Download presentation
Presentation is loading. Please wait.
Published byMarie Neblett Modified over 10 years ago
1
1
2
2
3
Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel alerts (SIGIT) Information from open source Information and intelligence collected from covert and overt operations (HUMIT) 3
4
INCIDENT REPORT 4
5
5
6
DATA SHEET 6
7
Verifying information Reliability and credibility of source Investigating Classification of data Collation Analyzing data Identifying and prioritizing threats (threat & risk assessment) Developing analytical reports 7
8
Analysis report for policy makers Intelligence alert for border control Feedback and reassessing threats 8
9
INTEL ALERT 9
10
Facilitation & Security 10
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.