SlideShare a Scribd company logo
1 of 14
Information Gathering  in Intelligence Agencies   Norazlinda Binte Abdul Rahim  [email_address] “ THE REASON THE ENLIGHTENED PRINCE AND THE WISE GENERAL CONQUER THE ENEMY. . .AND THEIR ACHIEVEMENTS SURPASS THOSE OF ORDINARY MEN IS FOREKNOWLEDGE. FOREKNOWLEDGE. . .MUST BE OBTAINED FROM MEN WHO KNOW THE ENEMY SITUATION.” Sun Tzu, The Art of War 500 BC
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction to Information Science in Intelligence Agencies   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Information & Intelligence   ,[object Object],[object Object],[object Object],[object Object]
Definition of Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition of Intelligence   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences Between Intelligence & Information ,[object Object],[object Object],[object Object],[object Object]
The Intelligence Cycle   Figure 1.  The Intelligence Cycle (Central Intelligence Agency, 2007)  includes the identifying of relevant data or threats to enable the delivery of the intelligence end product to the policy makers  collecting raw and unassessed information from variety of sources   information is then converted into a form instrumental to the intelligence analysts.  raw information is assessed by analysts. Analysts combine fragments of information from different sources into intelligible reports.  distribution of the end-product to the policymakers marks the attainment of the finished intelligence
Information Gathering from Sources   Table 4  Intelligence Production Resources
Finished Intelligence   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object]
Recommendations ,[object Object],[object Object],[object Object],[object Object]
[object Object]

More Related Content

What's hot

Criminal investigation manual
Criminal investigation manualCriminal investigation manual
Criminal investigation manual
Lord Gonzaga
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organization
Kethgay Otanio
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 

What's hot (20)

Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Criminal investigation manual
Criminal investigation manualCriminal investigation manual
Criminal investigation manual
 
Close protection
Close protectionClose protection
Close protection
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organization
 
Espionage
EspionageEspionage
Espionage
 
Intelligence Analysis & Deliverables
Intelligence Analysis & DeliverablesIntelligence Analysis & Deliverables
Intelligence Analysis & Deliverables
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
Indian intelligence bureau
Indian intelligence bureauIndian intelligence bureau
Indian intelligence bureau
 

Viewers also liked

Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security Module
Dario Ciro Vietri
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
IntelCollab.com
 
Security training module
Security training moduleSecurity training module
Security training module
pagare_c
 

Viewers also liked (8)

Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security Module
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
 
Security training module
Security training moduleSecurity training module
Security training module
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

Similar to Information Gathering in Intelligence Agencies

ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011
Robert J. Breitenbach
 
4.1IntroductionThe intelligence community is the predictive .docx
4.1IntroductionThe intelligence community is the predictive .docx4.1IntroductionThe intelligence community is the predictive .docx
4.1IntroductionThe intelligence community is the predictive .docx
troutmanboris
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligence
IT2Alcorn
 
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
oswald1horne84988
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
loganta
 
Trends And Aspects Of Policing Models
Trends And Aspects Of Policing ModelsTrends And Aspects Of Policing Models
Trends And Aspects Of Policing Models
Tiffany Surratt
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docx
nettletondevon
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
philipnelson29183
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
melbruce90096
 
Chapter4 brunt
Chapter4 bruntChapter4 brunt
Chapter4 brunt
okeee
 

Similar to Information Gathering in Intelligence Agencies (20)

Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysis
 
ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011
 
4.1IntroductionThe intelligence community is the predictive .docx
4.1IntroductionThe intelligence community is the predictive .docx4.1IntroductionThe intelligence community is the predictive .docx
4.1IntroductionThe intelligence community is the predictive .docx
 
Intelligence Analysis
Intelligence AnalysisIntelligence Analysis
Intelligence Analysis
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
LIS 60030 Final Project
LIS 60030 Final ProjectLIS 60030 Final Project
LIS 60030 Final Project
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligence
 
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
 
Trends And Aspects Of Policing Models
Trends And Aspects Of Policing ModelsTrends And Aspects Of Policing Models
Trends And Aspects Of Policing Models
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docx
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
ABI White Paper
ABI White PaperABI White Paper
ABI White Paper
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Chapter4 brunt
Chapter4 bruntChapter4 brunt
Chapter4 brunt
 
The Intelligence Community
The Intelligence CommunityThe Intelligence Community
The Intelligence Community
 
Uddin
UddinUddin
Uddin
 
G0953643
G0953643G0953643
G0953643
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Information Gathering in Intelligence Agencies

  • 1. Information Gathering in Intelligence Agencies Norazlinda Binte Abdul Rahim [email_address] “ THE REASON THE ENLIGHTENED PRINCE AND THE WISE GENERAL CONQUER THE ENEMY. . .AND THEIR ACHIEVEMENTS SURPASS THOSE OF ORDINARY MEN IS FOREKNOWLEDGE. FOREKNOWLEDGE. . .MUST BE OBTAINED FROM MEN WHO KNOW THE ENEMY SITUATION.” Sun Tzu, The Art of War 500 BC
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. The Intelligence Cycle Figure 1. The Intelligence Cycle (Central Intelligence Agency, 2007) includes the identifying of relevant data or threats to enable the delivery of the intelligence end product to the policy makers collecting raw and unassessed information from variety of sources information is then converted into a form instrumental to the intelligence analysts. raw information is assessed by analysts. Analysts combine fragments of information from different sources into intelligible reports. distribution of the end-product to the policymakers marks the attainment of the finished intelligence
  • 9. Information Gathering from Sources Table 4 Intelligence Production Resources
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.