NCJ Number
199753
Journal
Police Chief Volume: 70 Issue: 3 Dated: March 2003 Pages: 30-35
Date Published
March 2003
Length
6 pages
Annotation
This article discusses the value of intelligence in preventing terrorism, along with the procedures for targeting, planning, collecting, analyzing, and disseminating intelligence information that can be used in preventive actions.
Abstract
Since it is impossible for law enforcement agencies to have personnel everywhere at all times to prevent terrorist activities, resources must be strategically allocated to achieve the most efficient and effective results. These allocation decisions rely on intelligence information regarding terrorist plans, tactics, timing, and location. When initiating an intelligence initiative, a needs assessment should first be conducted. Questions that should be asked in the needs assessment are the types of information desired, the gaps in the current knowledge base, and who will use the information and analysis produced. The next phase in establishing an effective intelligence process is planning. This means identifying the roles and responsibilities of various agencies in the collection process. Since the collection of information is a primary and well-developed function of all investigative agencies, the challenge in this phase of the intelligence cycle is to collect information in a uniform way that maximizes the sharing of intelligence developed in the analysis phase. The tools of intelligence information analysis, the next phase of the cycle, include time and event charts, relationship matrices, telephone analysis, and the analysis of financial records. Once intelligence information has been developed and analyzed, the next step in the cycle is dissemination. In determining who should receive the intelligence information, the guiding principle should be those persons and agencies best prepared to act upon it to counter terrorist plots. Those in a position to act for prevention on the frontlines should not be passive and wait for information to come to them. There should be provision for authorized persons to enter a searchable database of intelligence information that will allow the pursuit of a line of inquiry and locate material relevant to the inquiry.