Primary Stages Of Intelligence Analysis

Brilliant Essays
Running head: MID-TERM 1 MID-TERM 12

MID-TERM
HOLLIFIELD, VICTOR RAY
INTL431

Question 1
The intelligence process follows clear steps that help the relevant agencies and practitioners to gather the information and data needed to address and understand a particular issue or problem of interest. The process follows different steps where specific actions are taken to ensure that the intended goals are realized (Shi, 2011). The primary stages of intelligence process include
…show more content…
In the analysis phase, an attempt is made to carefully look at the information and determine how well it fits together (Pellissier & Nenzhelele, 2013). The process entails identifying how the information can help the consumer to understand what has happened, the involved parties, what is likely to occur in the future, and how it will affect the country. Accurate and timely intelligence analysis is very critical to the security of a nation and the well-being of its citizens. This argument is based on the fact that accurate intelligence analysis leads to the generation of reports and insights that can protect the nation from security threats and mitigate criminal activities (Pellissier & Nenzhelele, 2013). Therefore, intelligence analysts are always expected to produce timely and accurate data and information that law enforcement departments can use to prevent possible crimes and threats from arising. In this regards, intelligence analysis process is a strategic and critical component of the intelligence process. The consumer can play a role in this stage by letting the analyst know the nature of the information that needs to be presented and the direction, which the analysis should take. In the dissemination step, on the other hand, the consumer uses the information that is provided by the intelligence agencies to come up with final findings and determine the …show more content…
The process entails extracting knowledge from large datasets to identify hidden relationships (Keyvanpour et al., 2011). In most cases, the process involves using artificial intelligence methods to analyze data and determine the relationships between data sets. It is also important to state that data mining focuses on helping analysts to understand the content and meaning of big data. It is usually based on a wide range of processes and methods. Data mining entails extracting, transforming, and loading big data into a central data management and retrieval system (Keyvanpour et al., 2011). The stored data is then managed and analyzed carefully using various tools such as application software to identify the patterns and trends in the data set. In the analyzing process, the goal is to help in gathering information and insights that can be used to solve a puzzle or problem of interest. Once the analyzing is completed, the findings need to be presented in a useful format such as graphs and tables that can be understood by other members of the intelligence community. In addition, the findings can be made accessible to various intelligence agencies and groups in the country to help in managing and mitigating security threats and problems.

Related Documents

  • Improved Essays

    The ability for agencies within the Intelligence Community to share information horizontally through the use of Fusion Centers has proven both effective and beneficial to Americans everywhere. In only the last five years, Fusion Centers have been credited with “preventing, protecting against, and responding to criminal and terrorist threats,” (DHS 2015) all across the country. Although they assist with the counter-terrorism fight, it is important to identify that that is not their primary mission. The primary mission of Fusion Centers is to “receive, analyze, gather, produce, and disseminate a broad array of threat-related information and actionable intelligence to appropriate law enforcement and homeland security agencies” (DHS 2015).…

    • 155 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Study Guide

    • 703 Words
    • 3 Pages

    1) What is BI? Business intelligence, or BI, is an umbrella term that refers to a variety of software applications used to analyze an organization’s raw data. Companies use BI and several related activities, including data mining, online analytical processing, querying and reporting to improve decision making, cut costs, identify new business opportunities and identify inefficient business processes that are ripe for re-engineering. 2) What is Visual Analytics, dashboards, data warehouse, data dictionary, meta data, ETL, schema, attributes, hierarchy, cube, OLAP, “drill down”, data mining, data mapping.…

    • 703 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The goals are integrate intelligence analysis and collection to inform decisions made from the White House to the foxhole, drive responsible and secure information-sharing, set strategic direction and priorities for nation intelligence resources and capabilities, and advance cutting-edge capabilities to provide global intelligence advantage and much more. To this day, the recommendations from the 9/11 commission report have proven to…

    • 2031 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Fusion Centers are information centers that facilitate intelligence sharing between local, state, tribal, territorial, and federal agencies. They are locations that contain equipment and staff who analyze and share intelligence. Fusion centers are usually staffed by local law enforcement and other local government employees as well as Department of Homeland Security personnel. Staffing agreements vary from place to place. Fusion centers enable synchronous information sharing between state, local, tribal, and territorial agencies and the federal intelligence community.…

    • 906 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Department of Homeland Security is an appropriate organizational design for several essential elements which are transferring immigration and naturalization service, border patrol, U.S. customs service, animal and plant health inspection service, U.S. Coastguard, and transportation security administration. The intelligence community mission is to supply the homeland security enterprise with timely intelligence information that is needed to protect, safe, resilient, and secure the United States. Also, national strategy defined homeland security as preventing the United States against terrorist attacks, decrease the America vulnerability to terrorism, reduce damage, and recover from terrorist attacks when it does occur (Burch, 2008). Moreover,…

    • 619 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This arrest of Raul Gutierrez is a successful example of intelligence sharing among different countries. In this case Colombia, Spain, and the United States worked together to combat a terrorist threat. Terrorism and cybercrimes are worldwide threats that affect many nations and businesses. Intelligence sharing between government and even businesses can have huge benefits in combating against sector threats and allowing for demolishment of these threats. If communities share openly in their sectors, threat actors may have a harder time breaching companies because of defense mechanisms put in place from shared intelligence and therefore current threat plots are more likely to fail.…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    USA Patriot Act Analysis

