Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

SAITO SECURIY ACADEMY

MASTER OF LAW ENFORCEMENT

ASSIGNMENT 2

SUBJECT : INTELLIGENCE-LED POLICING

SUBJECT CODE : LE 7164

INSTRUCTIONS TO CANDIDATES:
a) All answers must be written clearly in ENGLISH.
b) A Minimum word count of 3000 and a Maximum of 3500 excluding references in the written report is a
REQUIREMENT.
c) Reports must use Times New Roman font, size 12; single space format is required
d) Submissions which require pre-recorded digital audio and video format by the group/individual must be
submitted together with the report in the MS Teams.
e) All submissions must be in submitted in the MS Teams
f) Plagiarism is strictly Prohibited and should be below 30%
g) List your references separately in an APPENDIX page using the APA format.
h) Written answers/essay/report must be submitted together with the Rubrics for marking as the final page.

Table of Content

s
PROCESS OF INTELLIGENCE ANALYST.........................................................................................3
Introduction.........................................................................................................................................3
Planning and Direction.......................................................................................................................3
Collection..............................................................................................................................................3
LE 7164 INTELLIGENCE-LED POLICING

Processing.............................................................................................................................................4
Analysis and Evaluation.....................................................................................................................5
Integration............................................................................................................................................5
Analysis and Production.....................................................................................................................6
Dissemination.......................................................................................................................................6
Feedback...............................................................................................................................................7
Reevaluation and Revision.................................................................................................................8
Conclusions..............................................................................................................................................8
References..............................................................................................................................................10

___________________________________________________________________________

Question No. 2 (30 Marks)


The intelligence cycle is the tool use by Intelligence Analyst to process raw information into
intelligence. Describe in detail the various stages with example how the intelligence cycle
produced intelligence and made available to end-users.

__________________________________________________________________________________

2
LE 7164 INTELLIGENCE-LED POLICING

PROCESS OF INTELLIGENCE ANALYST

Introduction
Intelligence analysis is a skilled and disciplined procedure that turns data that is
unreliable into useful intelligence. Intelligence analysts use the intelligence cycle, a
disciplined framework, to carry out this activity successfully. The intelligence cycle is
divided into phases that direct the gathering, handling, analyzing, and sharing of data to assist
decision-makers, law enforcement officials, military personnel, and other applicable entities.
In this thorough investigation, we will examine each stage of the intelligence cycle and use
examples to show how it generates intelligence and makes it accessible to end the public.

Planning and Direction


The fundamental step where intelligence agencies and organizations cautiously
planned their operations is the planning and direction phase of the intelligence cycle. At this
crucial point in time, a number of critical actions are taken to guarantee that ensuing
intelligence operations are successful and in line with overarching objectives. First,
intelligence agencies carefully spell out their goals, which are linked to their duties and
mission. These goals act as the North Star for the whole intelligence cycle, making certain
that every piece of information gathered has an independent objective and is relevant.

Second, agencies decide which of their intelligence needs are most important. They
wisely manage their attention and resources because they are aware that not all risks or
objectives are equally important or urgent. As a case study, in the framework of
counterterrorism, an intelligence agency might give priority to eliminating a particular
terrorist group because of the immediate threat it represents. This classification enables a
focused approach to solving the most serious issues.

Last but not least, agencies make crucial choices about resource allocation during the
planning and direction phase. In order to support efforts at intelligence collection and
analysis, it is important to priorities citizens, technology, finance, and other resources. The
attribution procedure makes sure that authorities have the resources and ability to
successfully pursue their stated goals. To further the broader objective of preventing the
danger, resources can be devoted, for instance, to tracking the operations of the targeted
terrorist group, evaluating its capabilities, and obtaining intelligence on the group's
leadership.

The planning and directing step, in short, establishes the framework for the entire
intelligence cycle. It makes sure that intelligence agencies function with an unmistakable
sense of purpose, priorities their work based on the importance of the danger, and tactically
assign resources to deal with the most serious problems. By taking part in these fundamental
duties, intelligence agencies improve their capacity to gather, examine, and distribute relevant
information that eventually improves the community and national security.

It lays the groundwork for the entire cycle, ensuring that intelligence efforts are
targeted, well-coordinated, and ethically sound. Ultimately, this phase leads to the
transformation of collected data into valuable intelligence for decision-makers.

