversely proportionalto that.The moreuncertain an event,the more
information isrequired to resolve uncertainty of thatevent.The conceptthatinformation is
the messagehasdifferentmeaningsin differentcontexts.This,theconceptof information
becomesclosely related to notionsof constraint,communication,control,data form,
instruction,knowledge,meaning,understanding,mentalstimuli,pattern,perception,
representation and entropy. Forany organization to effectively gatherintelligence and
manageitsinformation properly,itmustadoptthe managementskillsin businessand
organization which isthe art thatcoordinatestheeffortsof peopleto accomplish goalsand
objectivesusing availableresourcesefficiently and effectively.
AIM:
The aim of this presentation isto critically look atmethodsof intelligence gathering and
relate it withthe managementof information;asboth intelligenceand information are
related,as oneis a process thatlead to the other.It is alsointendedtoenhance the
applicationof intelligence gatheringabilityof officersof WAIBRIGADEin the performance of
theirdailyactivities.
SCOPE:
This paperwill attemptto cover;
2. Definition of terms;
Sourcesof information gathering;
Principles of information collection;
Meansof intelligence gathering;
Intelligence cycle principle;
Level of intelligence;
Information management;and
Conclusion.
DEFINITION OFTERMS:
INTELLIGENCE
Intelligence hasequally been defined in many differentwaysasa term of ones capacity for
logic, abstractthought,understanding,self – awareness,communication,learning,
emotionalknowledge,memory,planning,creativity and problemsolving.Regardlessof
which aspect of intelligence one hasin mind,product,process,mission or organization,the
bottomline is that good governmentaldecision rely on accurate,complete,unbiased and
timely information aboutthecapabilitiesand intentionsof an enemy or a subversivegroup.
INFORMATION
Information isalso an unevaluated material of every description including thatderived from
observations,reports,rumour,imagery and othersourceswhich when processed may produce
intelligence. So simply put,information isthe raw material while intelligence is the finished
productready foruseby the consumer.
INFORMATIONMANAGEMENT
Information Managementon theotherhand,isthe collation and managementof
information fromoneormore sourcesand distribution of thatinformation to oneormore
audiences.Thissometime involvesthosewho havea stakein ora right to thatinformation.
The Wikipedia free encyclopedia definesit asa corporateresponsibility thatneedsto be
addressed and followed fromtheuppermostseniorlevels of managementto thefrontline
worker.Organization mustbe held and musthold its employeesaccountableto capture,
manage,store,share,preserveand deliverinformation appropriately and responsibly.
MANAGEMENT
Managementmeanstheorganization and controlovertheplanning,structureand
organization,controlling,processing,evaluatingand reporting of information activitiesin
orderto meet clients’ objectivesand to enable cooperatefunctionsin thedelivery of
information.
3. SOURCESOF INFORMATIONGATHERING
Interview;
Surveillance;
Elicitation;
Record examination;
Forensicanalysis;
Arrest and searches;
Agents(informants);
Interrogation;
Investigation/Questioning of suspects;
Issuing of Questionnaires;
Organized communityforums/Town hallmeetings;
Espionage;
Pastrecord analysis;
Media etc.
PRINCIPLESOF IMFORMATION COLLECTION:
Planning;
Exploitation of all sources;
Time;
Relevancy;
Control;
Access;and
Flexibility
MEANS OF INTELLIGENCEGATHERING:
Coverthuman intelligence source,theseare agentswho arenon membersof the
organization;
Directed surveillance which involvesobserving target;
Interception of communication;
4. Intrusivesurveillancei.e. eavesdropping in someoneshome,caretc;
Human intelligence which is derived fromhuman sources,synonymousto espionageand
clandestineactivities; and
Signalintelligence derived fromsignal interception (communication intelligence,electronic
intelligence, foreign instrumentation,signalintelligence(radar) etc.
INTELLIGENCE GATHERING PRINCIPLES: Collection.Analysisand Processing.Production.
Dissemination
LEVELS OFINTELLIGENCE
Intelligences arein variouslevel and theseare;
i. Strategic(National),thisdiscusstheinformation aboutcapabilitiesand intentionsof foreign
countries;
ii. Tactical which is operationalorcombatintelligence, information required by military field
Commanders;and
iii. Counterintelligence, which is aimed at protecting and maintaining thesecrecy of a country’s
intelligence operation.
iv. INFORMATIONMANAGEMENT
Information managementisthecollection and managementof information fromoneor
moresourcesand distribution of that information to oneormore audiences.Thissometimes
involvesthosewho havea stakein or a right to that information.So information
managementisabout;
v. Management;
vi. Storing;
vii. Share;
viii. Preserve;and
ix. Appropriateinformation delivery.
For informationmanagement,wemustensurethat;
The covertsource (agent) who isthe sourceof information isprotected fromexposure.
Indiscriminatedissemination of information orintelligenceshould be adequately guardednot
to unduly endangeran informant/agent/source;
Properrecruitmentprocessshould be adopted to ensurethatthe rightpersonsare recruited
into theorganization;
5. Also,there should bea propervetting of staff already recruited into thesector and where
information managementisinvolved,thepersonsso entrusted to handledocumentshould
be with proven integrity;
The registry departmentorrecord officeshould be staffed with properly vetted personswho
are well trained in documentorrecord handling;
x. The transmission of information should bedoneusing themostappropriatemedium/means;
xi. Information/intelligenceto be disseminated should beclassified (Top Secret,Secret,
Confidential,Restricted);
xii. The principle of need to knowin information managementisvery vital to any organization.
When a restriction order is placed,a staff fromtheonsetknowshis/herlimit to having access
to a document.Theneed to know,takeand retain principle should be adopted;
xiii. The addressing mustbeclear and unambiguous,so thatthedisseminated information does
notget into the wrong hands, which may eitherdestroy it or giveit to a rival organization.
CONCLUSION
In conclusion,itwill be appropriateto state that intelligence gathering is key to any organization, be
it securitybody,business,foreign policy,technology advancement etc when the right intelligence are
obtained ,analyzed and properly utilized to the advantageof thesector,theagency concerned will be
better off in all ramifications. Organization is bound to succeed if the right intelligence are gathered
and utilized for policy formulations. Since information brings about intelligence, the proper
management of such information is equally key and vital. For successful information management,
the right personnel/staff must be charged with the handling of the information or document. If
proper selection of staff is not done, then the sector stand to lose to its competitors, should he
becomean agentforthe opponent? Itisbetter to manageinformation very wellforthe benefitof the
sector you represent. And above all, training and retraining of staff should not be compromised
because knowledge is vital to planning. Every WAI BRIGADE OFFICER is by this training expected to
havea clear perception of how to engagein intelligence gathering asthis is the role you are expected
to play in the re-positioning of this uniformed Para-military organization. You must report
suspicious activity.. Describe specifically what you observed, including:
Who or what you saw;
When you saw it;
Where it occurred; and
Why it's suspicious.
‘’IF YOUSEE SOMETHING ,SAYSOMETHING’’
THANK YOU FOR LISTENING AND ANY QUESTIONS?