SlideShare a Scribd company logo
1 of 14
Information Gathering  in Intelligence Agencies   Norazlinda Binte Abdul Rahim  [email_address] “ THE REASON THE ENLIGHTENED PRINCE AND THE WISE GENERAL CONQUER THE ENEMY. . .AND THEIR ACHIEVEMENTS SURPASS THOSE OF ORDINARY MEN IS FOREKNOWLEDGE. FOREKNOWLEDGE. . .MUST BE OBTAINED FROM MEN WHO KNOW THE ENEMY SITUATION.” Sun Tzu, The Art of War 500 BC
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction to Information Science in Intelligence Agencies   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Information & Intelligence   ,[object Object],[object Object],[object Object],[object Object]
Definition of Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition of Intelligence   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences Between Intelligence & Information ,[object Object],[object Object],[object Object],[object Object]
The Intelligence Cycle   Figure 1.  The Intelligence Cycle (Central Intelligence Agency, 2007)  includes the identifying of relevant data or threats to enable the delivery of the intelligence end product to the policy makers  collecting raw and unassessed information from variety of sources   information is then converted into a form instrumental to the intelligence analysts.  raw information is assessed by analysts. Analysts combine fragments of information from different sources into intelligible reports.  distribution of the end-product to the policymakers marks the attainment of the finished intelligence
Information Gathering from Sources   Table 4  Intelligence Production Resources
Finished Intelligence   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object]
Recommendations ,[object Object],[object Object],[object Object],[object Object]
[object Object]

More Related Content

What's hot

Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorismAishaAL9
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxRoland994165
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigationjaredplata
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence PaperLori A. Ruff
 
Intelligence presentation
Intelligence presentationIntelligence presentation
Intelligence presentationiChange
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomDoing What I Do
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
Information Warfare
Information WarfareInformation Warfare
Information Warfaredibyendupaul
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceDoing What I Do
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesSyedAmoz
 
Covert action
Covert actionCovert action
Covert actionkelsports
 
Anti-terrorism training
Anti-terrorism trainingAnti-terrorism training
Anti-terrorism trainingjturner67
 
Interview and interrogation_powerpoint
Interview and interrogation_powerpointInterview and interrogation_powerpoint
Interview and interrogation_powerpointDakota Boswell
 
Anti terrorism brief_
Anti terrorism brief_Anti terrorism brief_
Anti terrorism brief_zaffar abbasi
 

What's hot (20)

Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence Paper
 
Intelligence presentation
Intelligence presentationIntelligence presentation
Intelligence presentation
 
cia
cia cia
cia
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligence
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
Covert action
Covert actionCovert action
Covert action
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Anti-terrorism training
Anti-terrorism trainingAnti-terrorism training
Anti-terrorism training
 
Interview and interrogation_powerpoint
Interview and interrogation_powerpointInterview and interrogation_powerpoint
Interview and interrogation_powerpoint
 
Anti terrorism brief_
Anti terrorism brief_Anti terrorism brief_
Anti terrorism brief_
 
Close protection
Close protectionClose protection
Close protection
 

Viewers also liked

Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleDario Ciro Vietri
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security TrainingAngela Samuels
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...IntelCollab.com
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?InterQuest Group
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalAleyda Solís
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)a16z
 

Viewers also liked (9)

Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security Module
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Espionage
EspionageEspionage
Espionage
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
 
Security training module
Security training moduleSecurity training module
Security training module
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

Similar to Information Gathering in Intelligence Agencies

Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligencehfrancob
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysisUnimasteressays
 
ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011Robert J. Breitenbach
 
4.1IntroductionThe intelligence community is the predictive .docx
4.1IntroductionThe intelligence community is the predictive .docx4.1IntroductionThe intelligence community is the predictive .docx
4.1IntroductionThe intelligence community is the predictive .docxtroutmanboris
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
LIS 60030 Final Project
LIS 60030 Final ProjectLIS 60030 Final Project
LIS 60030 Final ProjectLaura Levy
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligenceIT2Alcorn
 
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docxoswald1horne84988
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxloganta
 
Trends And Aspects Of Policing Models
Trends And Aspects Of Policing ModelsTrends And Aspects Of Policing Models
Trends And Aspects Of Policing ModelsTiffany Surratt
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxnettletondevon
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxphilipnelson29183
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docxmelbruce90096
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Chapter4 brunt
Chapter4 bruntChapter4 brunt
Chapter4 bruntokeee
 
The Intelligence Community
The Intelligence CommunityThe Intelligence Community
The Intelligence CommunityNicolae Sfetcu
 

Similar to Information Gathering in Intelligence Agencies (20)

Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysis
 
ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011
 
4.1IntroductionThe intelligence community is the predictive .docx
4.1IntroductionThe intelligence community is the predictive .docx4.1IntroductionThe intelligence community is the predictive .docx
4.1IntroductionThe intelligence community is the predictive .docx
 
Intelligence Analysis
Intelligence AnalysisIntelligence Analysis
Intelligence Analysis
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
LIS 60030 Final Project
LIS 60030 Final ProjectLIS 60030 Final Project
LIS 60030 Final Project
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligence
 
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
 
Trends And Aspects Of Policing Models
Trends And Aspects Of Policing ModelsTrends And Aspects Of Policing Models
Trends And Aspects Of Policing Models
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docx
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
ABI White Paper
ABI White PaperABI White Paper
ABI White Paper
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Chapter4 brunt
Chapter4 bruntChapter4 brunt
Chapter4 brunt
 
The Intelligence Community
The Intelligence CommunityThe Intelligence Community
The Intelligence Community
 
Uddin
UddinUddin
Uddin
 
G0953643
G0953643G0953643
G0953643
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Information Gathering in Intelligence Agencies

  • 1. Information Gathering in Intelligence Agencies Norazlinda Binte Abdul Rahim [email_address] “ THE REASON THE ENLIGHTENED PRINCE AND THE WISE GENERAL CONQUER THE ENEMY. . .AND THEIR ACHIEVEMENTS SURPASS THOSE OF ORDINARY MEN IS FOREKNOWLEDGE. FOREKNOWLEDGE. . .MUST BE OBTAINED FROM MEN WHO KNOW THE ENEMY SITUATION.” Sun Tzu, The Art of War 500 BC
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. The Intelligence Cycle Figure 1. The Intelligence Cycle (Central Intelligence Agency, 2007) includes the identifying of relevant data or threats to enable the delivery of the intelligence end product to the policy makers collecting raw and unassessed information from variety of sources information is then converted into a form instrumental to the intelligence analysts. raw information is assessed by analysts. Analysts combine fragments of information from different sources into intelligible reports. distribution of the end-product to the policymakers marks the attainment of the finished intelligence
  • 9. Information Gathering from Sources Table 4 Intelligence Production Resources
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.