The individuals who are in charge of the intelligence departments are the ones who designated what type of intelligence their subordinates will be researching. These individuals play a big role in the intelligence process because they are the decision makers and brief the findings of the collection process. This is the first step in the Intelligence cycle.
The collection process begin as soon as the target of the intelligence has …show more content…
These individuals have a very unique mission where they have to translate the collected intelligence in order to be analyze by the individuals on the next phase. All the collected evidence must be translated or evaluated exactly the way it is, in order to preserve the authenticity and effectiveness of the intelligence
The analysis phase is a very critical phase, because individuals who are assigned to conduct this task have to carefully identify and validate intelligence that could be utilize to identify terrorist groups operating in the area and possible targets, in order to mitigate future terrorist attacks in the area. Thanks to these information several millions of lives and dollars had been save. This phase must be monitor closely in order to avoid overlooking important information.
The dissemination process is where everything comes together, this phase is also critical, because the individuals who are in charge to disseminate information needs to make a decision on what and how to report to the public, classification of the intelligence such as warnings or immediate threats in order to avoid mass panic from the community. Emergency managers must disseminate information as soon as they get it with Law Enforcement, Emergency workers and community; however, they must do everything possible to keep the community …show more content…
These issues had cost innocent lives and millions of dollars to the US. The terrorist attacks of September 11, 2001 are the perfect example of how the lack of sharing of information between the F.B.I and C.I.A, assisted terrorist in accomplishing their mission. There had been some changes since those attacks; however, due to the mass flow of intelligence being collected it’s almost impossible to validate the intelligence, and by the time the intelligence is validated and shared with other agencies, the intelligence is ineffective or the terrorist attack had already