Collection
A crucial stage of the intelligence cycle is collection, which focuses on obtaining

3
LE 7164 INTELLIGENCE-LED POLICING

unprocessed data from many sources in order to later turn it into usable intelligence. To
gather a comprehensive dataset at this point, intelligence agencies use a variety of techniques
and tools, including physical informants, technical surveillance, open-source data, and secret
operations.
In addition to firsthand accounts from informants, intercepted electronic
communications like phone conversations, publicly accessible information gleaned from
sources like social media and news articles, and intelligence gathered through covert
operations are just a few of the diverse sources of raw data that go into creating a
comprehensive dataset.

The remaining stages of the intelligence cycle are dependent on this dataset, which
enables analysts to extract useful and actionable intelligence that guides decision-makers and
strategy planners. As an illustration of the kind of raw data gathered, consider intercepted
communications between alleged terrorists or criminals received through signals intelligence
(SIGINT).

Other frequently used sources include public documents, social media monitoring,
and satellite photography. The quality and scope of the information gathered at this phase are
crucial because they serve as the basis for later processing, analysis, and distribution of
intelligence to end users for strategic planning and informed decision-making.

Processing
In the intelligence cycle, the processing phase covers the gap between the obtaining of
unprocessed data and the production of intelligence that may be used. During this stage,
massive amounts of gathered data are transformed into a more consumable and realistic
format so that it may be used for further analysis and availability. When intelligence
organizations intercept communications pertaining to a prospective criminal organization, it
serves as an example of the processing stage in the intelligence cycle.

These intercepted messages are frequently purposefully disguised to safeguard the


information they contain. To avoid unauthorized access, they may be communicated in
several of different foreign languages and encrypted. During the processing stage, language
professionals are crucial in helping to overcome these obstacles. They can interpret messages
into the agency's local language thanks to their proficiency in other languages. Since it
reveals any hidden signals that might contain important information, this translation
procedure is essential for comprehending the substance of the intercepted communications.

Decryption techniques are also used to disclose messages' concealed information.


Criminal organizations and enemies often use encoding to shield their communications from
monitoring and analysis. These encrypted signals are processed by cryptography
professionals who decrypt them into understandable text. The process of decryption helps to
reveal the communication's real meaning and intent.

For instance, analysts might discover information about planned unlawful conduct,
the identities of influential members of the criminal enterprise, or perceptions into the
workings of the enterprise. The successful processing of raw data into an understandable and
practical format is an essential requirement for the efficient analysis of these interactions for
such significant knowledge.

The transformation of intercepted conversations or other types of raw material into

4
LE 7164 INTELLIGENCE-LED POLICING

usable intelligence ultimately depends on the processing stage. Then, this information can be
shared with the appropriate law enforcement or national security organizations, supporting
their efforts to deter criminal activity, safeguard national security interests, and uphold public
safety. In order to ensure that important information is used to support efficient decision-
making and operational actions, the processing stage is therefore an important component in
the intelligence cycle.

Analysis and Evaluation


A crucial stage of the intelligence cycle, analysis and evaluation involves professional
analysts carefully examining the collected substance. In the intelligence cycle, analysts' goal
is to spot key data trends, patterns, mistakes, and potential dangers. Analysts keeping an eye
on network traffic, for examples, they may detect an unexpected rise in data requests coming
from a specific IP address in the context of cybersecurity.

Further research and protective measures are warranted in consideration of the


possibility that this pattern points to a cyberattack or an attempt to exploit a system
vulnerability. Similar to this, experts in the field of financial intelligence may notice strange
transactions or an abrupt increase in the transfer of money from one account to another.

It could possibly be pointing to money laundering or other illegal financial activities


that demand quick attention from regulatory authorities. These examples demonstrate the
critical role analysts play in identifying and addressing data abnormalities and potential
threats across multiple domains.

In this phase, analysts turn the processed data into useful information by deriving
insightful conclusions that are then communicated to planners and decision-makers to help
them formulate strategic responses and policy decisions.

Analysts might, for instance, look at intercepted communications from a known


terrorist organization and see a pattern of discussions about a particular target or a potential
attack. They obtain the conclusion that a certain area or a particular institution is under
increased threat as a result of this study.

In order to effectively counter the immediate threat and protect the country's security
interests, national security policymakers and military commanders are informed of this
crucial intelligence. They can then use it to modify deployment plans, tighten security, and
allocate resources.

Integration
The Integration phase within the intelligence cycle serves the objective of
amalgamating information obtained from diverse sources to yield a comprehensive and
cohesive understanding of a given situation or threat. In a real-world scenario, intelligence
agencies might be faced with the difficult task of comprehending and preventing the
operations of a highly developed criminal organization.

