Introduction Terrorist attacks, like other forms of crime are often preceded by indicators that indicate that something that may lead to a terrorist attack is underway. A challenge of intelligence analysis, as well as risk and threat assessments is identifying these indicators among the noise of cities where terrorists can blend into the local culture….
Month: July 2017
UN Security Level System (SLS)
Introduction The United Nations has a comprehensive system of security management in order to ensure that they are able to perform their peacekeeping and other duties in potentially volatile areas. In addition to requiring training like Basic Security in the Field (BSITF-II) and Advanced Security in the Field (ASITF), the UN also requires each area…
Mill’s Canons of Deductive Reasoning
Introduction Intelligence analysis involves turning raw data into applied information through a process of process, interpretation and analysis. These elements are used in intelligence analysis, scientific reasoning and in our daily lives. John Stuart Mill was a philosopher who studied the field of logic. He wrote a series of canons, or methods for logically determining…
SLEIPNIR Assessment Tool
Introduction SLEIPNIR is a tool developed by the Royal Canadian Mounted Police (RCMP) and used in criminal intelligence analysis to assist in the ranking and comparison of the threat of organized crime groups. SLEIPNIR is an example of a structured professional judgement (SPJ) tool similar to the SAVRY. By using the Sleipnir tool you can…
Key Assumptions Check
Introduction The Key Assumptions Check is a simple way to begin an intelligence analysis or research project. Despite its simplicity, it is also extremely powerful, because it allows us to question the underlying assumptions that we make influencing our decisions and thought processes. Because of confirmation bias, we often exclude information from our worldview or…