- Intelligence Management - The basics - Lesson 1
Intelligence Management - The basics
Let's keep this simple:
- We collect information.
- We process that information and create intelligence.
- This process will create different types of intelligence product.
- We use these intelligence products in support our the agency's mandate.
Information can be collected in many different ways for example: open source, human sources (confidential informants), crime stoppers, surveillance, intercepting communications (wire taps) and listening devices.
When collected the information should always be submitted to a central intelligence unit, within the agency, where properly trained intelligence staff can process it. The processing will include evaluation of the information, including both the provenance and the content, and the integration with existing intelligence.
As a result of this processing the intelligence staff create intelligence products, for example: intelligence reports, threat assessments, risk assessments, problem profiles, social network analysis etc.
Every entity (a person place or thing) contained in an intelligence product is given a unique reference number that identifies it from every other person place and thing. These numbers stay with the entity for as long as the intelligence is retained.
The intelligence products are all stored in an intelligence repository, a centralised database where staff with predefined access can view the content at any time.
The central intelligence unit disseminates relevant intelligence products to identified customers.
Customers use those products to further their objectives and send the results back to the central intelligence unit along with any other information they have obtained.
For a comprehensive explanation of this see our publication: Managing Intelligence: A Guide for Law Enforcement Professionals