They use multiple methods for data collecting, including human informants, satellite
photos, and intercepted conversations, to accomplish this. Human informants working for or
near the organization may be able to offer important information about its internal dynamics,
organizational structures, and tactical plans. Smuggling routes, drug labs, and hiding places

5
LE 7164 INTELLIGENCE-LED POLICING

can all be seen in real time using satellite images.

In addition, intercepted communications, such as phone calls, encrypted messages, or


internet chat logs, offer vital real-time information about the organization's strategies,
intentions, and potential dangers.

By combining these various sources of data, intelligence analysts can develop a


thorough and various picture of the criminal organization's operations, revealing connections
between important individuals, spotting operational weaknesses, and gauging the overall
threat. This thorough understanding lays the groundwork for decision-makers and law
enforcement agencies to develop strategies that are targeted and effective in disrupting and
dismantling the criminal network, ultimately enhancing public safety and national security.

Analysis and Production


The intelligence cycle's analysis and production phase is concerned with turning
unprocessed data and knowledge into useful intelligence. The main goal of the analysis and
production phase of the intelligence cycle is to act as a conduit for the transformation of
unprocessed data and information into actionable intelligence products that provide decision-
makers with insightful data, wise conclusions, and useful recommendations.

It stands for the crucial point at which the huge amount of information gathered and
carefully analyzed results in the compilation of intelligence reports, briefings, or assessments
that correspond to the particular needs and goals of policymakers, military commanders, and
other parties. These products reduce intelligence's depth into solid stories that highlight new
dangers, patterns, weaknesses, or possibilities.

For instance, in the context of national security, an intelligence report may offer
comprehensive information into the operational capabilities, objectives, and prospective
targets of a terrorist organization. Additionally, it would go beyond simply analyzing data to
provide recommendations that can be put into practice, such as military or law enforcement
tactics, empowering decision-makers to create educated policies and plans in response to
changing situations.

In the end, the analysis and production phase is essential in closing the information-
decisions gap and ensuring that intelligence is a foundation for well-informed actions that
protect national interests and security. The intelligence analysts might create a thorough
report outlining their conclusions on the prospective targets, capabilities, and goals of a
terrorist organization. This report would explain the threat clearly and include suggestions for
military or law enforcement measures to successfully counter the threat.

By ensuring that intelligence is presented in a way that supports strategic planning


and solutions to a range of security and policy concerns, this phase essentially serves as the
vital link between data collection and informed decision-making.

Dissemination
The Dissemination phase serves as an important connection between the detailed
examination and the relevant judgements in the detailed arrangement of the intelligence
cycle. The results of data gathering, processing, and analysis are now realized as intelligence
products, such as thorough reports, succinct briefings, or in-depth evaluations, which are
subsequently made available to authorized end-users.

6
LE 7164 INTELLIGENCE-LED POLICING

These end-users can include a variety of all parties involved, from military
organizations and law enforcement agencies to senior decision- and policy-makers. Consider
an intelligence report on a terrorist organization's capabilities, goals, and probable targets in
the context of national security.

This report acts as an essential informational channel, ensuring that persons and
agencies responsible for maintaining national security are equipped with necessary
knowledge. They get an in-depth knowledge of the changing threat picture, enable them to
decide wisely about counterterrorism tactics, the use of resources, and the creation of
policies.

In essence, the process of distribution is where intelligence moves beyond data and
analysis to become practical knowledge that supports those responsible for maintaining
national security. It serves as an example of the critical role intelligence plays in developing
practical solutions and preventative actions in dealing with of multiple security and policy
concerns.

Strategic planning and well-informed decision-making depend on timely


communication of important intelligence, which also forms the basis for resolving a wide
range of complex security and policy issues.

It gives law enforcement organizations the information they require to prevent rising
dangers, gives decision-makers the information they need to make wise choices, and gives
military units the understanding they need to carry out their duties successfully.

The Dissemination phase, which is essential to ongoing efforts to safeguard and


advance national interests in a constantly changing world, essentially represents the
fundamental idea that intelligence is only valuable to the extent that it is accessible to those
who control it.

Feedback
The feedback phase of the intelligence cycle is crucial for gathering end-user
feedback on the usefulness and accuracy of the intelligence that has been delivered. This
input is crucial for developing and improving upcoming intelligence operations. The
intelligence cycle's Feedback phase is critical to the ongoing development of intelligence
activities. The efficacy of intelligence in assisting law enforcement agencies to apprehend
suspects or prevent illegal activity is carefully studied in this dynamic interaction between
intelligence agencies and end-users.

