Intelligence management index

Intelligence collection, development and dissemination

1 Collection

1.1 Tasked information

1.2 Intelligence collection plans

1.3 Open sources

1.4 Closed sources

1.4.1 Prison intelligence

2 Development

3 Dissemination

3.1 Organised crime group mapping

Governance

1 Intelligence structure

1.1 Intelligence units

1.2 Intelligence systems

2 Tasking and coordination

2.1 Strategic tasking and coordination

2.1.1 Strategic tasking and coordination group

2.1.2 Control strategy

2.1.3 Strategic intelligence requirement

2.1.4 Tactical intelligence requirement

2.2 Tactical tasking and coordination

2.2.1 Tactical tasking and coordination group

2.2.2 Intelligence unit meeting

2.2.3 Daily management meeting

2.2.4 Operational review

Intelligence products

1 Strategic assessment

1.1 Content of the strategic assessment

2 Tactical assessment

2.1 Content of the tactical assessment

3 Subject profile

3.1 Content of the subject profile

4 Problem profile

4.1 Content of the problem profile

Research and analysis

1 Intelligence cycle

1.1 Direction

1.2 Collection

1.3 Collation

1.3.1 Commonly used collation tools

1.3.1.1 Association/network charts

1.3.1.2 Timeline/sequence of events

1.3.1.3 Comparative case charts

1.3.1.4 Maps

1.3.1.5 Flow charts

1.3.1.6 Frequency charts

1.3.1.7 Story boards

1.4 Evaluation

1.4.1 Mindmapping

1.5 Analysis

1.5.1 Inference development

1.5.2 Hypothesis

1.5.3 Conclusion

1.5.4 Prediction

1.5.5 Estimation

1.6 Dissemination

2 The role of the analyst

3 The role of the researcher

4 Crime theories and approaches

4.1 Rational choice theory

4.2 Routine activity theory

4.3 Problem analysis triangle

4.4 Scanning, analysis, response and assessment model

4.5 Problem, cause, tactic/treatment, output and result

5 Terms of reference

5.1 Checklist: developing terms of reference

6 Data sources

7 Statistics

7.1 Describing increases and decreases

7.2 Averages

7.3 Upper and lower control limits

7.4 Description of information

8 Analytical techniques

8.1 Crime pattern analysis

8.2 Hot spot identification

8.3 Crime and incident trend identification

8.4 Crime and incident series identification

8.5 General profile analysis

8.6 Demographic and social-trend analysis

8.7 Network analysis

8.8 Market analysis

8.9 Criminal business analysis

8.10 Risk analysis

8.11 Subject analysis

8.12 Results analysis

8.13 Operational intelligence assessment

8.14 Case analysis

8.15 Structured analytical techniques and critical thinking

8.16 Which analytical technique should be used?

8.16.1 Methods

9 Output reports

9.1 Recommendations

9.1.1 Impact of recommendations

10 Dissemination of output reports

11 Ongoing review of analysis

12 The role of the analyst in major incidents

12.1 SCAS analyst

Intelligence report

1 Introduction

1.1 Government security classification

1.2 Reporting member of staff and date/time of report

1.3 Person providing information (source)

2 Collection

2.1 Source evaluation

2.2 Information/intelligence assessment

2.3 Information content

3 Dissemination

3.1 Handling codes and conditions

3.1.1 Lawful sharing permitted (P)

3.1.2 Lawful sharing permitted with conditions (C)

3.1.2.1 Conditions – intelligence unit only

3.2 Audit trail

4 Evaluation and quality assurance of the intelligence report

4.1 Sanitisation

5 Intelligence report risk assessment

6 Authorisations

7 Intelligence confidence matrix

Reference material