- 1、本文档共14页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Intelligence Requirements and Threat Assessment
10
Intelligence Requirements and
Threat Assessment
C
H
A
P
T
E
R
T
E
N
147
Information is needed to make decisions – the higher the
quality and the more comprehensive the information, the more
sound the decision. If an executive is going to make a
decision about implementing a new program, he or she needs
information on the costs, benefits, and risks of the program as
well as the more difficult dimension of what benefits will be
lost if a program is not implemented. Typically, the information
sought is not conclusive, but based on probability, the
experience of others, experimentation, logic or, sometimes, an
educated guess. Not having sufficient reliable information
makes the decision process more difficult (and risky).
Intelligence Requirements and
Threat Assessment
148 Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies
The same phenomenon applies to the operational world of criminal
intelligence. To adequately assess the threats from a terrorist group or
criminal enterprise, information is needed for a comprehensive analysis.
Oftentimes during the course of the analytic process, critical information is
missing that prevents a complete and accurate assessment of the issue.
This is a gap, an unanswered question related to a criminal or terrorist
threat. An intelligence requirement is identified and information needs to
aid in answering questions related to criminal or terrorist threats.177
Filling Gaps/Fulfilling Requirements
The information collection process needs to be focused so that specific
information needs are fulfilled. This increases efficiency of the process
and ensures that the right information needs are being targeted. Too often
in the past a “dragnet” approach was used for collecting information, and
analysts and investigators would examine the information in hopes of
discovering the “pearls” that may emerge. As illustrated in Figure 10-1,
there are a number of differences between the traditional app
您可能关注的文档
- GRE PPII阅读解析版.pdf
- Great Northern.pdf
- greening of supply chain in developing countries_ecological economics_2012.pdf
- Greenplum函数开发_V1.0.pdf
- GPD6300A内置收音功能MP3解码芯片.pdf
- GPCast Iron Motors EN 02_2009.pdf
- GMAT语法题OG详解87-140-智课教育.pdf
- GRE写作ARGUE中你不能不知道的靠谱逻辑词(上)-智课教育旗下智课教育.pdf
- GRE作文issue写作范文:研究历史的好处.pdf
- GRE写作argument官方范文优劣分析-智课教育旗下智课教育.pdf
文档评论(0)