Think about a situation when intelligence information resulted in the capture of a


well-known criminal suspect. Law enforcement agencies may comment on the crucial part
that intelligence played in the operation's success by highlighting the particular facts or
insights that helped find and detain the suspect.

Furthermore, they may put insight into situations where the intelligence could have
been more accurate or timely, helping to illuminate its shortcomings and possible growth
opportunities. In addition to highlighting the practical value of intelligence, this iterative
feedback process also serves as a catalyst for streamlining procedures, improving data

7
LE 7164 INTELLIGENCE-LED POLICING

collection techniques, and fine-tuning analytical strategies to make sure that upcoming
intelligence efforts are more efficient and responsive to the changing needs of security and
law enforcement personnel.

In the end, it focuses on how the intelligence cycle is continually changing and
adapting and how lessons learnt from past achievements and obstacles fuel continued
innovation in the field of intelligence. This iterative feedback process makes sure that
intelligence agencies continuously modify and enhance their procedures, which ultimately
results in more efficient and flexible intelligence capabilities.

Reevaluation and Revision


In order to modify to evolving circumstances and improve intelligence processes, the
Reevaluation and Revision phase of the intelligence cycle is extremely important. The
feedback from end users and a dynamic reaction to shifting objectives and threats are what
motivate this phase.

The intelligence cycle's Reevaluation and Revision phase shows its flexibility and
response to changing needs. Feedback from end-users that reveals gaps in the predictive skills
of the intelligence, particularly in predicting specific risks, serves as a stimulus for a thorough
reevaluation of the planning and gathering phases.

To better foresee and handle new difficulties, this process goes deeply into improving
procedures, data collecting strategies, and analytical frameworks. Intelligence agencies
demonstrate their dedication to staying ahead of constantly evolving threats and priorities by
actively and methodically going back to these crucial stages. This not only shows that they
recognize the value of learning from past mistakes.

This commitment reflects the dynamic nature of the intelligence cycle, where lessons
learned through feedback drive continual improvement, ensuring that intelligence activities
remain successful, flexible, and in line with the primary objective of defending national
security and interests.

The Reevaluation and Revision phase launches adjustments to strengthen early


warning systems and ensure the ongoing effectiveness and alignment of intelligence activities
with the constantly changing landscape of security and policy concerns in response to
feedback revealing intelligence shortcomings. Intelligence agencies reinforce their dedication
to agility and responsiveness in the face of growing problems by actively correcting
acknowledged flaws and limitations.

This stage emphasizes the dynamic and forward-looking nature of the intelligence
cycle, where lessons learned drive proactive measures to improve the effectiveness and
importance of intelligence efforts in defending national security and interests. It is based on a
commitment to continuous improvement.

Conclusions
In conclusion, the intelligence cycle is a carefully planned and controlled process
created to convert unprocessed data into usable intelligence, acting as an essential component
for enlightened decision-making and the maintenance of national security. Each stage of this
cycle plays a crucial part in reaching these important goals. By creating specific goals,

8
LE 7164 INTELLIGENCE-LED POLICING

ranking activities, and allocating resources, the planning and direction process creates the
strategic foundation for intelligence operations and offers a framework for what comes next.
A rich dataset including intercepted communications, satellite imagery, and open-source
information is essential for creating comprehensive and pertinent intelligence. The collection
phase involves the acquisition of raw data from various sources, forming the fundamental
basis for intelligence analysis. Processing acts as a link connecting raw data and actionable
intelligence, overcoming linguistic and encryption challenges with the help of linguists and
cryptography experts to make intercepted data accessible for analysis.

The core of the intelligence cycle is analysis and evaluation, where analysts examine
data to identify developments, patterns, and possible risks. This provides decision-makers
with the knowledge they need to develop plans and objectives based on a thorough
understanding of the current situation. Integrating data from many sources to create a
comprehensive and thorough picture of particular dangers or scenarios enables law
enforcement organizations and policymakers to develop focused and effective solutions. The
analysis and production phase contributes to bridging the gap between data analysis and
useful intelligence by providing decision-makers with insightful analysis and counsel that
enables them to effectively counter new threats. In order to assist strategic planning and well-
informed decision-making across a range of security and policy sectors, dissemination makes
sure that intelligence reaches authorized end-users, including law enforcement agencies,
military units, and regulators.

