Tuesday, May 5, 2020

Intelligence Process Dissemination Essay Example For Students

Intelligence Process: Dissemination Essay 24 March 2002INTELLIGENCE PROCESS: DISSEMINATIONOne of the most important steps in the intelligence cycle is deciding who or whom will receive the analysts work. This process is called dissemination. Once completed, the intelligence product has to be able to be passed on to those personnel that meet the requirements of dissemination; Right to know, Need to know, Authority to release. The first requirement of the right to know determines what individuals should have the information to make intelligence decisions. Access to the final products is mainly focus towards law enforcement agencies, both federal and state. These agencies are, however, not the exclusive heir to information. In some cases the Department of Family Services may need to have information on civilians in order to locate offenders or deal with juvenile delinquents. The right to know may also be extended to licensing groups, in order to stifle organized crime. Some examples of non-authorized industries are banks, credi t bureaus, and employment agencies. The need to know is the second requirement of the dissemination process. Whether part of the law enforcement agency or working outside of the agency, before intelligence information is disclosed, there must be a need to know based on the case that law official may be working on. This requirement keeps just anyone from casually browsing through all the classified information that may not pertain to what they have the right to know. The information-seeking agency will need to have proof of needing to know the information, found generally by the case number. Another form of need to know is observed when a background investigation is being conducted on an individual. Once the first two requirements have been satisfied and the right to know and need to know has been established, it is now necessary to determine whether the right to release information to the agency is possible. Many times the information or intelligence may not be possible to release, due to the originating agencies need to have the information keep a secret from the everyone, for example, an undercover agents identity was disclosed. Historically, information is classified at a higher level than necessary, so personnel in this type of circumstance are not compromised. If this is the case, than a date should be disclosed as to when this information may be declassified or downgraded to the consumers level. There are two general methods of dissemination. The first type is a distribution list. This type of dissemination is used when it is well known that outside agencies has the right and need to know. The releasing agency has the authority to release the information based on a pending or on-going investigation. The second type of dissemination is based on an inquiry for the intelligence information and of course will have the right and need to know. Within an agency there are two uses of disseminated information: Tactical and Strategic Intelligence. Tactical intelligence is used primarily for short-term investigations and the information is only temporarily used. Strategic intelligence is more of a long-term investigation, and information will be needed for longer periods of time in order to build an entire scenario. Spot reports are often used and can be either written or oral. These types of reports are short in nature, but will always cover four main categories: Purpose, Factual analysis, Conclusion, and Action statement. The purpose of the report is the basic reason of why it is needed and who needs it. The factual analysis is the actual analytical summary of the information collected. The conclusion will give a general summary based on what the information-seeking agency requested. The action statement is at least one recommendation based upon what was discovered or analyzed. When disseminating information outside of the in telligence-gathering agency, there are more controlled rules. The outside agency sometimes has to agree not to give out classified information based up the possibility of compromising another agencies position or investigation. The only exception would occur if there were a necessity to disclose the classified report to protect against loss of life, physical injury, or loss of property. Rewriting or summarizing the information without source identification can compromise the information. .u3991cef63dd70b8d80bb566735802d5c , .u3991cef63dd70b8d80bb566735802d5c .postImageUrl , .u3991cef63dd70b8d80bb566735802d5c .centered-text-area { min-height: 80px; position: relative; } .u3991cef63dd70b8d80bb566735802d5c , .u3991cef63dd70b8d80bb566735802d5c:hover , .u3991cef63dd70b8d80bb566735802d5c:visited , .u3991cef63dd70b8d80bb566735802d5c:active { border:0!important; } .u3991cef63dd70b8d80bb566735802d5c .clearfix:after { content: ""; display: table; clear: both; } .u3991cef63dd70b8d80bb566735802d5c { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u3991cef63dd70b8d80bb566735802d5c:active , .u3991cef63dd70b8d80bb566735802d5c:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u3991cef63dd70b8d80bb566735802d5c .centered-text-area { width: 100%; position: relative ; } .u3991cef63dd70b8d80bb566735802d5c .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u3991cef63dd70b8d80bb566735802d5c .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u3991cef63dd70b8d80bb566735802d5c .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u3991cef63dd70b8d80bb566735802d5c:hover .ctaButton { background-color: #34495E!important; } .u3991cef63dd70b8d80bb566735802d5c .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u3991cef63dd70b8d80bb566735802d5c .u3991cef63dd70b8d80bb566735802d5c-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u3991cef63dd70b8d80bb566735802d5c:after { content: ""; display: block; clear: both; } READ: Short happy life of francis ma EssayOne of the most important factors that statewide agencies sometimes fail to realize is that the intelligence that is collected, no matter how small a discovery it may be, could be utilized by federal agencies to build a broader picture in an investigation. With statewide agencies compiling information and making it accessible to federal authorities, the intelligence could be drawn into one large criminal investigation; for example, a crime ring that spans across multiple State lines. A record of dissemination should also be kept to keep control of the information or to have a contact list of agencies in a case of mis-information that may need to be corrected. This will also give the producing agency a chance to be able to contact the outside agencies to find out the usefulness of the product consumed. The dissemination process is not a very complicated step if it is utilized properly. It allows for mistakes and a way to correct them. The most important piece of the dissemination step in my opinion is finding out who has the need to know the information and then ensuring that they have the right to know what is being given to them by the releasing authority. Without some kind of control, like the dissemination rules, information on investigations and covert operations could be viewed by any personnel within the agency, and could compromise or endanger lives. SOURCES USEDLowenthall, M.M. INTELLIGENCE: FROM SECRETS TO POLICY. Washington, DC: CQ Press, 2000. Peterson, M.B. APPLICATIONS IN CRIMINAL ANALYSIS. Westport,CT: Praeger Publishers, 1998. (Chap III)Peterson, M.B. INTELLIGENCE 2000: REVISING THE BASICELEMENTS. Sacramento, CA: LEIU, 2000. (Chap 8)Words/ Pages : 1,000 / 24

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.