TACTICAL INTELLIGENCE POTENTIAL TARGETS 1. Military Operational Environments 2. Terrorists Targets 3. Espionages 4. Friendly Accredited Diplomats 5. Military.

Slides:



Advertisements
Similar presentations
Intelligence in the 21st Century: Re-focusing Intelligence to Shape the Strategic Environment Joint Military Intelligence Training Center Douglas H. Dearth.
Advertisements

Open Source Intelligence Doctrine
® Afterthoughts & Additions Robert David Steele Intelligence Coach Prepared 30 August 2003.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Espionage During the Cold War. After the end of World War Two the World was split into two, After the end of World War II the world was split into two;
AUSTRALIA’S INTERNATIONAL MANPADS INITIATIVE Mr Don Smith Executive Officer Department of Foreign Affairs and Trade Canberra.
Brian Connett, LCDR, USN US NAVAL ACADEMY
Information Warfare Theory of Information Warfare
1 Intelligence Community and Classified Information.
HOLT, RINEHART AND WINSTON A MERICAN GOVERNMENT HOLT 1 Foreign Policy and National Security Section 1:Goals and Principles of U.S. Foreign Policy Section.
Criminal Justice Administration and Affiliated Programs Dr. William Sondervan Executive Director.
Foreign Policy and National Security
International Security and Peace Covert Wars Prof. Jaechun Kim.
The National Intelligence Model (NIM)
Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
List of intelligence gathering disciplines
Marshall Center Research Library Electronic Resources: An Overview.
United States - Intelligence Community Central Intelligence Agency; Abroad National Security Agency National Reconnaissance Office Agency National Geo-spatial.
Citizenship Issues C.I.4 U.S. Domestic and Foreign Policy Students are able to: 4.2 Describe U.S. foreign policy. Students may indicate this by: – Defining.
FOREIGN AFFAIRS. ISOLATIONISM TO INTERNATIONALISM 1. Domestic Affairs: what’s happening within our country 2. Foreign Affairs: nation’s relations with.
Spy v. Spy: Espionage, 1947-Present Dr. David R Smith Ohio Northern University.
Vigilant State 2 COLLECTION INTELLIGENCE. 1. Strategic Revolutions.
The National Security Bureaucracy. Key Agencies The State Department.
1 Chapter 14 - Intelligence Operations. 2 Why did the Intelligence Fail to Precipitate Appropriate Action? Pearl Harbor The Japanese had already.
GIJ08 What happened to journalism after 9/11? For additional information:
Strategic Intelligence It is the purest form of intelligence. It provides an overview or summary of capabilities of criminals their trends and motives.
The President stands as the single strong leader of the executive branch Americans have looked to the President for leadership on complex issues As commander.
7.3 Making Foreign Policy. The Pres. & Foreign Policy The Pres. & Foreign Policy –Primary goal is national security  Other goals of gov’t can’t happen.
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
Info = anything that can be known. Intel = info that has been processed for a policy maker. All intel is info, the reverse isn’t true.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Operational Security Awareness
The IC Today Chapter 3 ©2013, Taylor & Francis. Introduction The IC is a work in progress It has undergone a major reorganization – Adversaries that possess.
Chapter Six, Section Three “Making Foreign Policy”
Advertising. Definition of the career area a public promotion of some product or service the business of drawing public attention to goods and services.
Military Intelligence
Chapter 17: Foreign Policy and National Defense Section 2.
US Foreign Policy.
 Foreign Policy- a nation’s overall plan for dealing with other nations  Main goals of Foreign Policy:  National security- the ability to keep the.
“Making Foreign Policy”. “Foreign Policy” “Foreign Policy” is the overall plan for dealing with other nations. It essentially deals with four (4) goals.
OPERATIONS SECURITY 16 August August 2004.
Chapter 17 Section 1& 2: Foreign Affairs and National Security By: Mr. Thomas Parsons.
Introduction Prevent hostile or enemy int orgs from successfully gathering and collecting intelligence against them. Govts organize CI-agencies separately.
Governmental Responses & Counter Measures Week 11.
Federal Agencies. What Is a Bureaucracy? Hierarchical authority. Pyramid structure with a chain of command running from top to bottom. Job specialization.
Hacking Techniques & Intrusion Detection
Foreign Policy GOVT Module 16.
Integrated Social Studies Madison Southern High School
Chapter 15 The Future of Policing in America
Chapter Six, Section Three “Making Foreign Policy”
Making foreign Policy.
Chapter Six, Section Three “Making Foreign Policy”
OSINT Sharad
Who makes and carries out foreign policy?
Foreign Policy and National Defense
Baseball Analogy Harnessing the Power of the Crowd
Foreign Policy.
Foreign Policy and National Security
Operations Security (OPSEC): A Force Multiplier
Foreign Policy.
Chapter 8 “Making Foreign Policy”
Chapter 8 “Making Foreign Policy”
Faculty of Security Engineering University of Žilina
Chapter Six, Section Three
Foreign Policy.
Role of US Security and Intelligence Agencies
AN INTRODUCTION TO FOREIGN POLICY
Presentation transcript:

TACTICAL INTELLIGENCE POTENTIAL TARGETS 1. Military Operational Environments 2. Terrorists Targets 3. Espionages 4. Friendly Accredited Diplomats 5. Military Attaches 6.Non-governmental Organizations 7. Patrolling military police 8. Prisoners of War 9. Strategic Prisoners of War or Detainees 10. Traveler Debriefing. Eg CIA Domestic Service COLLECTION METHODS 1. HUMINT 2. SIGINT 3. IMINT 4. OSINT 5. GEOINT

STRATEGIC INTELLIGENCE POTENTIAL TARGETS 1. Neutral Forces 2. Friendly Forces 3. Civilian Population in an area of combat operation COLLECTION METHOD 1. MASINT -Electro-optical -Nuclear -Geophysical -Radar -Materials -Radiofrequency 2. ACHELON 3. Signal Intelligence 4. Imagery Intelligence 5. OSINT 6. SIGINT 7. TECHINT 8. FININT 9. CYBINT/DNINT

QUIZ: Is CSIS allowed to recruit university students to spy on their colleagues on Campus? One major method used by CSIS and other security intelligence, and other worldwide security intelligence units and law implementation agencies through the world, is the recruitment of human sources of information. In case a CSIS investigation requires the direction of intrusive devices or human source, the facility is necessary, pursuant to ministerial course, to acquire ministerial approval. This method of obtaining information is known as open source intelligence. It is however good to note that the information obtained through this process does become verifiable or authentic until it is vitiated and verified by a qualified analyst. Within a university setup, the intelligence unit can obtain information on intentions of foreign nations since students come from different countries. This is a strategic intelligence method. Conversely, the information can also help inform about the plans that terrorists may have on a country’s security since terrorist are more likely to use students to execute their malevolent plans. This is a practical application of human intelligence (HUMINT) and a practical application of OSINT(Open Source Intelligence). This method of obtaining information makes use of both Strategic and Tactical Intelligence. References Rapp, Adam, Raj Agnihotri, and Thomas L. Baker. "Conceptualizing salesperson competitive intelligence: an individual-level perspective." Journal of Personal Selling & Sales Management 31, no. 2 (2011): Loshin, David. Business intelligence: the savvy manager's guide. Newnes, Marrin, Stephen. "The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis." Intelligence and National Security 26, no. 2-3 (2011): Stone, Merlin David, and Neil David Woodcock. "Interactive, direct and digital marketing: A future that depends on better use of business intelligence." Journal of Research in Interactive Marketing 8, no. 1 (2014): Koseoglu, Mehmet Ali, Kemal Karayormuk, John A. Parnell, and Michael L. Menefee. "Competitive intelligence: evidence from Turkish SMEs." International Journal of Entrepreneurship and Small Business 13, no. 3 (2011): Ratcliffe, Jerry H. Intelligence-led policing. Routledge, 2012.