Feedback is a crucial component because it enables end users to offer insightful


comments on the reliability and usefulness of intelligence products, starting off an iterative
process that improves intelligence operations and responsiveness to changing needs. The
adaptability of the intelligence cycle is supported by reevaluation and revision in response to
feedback and changing threats. This determination to constant advancement ensures that
intelligence operations continue to be efficient, adaptable, and in line with the overarching
objective of preserving national security and interests.

The intelligence cycle is an excellent illustration of an adaptive and dynamic structure


that prioritizes ongoing improvement while fulfilling the vital tasks of maintaining society
security and enforcing the rules of justice. It is a monument to the unshakable dedication as
well as competence of intelligence specialists who work nonstop to defend their countries and
uphold the values of equity and security.

9
LE 7164 INTELLIGENCE-LED POLICING

References:
The Intelligence Production Cycle | Iowa Department of Public Safety. (n.d.).

https://dps.iowa.gov/divisions/intelligence/intel-cycle

Johnson, L. K. (1986). Making the intelligence “Cycle” work. International Journal of

Intelligence and Counterintelligence, 1(4), 1–23.

https://doi.org/10.1080/08850608608435033

Criminal Intelligence: Manual for Analysts - United Nations Office On ...,


www.unodc.org/documents/organized-crime/Law-Enforcement/Criminal_Intelligence_
for_Analysts.pdf. Accessed 5 Oct. 2023.

The Intelligence Cycle.


https://www.scirp.org/pdf/ojps_2017122815101250.pdf

Evans, J., & Kebbell, M. R. (2012). The effective analyst: a study of what makes an effective

crime and intelligence analyst. Policing & Society, 22(2), 204–219.

https://doi.org/10.1080/10439463.2011.605130

HeinOnline. (2021, March 8). About | HeinOnline. https://heinonline.org/HOL/LandingPage?

handle=hein.journals/polic19&div=29&id=&page=

Ratcliffe, J. H. (2002). Intelligence-led policing and the problems of turning rhetoric into

practice. Policing & Society, 12(1), 53–66.

https://doi.org/10.1080/10439460290006673

Keay, S. (2022). Different kinds of analyst. In Springer eBooks (pp. 13–20).

https://doi.org/10.1007/978-3-030-94364-6_2

Bartes, F. (2013). Five-phase model of the intelligence cycle of Competitive Intelligence.

Acta Universitatis Agriculturae Et Silviculturae Mendelianae Brunensis, 61(2), 283–

288. https://doi.org/10.11118/actaun201361020283

10
LE 7164 INTELLIGENCE-LED POLICING

Dimension 0 1 2 3 4 5 WEIGHTING SCORE

Focus/ The essay Essay and Essay and Essay and Essay and The essay 1.0
Organization of and presentation presentatio Presentation presentatio and
the presentation is poorly n is is prepared n is presentati
slides/report/essay is prepared, somewhat to basic acceptable on is very
and compliance to unacceptable Organizatio outlined. standards. and well
the instruction with no n poorly The Organizatio organized organized,
organization done organizatio n is present. in a and points
at all on the Minimal n is Minimal presentable are
main ideas. compliance unclear. compliance with good focused
No or to Some to logic flow well. All
minimal instruction compliance instruction of. Full instruction
compliance to shown. compliance s are fully
to instructions shown. complied
instructions with.
Elaboration on the No Elaboration Elaboration Elaboration Elaboratio Thorough 2.0
main points elaboration s unclear s done but s done in ns shown and
of main and poorly somewhat normal with complete
areas. enumerated, in a manner, minimal elaboratio
with some disarray with some mistakes ns on all
main points with thought put and gaps. relevant
missed. repetition in. Main Main main
of prior points points points
knowledge covered covered covered.
well and No gaps at
relevant all found
areas 3
covered
Mechanics Numerous No Some Synthesis Synthesis Synthesis 3.0
minor and synthesis synthesis done, some is objective is very
major errors done, some done, but objectivity but objective
in the supporting incomplete shown with no/inadequ and
Synthesis/no data and not minimal ate supported
synthesis presented covering all acceptable supporting by
done and/or only some matters, standard of evidence evidence.
data is not weak facts with some evidence shown. Discussio
correspondin applied and evidence to and some Discussion n is in
g with the little support depth s lack depth
data discussion depth.
referenced.

Total Weighting x Dimension = Total Score

11

You might also like