    • 1281 Words
    • 6 Pages

    Prior to the enactment of the Patriot Act, law enforcement and intelligence agencies immensely lacked the ability to share information. The effectiveness, improvement and development among the intelligence operations was initiated when all aspects of government were synchronized, positively impacting the scope and quality of our national security, leading to endless possibilities. The USA Patriot Act of 2001, significantly changed the fundamental framework for the federal law enforcement, which was immediately passed following the aftermath of the September terrorism attacks. Expanding security level consequentially elevated a questionable defensive behavior in efforts to protect the nations civil liberties.…

    • 1281 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The use of the intelligence method is prominent with the AFP through collecting information and data to produce intelligence. The AFP also employs the use of both strategic and Tactical intelligence in their practices, theoretically being that strategic intelligence uses long-term initiatives, strategies on emerging problems and structures of serious organised crime while tactical intelligence focuses on short-term initiatives, looking closely at criminal groups and activities (Buckley 2013). A practical example is the Specialist Response group that provides tactical strategies through intelligence operational priorities for a diverse range of AFP operations and building missions (AFP 2016). A difference identified through analysing the AFPS initiatives compared to the academic intelligence methods is the AFP’s use of public relations through educating the public with critical matters and receiving information from the public to improve statistics and crime prevention techniques. This is initiated through the AFPs virtual global taskforce for cyber crime, focusing on informing the public on risks and preventative actions (AFP Corporate Plan 2015-2019).…

    • 1017 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    FBI Role In The US

    • 1788 Words
    • 8 Pages

    The Information Assurance mission confronts the challenge of preventing foreign enemies from gaining access to sensitive: national security information. The Signals Intelligence mission collects, processes, and disseminates intelligence information for intelligence and counterintelligence purposes and to support military operations. The overall mission of the NSA and the CSS “leads the U.S. Government in cryptology that encompasses both Signals Intelligence and Information Assurance products and services, and enables Computer Network Operations in order to gain a decision…

    • 1788 Words
    • 8 Pages
    Great Essays
  • Great Essays

    After the dramatic and horrible acts committed on September 11, 2001, the world was in shock. The magnitude of the terrorist attacks were nothing to be overlooked. The United States knew they had to find a way to keep the people calm and in a safe place. Forty-five days after the terrorist attacks on the nation, Congress passed the USA PATRIOT Act, acronym for the “ Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism” Act. The acts primitive intentions wants to find and prosecute any terrorist suspect in any corner of the nation.…

    • 1328 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    This essay will address the National Intelligence Estimate (NIE). First I will discuss the process of producing and NIE which will identify key shortcomings that will be addressed in detail. This key shortcomings will help explain why the NIE is an imperfect process with an imperfect product. The National Intelligence Estimates (NIE) is designed to provide officials such as our senior civilian and military policymakers with more in-depth information on some international topic of interest and likely course of future events (Johnson, p. 333).…

    • 1046 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Intelligence Community is responsible for analyzing mass amounts of information mainly for the safety of citizens. With that, there has to be an overall process for how these steps are carried out. The information that the intelligence community brings in is important to the security of our nation and they must follow the correct process to make sure it is being carried out properly. The seven phases of the intelligence process are (1) identifying requirements, (2) collection, (3) processing and exploitation, (4) analysis and production, (5) dissemination, (6) consumption and (7) feedback (Lowenthal, 2015, p. 70). The Intelligence Community must follow these seven phases to ensure safety for our nation and our allies.…

    • 1253 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    (1) In your own words, define, then compare and contrast the different theories of intelligence that are presented in the textbook, including Spearman 's G Factor, Gardner 's Multiple Intelligences, Sternberg 's Triarchic Theory and the concept of Emotional Intelligence. Sternberg proposed that there consist three types of intelligence: analytical, creative and practical. Analytic intelligence consists of problem-solving; creative intelligence deals with new ideas, new ways of problem-solving and processing certain aspects of information; practical intelligence, in other words, "street smarts," involves the ways people get through life. In general, these three types of intelligence work systematically to solve problems.…

    • 724 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Data Mining Essay

    • 798 Words
    • 4 Pages

    The topic that I am interested in is Data Mining. This is interesting to me because it can help in various areas of society. This includes the medical field, elderly care, and commerce. This is controversial because of the amount and type of personal data that is being collected. We are living in the “Big Data” era where there are many ways to collect data.…

    • 798 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The United States currently faces many challenges, including a very widespread lack of confidence in its ability to carry out its many missions competently as well as legally. Counterintelligence (CI) is one of the most vital arenas within the United States Intelligence Community (IC), and is aimed at achieving the main goal of protecting the country, both from insider threats and foreign intruders. It is our nation’s shield and sword. While many improvements to this vital system have been made or need to be made, many issues still remain as no system will ever be perfect.…

    • 845 Words
    • 4 Pages
    Improved Essays